Wireless Sensor Network Security Anuj Nagar CS 590.

Slides:



Advertisements
Similar presentations
Energy-efficient distributed algorithms for wireless ad hoc networks Ramki Gummadi (MIT)
Advertisements

Chris Karlof and David Wagner
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Michael Baswell WSN Security Wireless Ad Hoc Sensor Network Security Michael Baswell For CS591 S2007 5/7/20071.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
Wireless Sensor Network Security: A Survey Presented By: Anubhav Mathur Department of Computer Science University of Connecticut Authors: John Paul Walters,
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Key management in wireless sensor networks Kevin Wang.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
EAACK—A Secure Intrusion-Detection System for MANETs
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
KAIST CS712 병렬처리 특강 차세대 센서 네트워크 및 네트워크 보안 동향 Syllabus Network & Security Lab.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Sensor Network Security
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security in Wireless Sensor Networks by Toni Farley.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Security of the Internet of Things: perspectives and challenges
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Overview of Wireless Networks:
Mobile ad hoc networking: imperatives and challenges
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
An Overview of Security Issues in Sensor Network
Presentation transcript:

Wireless Sensor Network Security Anuj Nagar CS 590

Introduction Typical Wireless Sensor Network (WSN)

Need for security WSNs are becoming a cost effective, practical way to go about deploying sensor networks. Large range of applications from civilian to military purposes. Pose different challenges as compared to traditional networks. Hence different mechanisms must be brought about. Enormous research potential.

Main Aspects Obstacles to WSN security. Requirements of a Secure WSN. Attacks. Defensive Measures.

Obstacles to WSN Security Very limited resources: – Limited memory and Storage space : A typical sensor has a 16 bit 8 Mhz CPU with 10K RAM, 48K Program Memory and 1M flash storage. – Power limitation

Obstacles to WSN Security - continued Unreliable Communication : – Unreliable Transfer : Packet-based routing of the sensor network is connectionless hence unreliable. – Conflicts: Even if the channel is reliable, the communication may still be unreliable due to broadcast nature of WSN. – Latency: Multi-hop routing, network congestion and node processing can lead to greater latency in the network.

Obstacles to WSN Security – continued..again Unattended Operation: – Exposure to Physical Attacks. – Managed Remotely: Hard to detect physical tampering. – No Central Management Point: Ideally a WSN should have no central management point. However, if the network is designed incorrectly it may lead to greater congestion.

Security Requirements Shares some common points with traditional networks but also presents unique problems of its own. Data confidentiality: Most important issue in any network. Data integrity: Inability to modify data. Data freshness: Ensures that no old messages have been replayed. Essential for shared key schemes.

Security Requirements - continued Availability: Adjusting existing encryption algorithms to fit within a WSN has costs : – Additional computation consumes more energy. – Additional communication consumes more energy. – Threat of a single point failure if a central management point scheme is used.

Security Requirements – continued..again Self Organization: A WSN is typically an ad hoc network which requires every node to be self organizing and self healing. Time Synchronization: e.g. to calculate the end to end delay time of packets between nodes. Secure localization: Ability to accurately and automatically locate each sensor in the network. Authentication

Attacks Vulnerable to a multitude of attacks such as DoS, traffic analysis, privacy violation, physical attacks and so on. DoS: Jamming a node or set of nodes by transmission of a radio signal that interferes with radio frequencies being used. Violate the communication protocol thus depleting valuable battery life.

More attacks Sybil attack: –Defined as a “malicious device illegitimately taking on multiple identities.” –Originally used against peer to peer networks but may also be used to disrupt routing algorithms, data aggregation etc. Traffic Analysis Attacks: Take over the base station/nodes closest to base station.

Yet more attacks Node replication attacks. Attacks against privacy. Physical attacks.

Defensive Measures Key Establishment. Secure Broadcasting and Multicasting. More efficient routing protocols. Intrusion Detection.

Conclusion Emerging field in a traditional world of computer security. A vast amount of research work is being conducted in this area. Possible thesis ideas: Working on key distribution schemes, modifying existing encryption algorithms, working on the IDS side of things.

References [1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, 40(8):102–114, August [2] P. Albers and O. Camp. Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In First International Workshop on Wireless Information Systems, 4th International Conference on Enterprise Information Systems, [3] R. Anderson and M. Kuhn. Tamper resistance - a cautionary note. In The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, [4] R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, LNCS, [5] T. Aura, P. Nikander, and J. Leiwo. Dos-resistant authentication with client puzzles. In Revised Papers from the 8th International Workshop on Security Protocols, pages 170–177. Springer-Verlag, 2001.