Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Authors: Chris Karlof and David Wagner
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Security in Wireless Sensor Networks: Key Management Approaches
ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY Presented By: Abbas Kazerouni EE 360 paper presentation, winter 2014, EE Department, Stanford.
EKC Journal Paper Scouting A Presentation for the ResiliNets Group © 2008 Egemen Cetinkaya July 2008 Egemen Çetinkaya Department of Electrical Engineering.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of Califonia at Berkeley Paper review and.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
Introduction to Wireless Sensor Networks
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin.
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Geographic Routing Without Location Information A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, I. Stoica Paper and Slides by Presented by Ryan Carr.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Data-Centric Storage in Sensor Networks With GHT Khaldoun A. Ibrahim,
Secure Routing in WSNs: Attacks & Countermeasures Chris Karlof & David Wagner, UC Berkeley 1 st IEEE International Workshop on Sensor Network Protocols.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
1 Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures Authors: Chris Karlof and David Wagner Presenter: Ivanka Todorova.
Chris Karlof, David Wagner Presented by Michael Putnam
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
Chris Karlof David Wagner University of Califonia at Berkeley
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Secure Routing in Wireless Sensor Networks. This Paper  One of the first to examine security on sensor networks prior work focused on wired and adhoc.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Energy Aware Directed Diffusion for Wireless Sensor Networks Jisul Choe, 2Keecheon Kim Konkuk University, Seoul, Korea
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Presented by: Ivor Rodrigues Worcester Polytechnic Institute.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
Chris Karlof and David Wagner University of California at Berkeley
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks ChalermekRameshDeborah Intanagonwiwat Govindan Estrin Mobicom 2000.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – C. Karlof and D. Wagner Dr. Xiuzhen Cheng Department of Computer Science The.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Protocols for Wireless Sensor Networks
Introduction to Wireless Sensor Networks
Wireless Sensor Network Architectures
Sensor Network Routing
Net 435: Wireless sensor network (WSN)
Chris Karlof and David Wagner Presenters: Hyowon Lee & Yongbae Bang
Presentation transcript:

Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner

Directed diffusion Data Centric Sensor Node don’t need global identity Application Specific Traditional Networks perform wide variety of tasks. Sensor Networks are designed for specific task. Data aggregation & caching. Positive reinforcement increases the data rate of the responses while negative reinforcement decreases it.

Directed diffusion  Suppression  Cloning  Path Influence

Selective Forwarding ― Worming and Sybiling on directed diffusion WSN's

GEAR and GPSR ― GPSR: unbalanced energy consumption ― GEAR: balanced energy consumption ― GPSR: routing using same nodes around the perimeter of a void ― GEAR: weighs the remaining energy and distance from the target ― GPSR: Greedy routing to Base station ― GEAR: distributed routing, energy and distance aware routing. ― Construct a topology on demand using localized interactions and information without initiation of the base station

Geographical Attacks and Attackers ― Forging fake nodes to try to plug itself into the data path.

Geographical Attacks and Attackers ― GPSR.

Minimum cost forwarding ― Compute a distributed shortest-path ― Attacks ― Very susceptible to sinkholes attacks ― Very easy to stage a HELLO flood

LEACH: low-energy adaptive clustering hierarchy ― Assumes that transmission to the base station is always possible, but costly ― Aggregate motes into cluster. Rotate the cluster-head ― Attacks ― HELLO flood ― Sybil attack to impersonate all the cluster heads

Rumor routing ― Similar to the vehicular routing paper ― Remembers the route taken ― To return packets reverse the recorded route ― Attacks: ― Sink messages passing by ― Jellyfish attack: Forward multiple copies of the agent ― Reset TTL, keep previously seen nodes

GAF, geography-informed energy conservation ― Only one mote awake per square ― Attacks: ― Spoof messages, disable the entire network

SPAN ― Coordinators always stay awake ― Negotiated step up and step down ― Attacks: ― Fake a message, wins the coordinator election

Countermeasures Sybil attack: ― Unique symmetric key ― Needham-Schroeder ― Restrict near neighbors of nodes by Base station

Countermeasures Hello Flooding: ― Bi-directionality tests ― Restricting the number of nodes by the base station

Countermeasures Wormhole and sinkhole attacks: ― Use time and distance ― Geographic routing resists such attacks well ― Traffic directed towards Base station and not elsewhere like sinkholes

Leveraging Global knowledge ― Fixed number of nodes ― Fixed topology.

Selective Forwarding ― Messages routed over n disjoint paths protected from n compromised nodes Image Source:

Conclusions ― The Authors state that for secure routing, networks should have security as the goal ― Infiltrators can easily attack, modify or capture vulnerable nodes. ― Limiting the number of nodes, using public/global/local key are some of the ways to counter being attacked by adversaries.

Few Observations ― More insight on capturing packets of the air ― Foes or Friends? ― What happens when data is captured, copied and forwarded unnoticed?

Few Observations ― What happens if someone spoofs a legitimate node identity and paralyze it. What are the countermeasures? Is it detectable? ― Should sensor networks provide security or is it their goal to be secure?

References ― Securities in Sensor networks-Yang Xiao ― Mobicom 2002 Wireless Sensor Networks-Deborah Estrin ― On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks-Edith C. H. Ngai Jiangchuan Liu, and Michael R. Lyu ― The Sybil Attack – John Douceur (Microsoft) e