1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Chris Karlof and David Wagner
Security in Mobile Ad Hoc Networks
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Trust relationships in sensor networks Ruben Torres October 2004.
A Survey of Secure Wireless Ad Hoc Routing
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
URSA: Providing Ubiquitous and Robust Security Support for MANET
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Lightweight Key Establishment and Management Protocol (KEMP) in Dynamic Sensor Networks draft-qiu-6lowpan-secure-router-01 Ying QIU, Jianying ZHOU, Feng.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Mobile Agents: A Key for Effective Pervasive Computing Roberto Speicys Cardoso & Fabio Kon University of São Paulo - Brazil.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 Advance Security CS692 Fall 2004 Wireless Network Security and Sensor Networks.
Wireless Sensor Network Security Anuj Nagar CS 590.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
CS2510 Fault Tolerance and Privacy in Wireless Sensor Networks partially based on presentation by Sameh Gobriel.
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Common Devices Used In Computer Networks
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
High-integrity Sensor Networks Mani Srivastava UCLA.
Secure In-Network Aggregation for Wireless Sensor Networks
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Adversary Models in Wireless Networks: Research Challenges Radha Poovendran Network Security Lab (NSL) University of Washington.
Wireless Sensor Networks
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Intrusion Tolerance for NEST
Key Management Techniques in Wireless Sensor Networks
Presentation transcript:

1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington

2 Outline Panda-Hunter Game Sensor Network Security How is it different? Incomplete List of challenges Problem #1- Problem #5

3 Panda-Hunter Game Model A generic asset monitoring sensor network application Panda-Hunter Game:  Sensor Network monitors Panda  Hunter observes Panda_Here messages and go after Panda Panda’s Challenge  Want Location Privacy Hunter’s Challenge  Want valid message  Want the network to work reliably  Detect any faulty or compromised sensor Both need different services Data Sink Sensor Node

4 Sensor Network Security What do we mean by sensor network security?  Conventional view of security from cryptography community: cryptographically unbreakable design in practical sense  Network Reality: very few security breaches in practice are to exploit flaws in cryptographic algorithms; side channel attacks Malicious versus selfish (DoS vs. resource gobbler) Security v.s. robustness, fault tolerance, resiliency Security is not a black/white world, it is progressive We must secure entire networked system, not just an individual component Solutions must be robust/adapt to new threats as much as possible

5 How is it Different? Wireless Sensor networks have NO clear line of defense  Each node is a host as well as a “router”  Security solutions in wired or cellular networks may leverage the networking infrastructure  Secure Network/service “infrastructure” has to be collaboratively established Wireless channel is easily accessible by both good citizens and attackers Resource constraints on portable devices  Energy, computation, memory, etc.  Some devices may be compromised  Heterogeneity prevents a single security solution

6 BN RN BN RN Processing Capabilities Network Granularity Capability-based Abstraction A B Capability based Abstraction of a Heterogeneous Network BN-Backbone node RN-Regular Node

7 Incomplete List of Challenges Resource-Efficient Secure Network Services  Network Initialization, single/multihop neighbor discovery  Multihop path establishment & Routing  Supporting application services Cryptographic services  Broadcast authentication  Key management Security mechanisms for fundamental services  Clock synchronization  Secure location discovery and verification of claims  Location privacy  Secure aggregation and in-network processing  Cluster formation/cluster head election  Middleware (will not discuss further)

8 Incomplete List of Challenges Modeling vulnerabilities  VERY POOR state of understanding  Needed by services and applications Cross-layer design techniques  Routing/location-aware protocols that are also robust!  Incorporating semantics such as geometry, radio model and range for context-based security  Functionality instead of optimality

9 Problem #1: Robust Designs Attacks and compromise of network are reality  Misconfiguration cannot be fully eliminated  Maybe we can never enumerate  Software bugs are #1 cause for all possible attacks  Not every device can implement maximum-strength solutions Shift from prevention to tolerance  Building trustworthy system out of untrustworthy components  Ability to detect, and function, even in the presence of problems  Similar analogy to IP building reliable system out of unreliable components  How? Can be application specific

10 Problem #2: Adaptive Security Adaptation to handle many dimensions of dynamics:  Adaptive to user requirements Differential security services used in government and military  Adaptive to user devices  Adaptive to channel dynamics: Partial connectivity, disconnectivity, full connectivity  Adaptive to mobility Cross-domain service for roaming users  Adaptive to dynamic membership Node join, leave, fail

11 Problem #3: Joint Design of QoS and Security Incorporating network metrics and security: scalability, communication overhead, computation complexity, energy efficiency, device capability, … Different performance metrics may be in (partial) conflict  Probably the most secure system is of minimal usability  Example: energy efficiency/computation complexity versus cryptography strength Many conventional security solutions take a centralized approach

12 Problem #4: Evaluation of Design Current designs have an explicit threat model in mind NOT Realistic –Real trace analysis for practical attacks? Benchmarking ? –Other areas in computer systems have well defined benchmarks: SPEC CPU, TPC-C Analytical tools Current effort: game theory, graph theory

13 Problem #5: Securing the Chain The system is only as secure as the weakest link  Many supporting components: DNS, ARP, DHCP,…  Other supporting protocols: bootstrapping, discovery, time synchronization How to secure these supporting components  Often ignored  Secure the entire system chain Build multiple fences  Each fence is built based on a component’s resource constraint