Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.

Slides:



Advertisements
Similar presentations
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Advertisements

1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Trust relationships in sensor networks Ruben Torres October 2004.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Security in Wireless Sensor Networks Adrian Perrig, John Stankovic, and David Wagner.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian Perrig Virgil Gligor Carnegie Mellon UniversityUniversity of Maryland.
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
#1 The Conventional Wisdom About Sensor Network Security… David Wagner U.C. Berkeley.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Applied Cryptography for Network Security
Key Establishment Protocols for Secure Mobile Communications A. Aziz and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks”, IEEE.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
On the Node Clone Detection inWireless Sensor Networks.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Hai Yan Computer Science & Engineering University of Connecticut.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Mangai Vetrivelan Snigdha Joshi Avani Atre. Sensor Network Vulnerabilities o Unshielded Sensor Network Nodes vulnerable to be compromised. o Attacks on.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security in Wireless Sensor Networks by Toni Farley.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
CSCI Research Topics in Computer Science (Fall 2007) A Key-Management Scheme for Distributed Sensor Networks Deepesh Jain Wireless and Sensor Networks.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Intrusion Tolerance for NEST
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Security Of Wireless Sensor Networks
Security of Wireless Sensor Networks
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner

Overview Survey Paper: outlines security issues, discusses some existing solutions, and suggests possible research directions. Survey Paper: outlines security issues, discusses some existing solutions, and suggests possible research directions. Issues include: Issues include: –key establishment –secrecy –authentication –privacy –denial-of-service attacks –secure routing –node capture Also discuses some sample security services for wireless sensor networks. Also discuses some sample security services for wireless sensor networks.

Problems Applying Traditional Network Security Techniques Sensor devices are limited in their energy, computation, and communication capabilities. Sensor devices are limited in their energy, computation, and communication capabilities. Sensor nodes are often deployed in open areas, thus allowing physical attack. Sensor nodes are often deployed in open areas, thus allowing physical attack. Sensor networks closely interact with their Sensor networks closely interact with their physical environments and with people, posing new security problems.

Key Establishment and Trust Sensor devices have limited computational power, making public- key cryptographic primitives too expensive in terms of system overhead. Sensor devices have limited computational power, making public- key cryptographic primitives too expensive in terms of system overhead. Simplest solution is a network-wide shared key. Simplest solution is a network-wide shared key. –problem: if even a single node were compromised, the secret key would be revealed, and decryption of all network traffic would be possible. Slightly better solution: Slightly better solution: –use a single shared key to establish a set of link keys, one per pair of communicating nodes, then erase the network-wide key –problem: does not allow addition of new nodes after initial deployment.

Key Establishment (continued) Bootstrapping keys using a trusted base station. Bootstrapping keys using a trusted base station. –Each node needs to share only a single key with the base station and set up keys with other nodes through the base station –The base station becomes a single point of failure, but being that there is only one base station, it becomes feasible (financially and otherwise) to utilize tamper-resistant packaging for the base station, reducing the threat of physical attack.

Ongoing Research: random-key pre-distribution protocols Large pool of symmetric keys is chosen Large pool of symmetric keys is chosen Random subset of the pool is distributed to each sensor node Random subset of the pool is distributed to each sensor node To communicate, two nodes search their pools for a common key To communicate, two nodes search their pools for a common key –If they find one, they use it to establish a session key –Not every pair of nodes shares a common key, but if the key-establishment probability is sufficiently great, nodes can securely communicate with sufficiently many nodes to obtain a connected network. This means of establishing keys avoids having to include a central trusted base station. This means of establishing keys avoids having to include a central trusted base station. The disadvantage of this approach is that attackers who compromised sufficiently many nodes could also reconstruct the complete key pool and break the scheme. The disadvantage of this approach is that attackers who compromised sufficiently many nodes could also reconstruct the complete key pool and break the scheme.

Secrecy and Authentication We need cryptography as protection against eavesdropping, injection, and modification of packets We need cryptography as protection against eavesdropping, injection, and modification of packets Trade-offs when incorporating cryptography into sensor networks: Trade-offs when incorporating cryptography into sensor networks: –end-to-end cryptography achieves a high level of security but requires that keys be set up among all end points and be incompatible with passive participation and local broadcast. –link-layer cryptography with a network-wide shared key simplifies key setup and supports passive participation and local broadcast, but intermediate nodes might eavesdrop or alter messages.

Hardware vs. Software Cryptography Hardware solutions are generally more efficient, but also more costly ($). Hardware solutions are generally more efficient, but also more costly ($). University of California, Berkeley, implementation of TinySec incurs only an additional 5%–10% performance overhead using software-only methods. University of California, Berkeley, implementation of TinySec incurs only an additional 5%–10% performance overhead using software-only methods. –Most of the overhead is due to increases in packet size. –Cryptographic calculations have little effect on latency or throughput, since they can overlap with data transfer. –Hardware reduces only the computational costs, not packet size. Therefore, software-only techniques are sufficient. Therefore, software-only techniques are sufficient.

