1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Wireless Sensor Networks: Key Management Approaches
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Security in Mobile Ad Hoc Networks
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
Security in Wireless Sensor Networks Adrian Perrig, John Stankovic, and David Wagner.
EKC Journal Paper Scouting A Presentation for the ResiliNets Group © 2008 Egemen Cetinkaya July 2008 Egemen Çetinkaya Department of Electrical Engineering.
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of Califonia at Berkeley Paper review and.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
Challenge: Securing Routing Protocols Adrian Perrig
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
1 Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures Authors: Chris Karlof and David Wagner Presenter: Ivanka Todorova.
Chris Karlof, David Wagner Presented by Michael Putnam
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Shambhu Upadhyaya 1 Sensor Networks Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 21)
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Security in Wireless Sensor Networks
Security Protocols In Sensor Networks. Introduction –Security in sensor networks is important to prevent unauthorized users from eavesdropping, obstructing.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Optimal Activation of Intrusion Detection Agents for Wireless Sensor Networks Yulia Ponomarchuk and Dae-Wha Seo Kyungpook National University, Republic.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner.
IT R&D Global Leader 1 Ubiquitous IT Europe Forum 2008 Security Technologies in USN Dooho Choi Information Security Research Division.
High Performance Embedded Computing © 2007 Elsevier Chapter 1, part 4: Embedded Computing High Performance Embedded Computing Wayne Wolf.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Chris Karlof and David Wagner University of California at Berkeley
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – C. Karlof and D. Wagner Dr. Xiuzhen Cheng Department of Computer Science The.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
Lecture 24 Wireless Network Security
Denial of Service in Sensor Networks Anthony D. Wood John A. Stanovich Presenter: Todd Fielder.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
A Critical Analysis on the Security of IoTs
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Wireless Sensor Networks (WSN’s) Security Lecture 13
An Overview of Security Issues in Sensor Network
Presentation transcript:

1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security

1-2 Announcements r Hw3 due today. r Project presentations tomorrow from 4- 7pm. r Project reports due tomorrow by midnight.

1-3 Security in sensor networks

1-4 Security in sensor networks r For many sensor network applications, security is critical. m Public safety, special operations, healthcare, etc. r Sensor network protocols should incorporate security mechanisms in the original design.

1-5 DoS in Sensor Networks [Wood et al.] r What is DoS? m Attack that reduces or eliminates the network’s ability to perform its function. m E.g., hardware failures, software bugs, resource exhaustion, etc. r Paper looks at protocol layers and possible DoS attacks.

1-6 Physical layer r Attacks: m Jamming. m Tampering. r Defenses: m Jamming: Spread-spectrum techniques. Lower duty cycle with priority messages. Alternate modes of communication. m Tampering: “Self-destruction” Hiding nodes.

1-7 Link layer r Attacks: m Collision induction. m Battery exhaustion. m Unfairness. r Defenses: m Collision induction.. Fairness. Error correcting codes (?).Small frames. Collision detection. Collision-free MAC. m Battery exhaustion. Rate limitation. Streamlined protocols.

1-8 Network layer: attacks r “Neglect and greed”. r “Homing”. r Misdirection. r Gray/black holes.

1-9 Network layer: defenses r Authorization. m Only authorized nodes participate in routing. Need authentication mechanisms. m Monitoring. Monitor node behavior. m Probing. m Redundancy.

1-10 Transport layer r Attacks: m Flooding. m Desynchronization. Message fabrication to get end points out of sync. r Defenses: m Flooding: Limit number of connections. Challenges/puzzles to clients. m Desynchronization: Authenticate all messages (including header fields)

1-11 Sample protocol vulnerabilities r Adaptive rate control [Woo et al.] m MAC layer modifications to m Preference to route-through traffic. m Vulnerabilities? r RAP [Lu et al.] m Similar vulnerability. m Differentiated services can be exploited by attacker.

1-12 “On Communication Security…” [Slijepcevic et al.]

1-13 Focus r Communication security in sensor networks. r Data classification and related security threats. r Location-based security mechanism.

1-14 Types of data r Mobile code. r Sensor node location. r Application data. r Goals: m Minimize security-related energy consumption. m Different protection levels.

1-15 Target sensor net architecture r Localized algorithms. r Local broadcast. r Mobile code.

1-16 Security threats r Insertion of malicious code. r Interception of messages with node location information. r Interception of application data. r Injection of false data. Lower risk.

1-17 Security architecture r Symmetric key encryption. m All messages encrypted. r Three security levels: m Level I: mobile code. m Level II: node location information. m Level III: application data. r Encryption strength: m Level I > level II > level III. r Encryption algorithm with adjustable strength (number of rounds).

1-18 Security architecture (cont’d) r Group keys. r Every user: set of keys, pseudorandom generator, and seed. r Periodically and synchronously, nodes change keys.

1-19 Security levels r Level I uses strongest encryption for mobile code injection. m 32 rounds. r Level II: m Location-based keys. Different for different “cells”. Protect network from compromised keys. r Level I: m Weakest security. m 22 rounds.

1-20 Performance r Cost of encryption/decryption. r Energy considerations. m Rockwell WINS node.

1-21 “Secure Routing…” [Karlof et al.]

1-22 Focus r Routing security in sensor networks. r Problem: m Current routing protocols for sensor networks do not consider security. m Vulnerable to attacks. m Not easy to make these protocols secure.

1-23 Contributions r Threat models and security goals for sensor network routing. r Two new attacks: sinkhole and HELLO floods. r Security analysis of routing and topology control algorithms. r Attacks against these protocols. r Countermeasures and design issues for secure routing in sensor networks.

1-24 Deployment and platform r Heterogeneous deployment. r Mica motes with TinyOS. r Base stations. r Aggregation points.

1-25 Sensor- and ad-hoc networks r Traffic considerations: m Ad hoc networks exhibit more general patterns. m Sensor networks: Many-to-one. One-to-many. Local. r Capabilities. m Sensor nodes are typically more limited. r Trust relationships. m E.g., to perform aggregation, duplicate pruning, etc.

1-26 Attacks r Spoofed, altered, replayed routing information. r Selective forwarding. m Black/gray hole. r Sinkhole. r Sybil. m Single nodes presents multiple id’s to others. r Wormhole. r HELLO flood. r (Link-layer) ACK spoofing.

1-27 Countermeasures r Outsider attacks: m Link layer encryption and authentication. m Shared keys. r Insider attacks: m Identity verification. m Multipath routing. m Bi-directional link verification. m Limiting number of neighbors. r Sinkhole and wormhole attacks are harder to circumvent. m Design routing protocols where these attacks are ineffective. m E.g., geographic routing. ???