Michael Baswell WSN Security Wireless Ad Hoc Sensor Network Security Michael Baswell For CS591 S2007 5/7/20071.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Trust relationships in sensor networks Ruben Torres October 2004.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
Lightweight Key Establishment and Management Protocol (KEMP) in Dynamic Sensor Networks draft-qiu-6lowpan-secure-router-01 Ying QIU, Jianying ZHOU, Feng.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Wireless Sensor Network Security Anuj Nagar CS 590.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.
Wireless Ad-Hoc Networks
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
EAACK—A Secure Intrusion-Detection System for MANETs
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security in Wireless Sensor Networks by Toni Farley.
Wireless Network Keys Management What is WSN ? Steven Du ID: CSI 5148.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Security of the Internet of Things: perspectives and challenges
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Securing Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
An Overview of Security Issues in Sensor Network
Presentation transcript:

Michael Baswell WSN Security Wireless Ad Hoc Sensor Network Security Michael Baswell For CS591 S2007 5/7/20071

Michael Baswell WSN Security Introduction Wireless networking is becoming prevalent, and presents unique security concerns Physical access is trivial since the physical layer is a broadcast radio signal Physical access is trivial since the physical layer is a broadcast radio signal Ad Hoc network – no centralized control mechanisms (routers, switches, etc.); Nodes may serve the routing and relay functions. MANET (Mobile Ad Hoc Network) – one emerging example Nodes can be added or removed at any time Nodes can be added or removed at any time Nodes may move to different regions Nodes may move to different regions Nodes may be constrained (PDA, cell phone) Nodes may be constrained (PDA, cell phone) assumption of trust among nodes – dangerous! assumption of trust among nodes – dangerous! 5/7/20072

Project Goal Present an overview of existing research in WSN security Look for related research (MANET literature in particular) Offer some insight into potential security mechanisms and implementation constraints & possibilities 5/7/2007 Michael Baswell WSN Security 3

Wireless Sensor Networks WSN share a number of key features with MANET Ad hoc nature – WSN must self-configure and reconfigure at intervals Ad hoc nature – WSN must self-configure and reconfigure at intervals More or less random deployment More or less random deployment Motes are constrained in terms of CPU, battery life, storage, etc. Motes are constrained in terms of CPU, battery life, storage, etc. Size of network – potentially 10k or 100k nodes Size of network – potentially 10k or 100k nodes A few key differences Motes usually are stationary Motes usually are stationary A trust relationship can be defined prior to deployment A trust relationship can be defined prior to deployment 5/7/20074

Michael Baswell WSN Security WSN Security – Constraints Computational Power is minimal, and draws power Storage is minimal – no HDD, etc. Limited broadcast/reception range, and low bandwidth. Also, the stronger the broadcast signal, the more power it takes Power is limited by the battery life – in short, the more active the mote, the quicker it dies. Crossbow Technologies ( offers a “Mote Battery Life Calculator” spreadsheet for download, for several research motes Crossbow Technologies ( offers a “Mote Battery Life Calculator” spreadsheet for download, for several research moteswww.xbow.com 5/7/20075

Michael Baswell WSN Security WSN Security – Key Points Security in proportion to sensitivity of data Any security mechanism should address limitations of CPU, energy, and network resilience Any security mechanism WILL require more computation and power, as well as add to latency Two scenarios: WSN with laptops or other high-power computer in direct communication / monitoring range WSN with laptops or other high-power computer in direct communication / monitoring range Ad hoc node-to-node only; all work must be done by motes Ad hoc node-to-node only; all work must be done by motes 5/7/20076

Michael Baswell WSN Security Objectives Data Confidentiality – keeping it secret Data Authentication – knowing that the broadcaster is legitimate Data Integrity – broadcast data is sent and received accurately and completely Data Freshness – data is delivered in timely manner (old data may be useless, or a rebroadcast) 5/7/20077

Michael Baswell WSN Security Example Threats Insertion of Malicious Code (on a WSN supporting code mobility) Interception of node location broadcasts or other sensitive data Sleep Deprivation Torture attack (almost as bad as the dreaded Semester Project Deadline attack) (almost as bad as the dreaded Semester Project Deadline attack) Protection of data within a captured / compromised node 5/7/20078

Michael Baswell WSN Security Security Mechanisms - Encyption Network shared symmetric key is the only practical approach Unique key pairs between nodes impractical Unique key pairs between nodes impractical Could keep a series of keys and change at intervals – longer expected life -> more keys are needed Could keep a series of keys and change at intervals – longer expected life -> more keys are needed Scalable algorithm is preferable due to storage stronger encryption through more iterations (DES/AES as examples), when it is critical stronger encryption through more iterations (DES/AES as examples), when it is critical Fewer iterations when less essential Fewer iterations when less essential Burn power only to the extent that it is necessary Burn power only to the extent that it is necessary 5/7/20079

Michael Baswell WSN Security Security Mechanisms - IDS “traditional” IDS not an option no centralized control mechanisms no centralized control mechanisms Limited monitoring due to reception range Limited monitoring due to reception range Critical Node monitor / trigger mechanism MANET literature suggests this approach which might be adaptable to WSN – better results in low-mobility, densely populated networks. That describes WSN! MANET literature suggests this approach which might be adaptable to WSN – better results in low-mobility, densely populated networks. That describes WSN! Identify and monitor only critical nodes – they’re worth protecting! Identify and monitor only critical nodes – they’re worth protecting! Watchdog type IDS uses 60-70% CPU, 450k storage initially Watchdog type IDS uses 60-70% CPU, 450k storage initially Trigger / critical event approach results in less than 1% utilization, 125kb storage initially Trigger / critical event approach results in less than 1% utilization, 125kb storage initially 5/7/200710

Michael Baswell WSN Security Conclusions WSN security is severely limited by WSN constraints of power, CPU, etc. These constraints are not going away WSN do better when many nodes are deployed WSN do better when many nodes are deployed nodes will get cheaper, not more powerful, so that more can be deployed nodes will get cheaper, not more powerful, so that more can be deployed MANET research lends some insight into resource-friendly mechanisms Encryption – shared symmetric key; predefined trust relationship set up prior to deployment Encryption – shared symmetric key; predefined trust relationship set up prior to deployment IDS – critical nodes, triggers / critical events IDS – critical nodes, triggers / critical events 5/7/200711

Michael Baswell WSN Security References Lindsey McGrath and Christine Weiss, “Wireless Sensor Networks Security.” UCCS Presentation / Semester Project, cCS591, Slijeocevic, Potkonjac, Tsiatsis, Zimbeck, and Srivastrava, “On Communication Security in Wireless Ad-Hoc Sensor Networks.” UCLA, 2002 Karygiannis, Antonakakis, and Apostolopoulos, “Detecting Critical Nodes for MANET Intrusion Detection Systems.” 2006, National Institute of Standards and Technology (NIST). MANET.pdf MANET.pdfhttp://csrc.nist.gov/manet/Critical-Nodes- MANET.pdf Karygiannis and Antonakakis, “mLab: a Mobile Ad Hoc Network Test Bed.” 2005, National Institute of Standards and Technology. Ioannis G. Askoxylakis, Diomedes D. Kastanis and Apostolos P. Traganitis, “Secure Wireless Ad Hoc Networking.” ERCIM News No. 63, October /7/200712