Privacy Issues Issues –Employers might spy on their employees shop owners might spy on customers –Neighbors might spy on each other –Law enforcement agencies might spy on public places. Technological improvements will only worsen the problem. Technological improvements will only worsen the problem. –Devices will get smaller and easier to conceal –Devices will get cheaper, thus surveillance will be more affordable

Privacy (continued) Sensor networks raise new threats that are qualitatively different from what private citizens worldwide faced before. Sensor networks raise new threats that are qualitatively different from what private citizens worldwide faced before. –Sensor networks allow data collection, coordinated analysis, and automated event correlation. –Example, networked systems of sensors can enable routine tracking of people and vehicles over long periods of time. –EZ Pass + OnStar == Big Brother? Suggested ways of approaching solution include a mix of: Suggested ways of approaching solution include a mix of: –societal norms –new laws –technological responses

Robustness to Denial of Service Simple form: Radio jamming Simple form: Radio jamming Sophisticated form: Transmit while a neighbor is also transmitting or continuously generating a request-to-send signal. Sophisticated form: Transmit while a neighbor is also transmitting or continuously generating a request-to-send signal. Possible solution (when the jamming affects only a portion of the network): Possible solution (when the jamming affects only a portion of the network): –detect the jamming –map the affected region –route around the jammed area

Secure Routing Proper routing and forwarding are essential for communication in sensor networks. Proper routing and forwarding are essential for communication in sensor networks. Injection attacks Injection attacks –Transmit malicious routing information into the network resulting in routing inconsistencies. –Authentication might guard against injection attacks, but some routing protocols are vulnerable to replay by the attacker of legitimate routing messages. Sensor network routing protocols are particularly susceptible to node-capture attacks. Sensor network routing protocols are particularly susceptible to node-capture attacks. –the compromise of a single node is enough to take over the entire network or prevent any communication within it

Resilience to Node Capture In traditional computing, physical security is often taken for granted In traditional computing, physical security is often taken for granted Sensor nodes, by contrast, are likely to be placed in open locations. Sensor nodes, by contrast, are likely to be placed in open locations. –attacker might capture sensor nodes –extract cryptographic secrets –modify their programming –possibly replace them with malicious nodes Tamper-resistant packaging may be one defense, but it’s expensive. Tamper-resistant packaging may be one defense, but it’s expensive.

Algorithmic Solutions to Node Capture Attempt to build networks that operate correctly even in the presence of nodes that might behave in an arbitrarily malicious way. Attempt to build networks that operate correctly even in the presence of nodes that might behave in an arbitrarily malicious way. –replicate state across the network and use majority voting to detect inconsistencies –gather redundant views of the environment and crosscheck them for consistency node capture is one of the most challenging problems in sensor network security, and we are far from a complete solution. node capture is one of the most challenging problems in sensor network security, and we are far from a complete solution.

Network Security Services So far, we’ve explored low-level security primitives for securing sensor networks. So far, we’ve explored low-level security primitives for securing sensor networks. Now, we consider high-level security mechanisms. Now, we consider high-level security mechanisms. –secure group management –intrusion detection –secure data aggregation

Secure Group Management protocols for group management are required to protocols for group management are required to –securely admit new group members –support secure group communication The outcome of the group computation is normally transmitted to a base station, therefore the output must be authenticated to ensure it comes from a valid group. The outcome of the group computation is normally transmitted to a base station, therefore the output must be authenticated to ensure it comes from a valid group. Any solution must also be efficient in terms of time and energy (or involve low computation and communication costs). Any solution must also be efficient in terms of time and energy (or involve low computation and communication costs). –precludes most classical group-management solutions

Intrusion detection In wired networks, traffic and computation are typically monitored and analyzed for anomalies at various concentration points. In wired networks, traffic and computation are typically monitored and analyzed for anomalies at various concentration points. –expensive in terms of the network’s memory and energy consumption –hurts bandwidth constraints Wireless sensor networks require a solution that is fully distributed and inexpensive in terms of communication, energy, and memory requirements. Wireless sensor networks require a solution that is fully distributed and inexpensive in terms of communication, energy, and memory requirements. In order to look for anomalies, applications and typical threat models must be understood. In order to look for anomalies, applications and typical threat models must be understood. It is particularly important for researchers and practitioners to understand how cooperating adversaries might attack the system. It is particularly important for researchers and practitioners to understand how cooperating adversaries might attack the system. The use of secure groups may be a promising approach for decentralized intrusion detection. The use of secure groups may be a promising approach for decentralized intrusion detection.

Secure Data Aggregation One benefit of a wireless sensor network is the fine-grain sensing that large and dense sets of nodes can provide. One benefit of a wireless sensor network is the fine-grain sensing that large and dense sets of nodes can provide. The sensed values must be aggregated to avoid overwhelming amounts of traffic back to the base station. The sensed values must be aggregated to avoid overwhelming amounts of traffic back to the base station. Depending on the architecture of the network, aggregation may take place in many places. Depending on the architecture of the network, aggregation may take place in many places. –All aggregation locations must be secured. If the application tolerates approximate answers, powerful techniques are available. If the application tolerates approximate answers, powerful techniques are available. –randomly sampling a small fraction of nodes and checking that they have behaved properly supports detection of many different types of attacks

Conclusions Constraints and open environments of wireless sensor networks make security for these systems challenging. Constraints and open environments of wireless sensor networks make security for these systems challenging. Several properties of sensor networks may provide solutions. Several properties of sensor networks may provide solutions. –architect security into these systems from the outset (they are still in their early design stages) –exploit redundancy, scale, and the physical characteristics of the environment in the solutions –build sensor networks so that they can detect and work around some fraction of their nodes which are compromised

Future Research Areas Securing wireless communication links against Securing wireless communication links against –Eavesdropping –Tampering –Traffic analysis –Denial of service Resource constraints Resource constraints Asymmetric protocols Asymmetric protocols –Most of the computation done at base station Public-key cryptographic systems Public-key cryptographic systems –How to make efficient on low-end devices? Working around the lack of physical security Working around the lack of physical security –redundancy –knowledge about the physical environment