Security in Wireless Sensor Networks

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl.
Medium Access Control in Wireless Sensor Networks.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Investigating Mac Power Consumption in Wireless Sensor Network
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Security Issues In Sensor Networks By Priya Palanivelu.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Privacy and Security in Embedded Sensor Networks Daniel Turner 11/18/08 CSE237a.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Resilience To Jamming Attacks
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
By : Himali Saxena. Outline Introduction DE-MAC Protocol Simulation Environment & Results Conclusion.
MAC Protocols and Security in Ad hoc and Sensor Networks
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
BMAC - Versatile Low Power Media Access for Wireless Sensor Networks.
† Department of Computer Science – University of Rome “Sapienza” – Italy Protocolli MAC per reti di sensori Sistemi Wireless, a.a. 2009/2010 Un. of Rome.
Hao Chen, Guoliang Yao, Hao Liu National ASIC System Engineering Research Center Southeast University WICOM 2008.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Hybrid Indirect Transmissions (HIT) for Data Gathering in Wireless Micro Sensor Networks with Biomedical Applications Jack Culpepper(NASA), Lan Dung, Melody.
An Energy-Efficient and Low-Latency Routing Protocol for Wireless Sensor Networks Antonio G. Ruzzelli, Richard Tynan and G.M.P. O’Hare Adaptive Information.
Security in Wireless Sensor Networks by Toni Farley.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Michael Buettner, Gary V. Yee, Eric Anderson, Richard Han
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
2005/8/2NTU NSLAB1 Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfag Khokhar ECE/CS.
MAC Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Data Collection and Dissemination
SPINS: Security Protocols for Sensor Networks
Data Collection and Dissemination
SPINS: Security Protocols for Sensor Networks
Investigating Mac Power Consumption in Wireless Sensor Network
An Overview of Security Issues in Sensor Network
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Security in Wireless Sensor Networks Michael Krishnan

Outline Types of Attacks Clusters and Intrusion Detection Game Theory Approach

Characteristics of WSNs Limited Energy (~6Ah) Wireless: Intruders can see transmissions and add their own Traffic is either source to sink (base station) or broadcast

Types of Attacks Steal Data – Confidentiality Alter Data – Data Integrity Limit Service Availability (DoS) Consume Energy “Denial of Sleep” D.o.Sleep – Reduce chances to go to low-power states

Confidentiality Public key? Too computationally expensive Secret key? Bad if node is compromised Secure Network Encryption Protocol (SNEP)

SNEP Both sides keep (pair-wise) shared key, k, & shared counter, C, to use as IV in DES Semantic Security Whole network shares MAC() function for authentication: MAC(k,C|{D}) (8 bytes) (Weak) Freshness – replay protection and ordering MAC = msg authentication code

Data Integrity Authentication: Can’t use asymmetric digital signatures – too much overhead SNEP: two-party mTESLA: broadcast

Data Integrity - mTESLA One-way function, F(.) Kn = F(Kn+1) Keys disclosed periodically, not per packet Figure from Perrig et al.

Service Availability Bogus Routing Information Flooding Homing – look at traffic to find important nodes “Black Hole” Attack – compromise neighbors of base-station De-synchronization (transport layer)

Energy – Denial of Sleep Attack Unique to WSNs – can’t use techniques from wired networks Sources of Energy Loss Collision – Frequency Hopping, CDMA, FEC Message Overhearing – RTS/CTS, NAV Idle Listening – schedule sleep Brownfield et al. (2005)

Scheduling Sleep – S-MAC Fixed Sleep Schedule RTS During Listen Period If no RTS  sleep Vulnerable during listen period only Sensor MAC Time sync Broadcast throughout listening period Can keep one awake with RTS (also DoS) Figure from Brownfield et al.

Scheduling Sleep – T-MAC Timeout MAC Sleep Early: wait for timeout period Longest time hidden node must wait before first bit of CTS (TA = 1.5*(tCW_Max + tRTS + tSIFS) Saves energy in absence of attacker, but MORE vulnerable to attacks (if never get timeout, stay awake forever) 1.5 is just to keep stable

Scheduling Sleep – B-MAC No fixed listening start time Periodically wake up and sample channel using low power listening (LPL) Longer preamble (longer than sleep period) Just as vulnerable to attack as T-MAC Figure from Brownfield et al.

