Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL 6788 11.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Chris Karlof and David Wagner
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
CMP206 – Introduction to Data Communication & Networks Lecture 1 - Networking Fundamentals.
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
© 2004 The MITRE Corporation. All rights reserved DTN Security Susan Symington March 2005 IETF DTN meeting.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Lecture 1: Overview modified from slides of Lawrie Brown.
Network Layer and Transport Layer.
Security+ Guide to Network Security Fundamentals
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Introduction (Pendahuluan)  Information Security.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Wireless Ad-Hoc Networks
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Dimensions of E – Commerce Security
Energy-Efficient Protocol for Cooperative Networks IEEE/ACM Transactions on Networking, Apr Mohamed Elhawary, Zygmunt J. Haas Yong Zhou
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
ACM 511 Introduction to Computer Networks. Computer Networks.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Network Security Introduction
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Introduction to Network Systems Security Mort Anvari.
Packet switching Monil Adhikari. Packet Switching Packet switching is the method by which the internet works, it features delivery of packets of data.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
K. Salah1 Security Protocols in the Internet IPSec.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
Securing Access to Data Using IPsec Josh Jones Cosc352.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Chapter 6 Networks Communicating and Sharing Resources
Lecture 1: Foundation of Network Security
Introduction to Cryptography
Presentation transcript:

Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL

Agenda Introduction Challenges Sensor Networks Solutions Presented Path Forward Conclusion 2

Introduction Security and privacy are a large concern with technology in our society Anyone with an internet enabled cell phone can potentially transmit sensitive personal information wirelessly Identity threats are everywhere and security/privacy must be taken into account when using any technology 3

Formal definitions-Security Authentication: To make sure the sender and receiver are the correct parties to transmit data between Confidentiality: To prevent unauthorized disclosure of information to outsiders Integrity: To ensure that the information being transmitted is correct and unmodified. Modified can mean deletion, rearrangement, creation, or delay. Non-repudiation: To make sure the sender or receiver has to accept the transmission Access Control: To limit access to devices and applications Availability: To ensure that the network is available to users whenever necessary 4

Formal definition-Privacy Anonymity: To make sure the users’ identity and the receivers identity is never disclosed unless the user authorizes the disclosure Non-linkability: The users communication sessions should not be able to be linked together Context privacy: The users context info (location, length of communication) should not be made available unless the user authorizes it Confidentiality and integrity: The communications between the user and the receiver should remain confidential and the data should not be comprised in any way 5

Sensor Networks Concealing the receiver or source location is a good goal for sensor networks The receiver (or sink node) could potentially be a single point of failure if all information is funneled to it There are 2 main ways to discover information: packet tracing and by analyzing the data traffic rate 6

Sensor Networks Content preservation is also important (i.e. data integrity) Encryption is one method of securing data Injecting fake packets into the network is another way to secure data because any adversary that intercepts the data should not be able to figure out which packets contain real data – One drawback on fake packets is the bandwidth requirement as well as the energy constraints 7

Wireless Physical Layer Protection Physical layer protection is much easier on a wired network as opposed to wireless The goal is to transmit data between nodes with any adversary in between communication being kept as ignorant as possible Signal to noise ratio can be exploited to enhance wireless security As long as the main communication channel has a higher SNR than a potential attackers channel SNR, then the wireless link is said to be secure 8

Network Level Privacy Network level privacy can be broken down into four subcategories: – Sender node location preservation: no intermediate nodes have any information about the location (in terms of physical distance or number of hops) about the sender node except the source, its immediate neighbors, and the destination – Sender node identity privacy: no intermediate nodes can get any information about who is sending the packets except the source, its immediate neighbors, and the destination – Route privacy: no nodes or adversary can predict the information about the complete path from source to destination – Data packet privacy: no nodes are able to see the information inside a payload of the data packet except the source and destination 9

Receiver Location Protection Concealing the receiver location is paramount in a sensor network. Standard routing protocols generally choose shortest path to conserve energy and computing power A proposed solution is to random routing path complemented with fake packet injection 10

Source Location Protection Source location protection is similar to concealing the receiver location One solution proposed was where packets were randomly forwarded to one node and then onto a mixing ring The mixing ring is a ring of nodes used to pass the packet a random number of times before passing the packet to the receiver This allows protection because an adversary would have a hard time figuring out where a packet came from (source) 11

Source Location Protection Another solution used for source location protection is a directed random walk A directed random walk uses the idea of levels A receiver node has level=0 before a packet arrives, once a packet arrives then the sender node has level=1 and the receiver node will have level=1 after it forwards it to the next node with equal probability This allows the packet to take a “walking” path to its final destination Since the next node selection is random, this idea protects the source location 12

Path Forward Network/Technology designers should work together with potential users to try to mitigate any security/privacy concerns A policy should be adopted to complement the technology, this way security and privacy can be assured This collaboration will lead to more robust systems and also more user friendly systems 13

Conclusion Security and privacy issues will continue to evolve as technology advances Network designers must take various potential threats into account The solutions presented provide a good baseline for network design, the main issues were highlighted More research will be conducted as different technologies are developed 14

Questions If you have any questions regarding the presentation please don’t hesitate to send me an at Thanks for your time! 15