Scheduling Sleep – G-MAC Split Frame into Collection and Distribution Period Gateway Sensor (GS) node schedules traffic for cluster Rotate being GS to distribute energy use Gateway can keep misbehaving node in check

Scheduling Sleep – G-MAC Figure from Brownfield et al.

Clusters Cluster head (CH) and member nodes (MN) Popular in routing protocols Nearby nodes have redundancy, compressed at CH (save energy) Can also use for intrusion detection CH monitors MNs, while some subset of MNs monitor CH X MNs can decommission CH (homing) CH = GS, rotate

Methods of Intrusion Detection Anomaly Detection – Actions of monitored node are atypical High probability of false alarm Signature Detection – Actions of monitored node correspond to a type of attack Susceptible to new attacks Typical Attacks: Drop Packets Duplicate Packets Cause Collisions

Clusters for Authentification Everyone watch neighbors? Too much energy BS checks packet at the end? Waste energy transmitting bad packet whole route – need to discover this sooner Check packet everywhere? A lot of computation Check at CH. Send packets first to CH Also send to CH with some probability p so compromised node can’t bypass CH.

Game Theory Approach Agah et al. (2004) Model: 2-player, non-cooperative, nonzero-sum Players: IDS, attacker IDS can choose 1 cluster to defend, Attacker can choose 1 to attack

Game Theory Approach - Notation U = Utility of working WSN Ck = Cost to defend cluster k ALk = Average loss for losing cluster k PI = Attackers profit for intruding CI = Attackers cost to intrude CW = Attacker’s cost to wait

Game Theory Approach - Assumptions PI = SAL CW < PI-CI Ck ~ gk, where gk = # previous attacks to k

Game Theory Approach Payoff Matrix (for cluster k): Attack k Do Nothing Attack k” Defend k U-Ck PI-CI CW U-Ck-ALk” Defend k’ U-Ck’-ALk U-Ck’ U-Ck’-ALk”

What’s wrong with this? Attacker benefit is independent of what IDS does… Intuitively, this should matter We defend one cluster at a time Why not more? How do they coordinate? (Extra transmissions)

Modified Game Theory Approach Uk = Utility of cluster k Ck = Cost to defend cluster k We can defend as many clusters as we want If we defend cluster k, utility of cluster is Uk-Ck If we don’t and it’s not attacked, utility is Uk If we don’t and it is attacked, utility is 0 Since attacker always attacks, his utility is proportional to IDS’s loss minus a constant (CI)

Modified Game Theory Approach No Pure NE: Suppose there were, then attacker always attacks one particular cluster, k. IDS should then only defend k. But then utility of attacker is less than it would be for attacking another cluster. Requirement for mixed NE: E[util. of attacker] indep. of k – equally likely to attack any cluster  (1-pk)Uk = const, where pk is probability of defending cluster k

Modified Game Theory Approach Strategy: each cluster knows its own utility (maybe from G-MAC) Defend with probability pk=1-X/Uk where X is a constant known to the whole WSN. Expected utility of cluster k: pk(Uk-Ck)+(1- pk)(Uk*(m-1)/m) where m = # clusters

Modified Game Theory Approach Total expected utility of WSN: S[pk(Uk-Ck)+(1- pk)(Uk*(m-1)/m)] = S[(1-X/Uk )(Uk-Ck)+ X/Uk(Uk*(m-1)/m)] = S[Uk-Ck-X+XCk/Uk + X*(m-1)/m)] = m(X*(m-1)/m-X)+S[Uk-Ck+XCk/Uk] = -X+S[Uk-Ck+XCk/Uk]

Modified Game Theory Approach Total expected utility of WSN always defending (pk = 1 for all k): S[Uk-Ck ] = -X+S[Uk-Ck+XCk/Uk ] Gain for using pk < 1 -X+S[Uk-Ck+XCk/Uk] - S[Uk-Ck ] = -X+S[XCk/Uk ] = X(S[Ck/Uk ] –1)

Modified Game Theory Approach Utility gain = X(S[Ck/Uk ] –1) What does this mean? Goes to -X As Ck  0 Positive for larger Ck and smaller Uk. Increases with X (Counter-intuitive) Conclusion: We can improve our utility by defending less when per cluster utility is low and Ck is relatively high 1-> h for h attackers

Review Classified Attacks: Confidentiality, Authenticity, Service Availability, Energy Clusters are useful for intrusion detection Game theory approach