Shambhu Upadhyaya 1 Sensor Networks Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 21)

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
Security in Wireless Sensor Networks Adrian Perrig, John Stankovic, and David Wagner.
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
Routing Security in Ad Hoc Networks
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Wireless Sensor Network Security Anuj Nagar CS 590.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Security in Wireless Sensor Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Denial of Service in Sensor Networks Anthony D. Wood John A. Stanovich Presenter: Todd Fielder.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Packet Leashes: Defense Against Wormhole Attacks
Mobile ad hoc networking: imperatives and challenges
Security Of Wireless Sensor Networks
Wireless Sensor Networks (WSN’s) Security Lecture 13
Security of Wireless Sensor Networks
An Overview of Security Issues in Sensor Network
Sensor Networks Security
Presentation transcript:

Shambhu Upadhyaya 1 Sensor Networks Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 21)

Shambhu Upadhyaya 2 Outline Motivation Challenges Threat and trust model Overview of security solutions DoS attack case study for sensor networks -Physical layer -Link layer -Transport layer Protocol vulnerabilities

Shambhu Upadhyaya 3 Motivation Sensor networks – promising approach Monitoring wildlife, machinery performance monitoring, earthquake monitoring, military application, highway traffic, etc. Perform in-network processing -Data aggregation and forwarding summaries Critical to protect it -Traditional security techniques cannot be applied -Deployed in accessible areas – subject to physical attacks -Close to people – poses additional problems

Shambhu Upadhyaya 4 Sensor Networks Vulnerabilities Military Applications Military can use sensor networks for a host of purposes like detecting the movement of troops, etc. Disasters It may be necessary to protect the location and status of casualties from unauthorized disclosure Public Safety False alarms about chemical, biological, or environmental threats could cause panic or disregard for warning systems. An attack on the system’s availability could precede a real attack on the protected resource Home HealthCare Because protecting privacy is paramount, only authorized users should be able to query or monitor the network

Shambhu Upadhyaya 5 Challenges Challenges in sensor networks -Resource constrained environments -Large scale ad-hoc distribution -High fault tolerance requirement -Large range of operating environments -Limited Bandwidth Security challenges -Key establishment -Secrecy, authentication, privacy, robustness against DoS attacks -Secure routing -Node capture

Shambhu Upadhyaya 6 Threat and Trust Model Outsider attacks -Eavesdropping passive attacks -Alter or spoof packets or inject interfering wireless signals to jam network -Disable sensor nodes by injecting useless packets and drain battery Insider attacks -Node compromise (capture and reprogram) -Possess the keys and participate in the secret communications Base station as a point of trust -Scalability becomes a problem -Base station becomes a bottleneck

Shambhu Upadhyaya 7 Security Solutions Secrecy and authentication -Key establishment and management -PKI is expensive and subject to DoS attacks (bogus messages to initiate signature verification) -Multicast authentication using mTesla Availability -Jamming and packet injection (use spread spectrum, authentication, etc. to counter attack) -Routing attacks (use multi-path routing) Stealth attacks -Attack the service integrity -Make networks accept false data value (no good solutions available)

Shambhu Upadhyaya 8 The Denial of Service Threat Denial of Service could be due to any of the following factors -An adversary trying to bring down the network -Hardware failures -Software bugs -Resource exhaustion -Environmental conditions -Any complicated interaction of the above factors

Shambhu Upadhyaya 9 Design Considerations Operate in harsh environments Distinguish among DoS attacks and normal failure of node Considerations like protection of keys in case of physical attack Layered network architecture although computationally expensive helps in a better security design

Shambhu Upadhyaya 10 Jamming Attacks (DoS) Jamming is transmitting signals to the receiving antenna at the same frequency band or sub band as the communications transmitter transmits Jamming, thus is used to hinder the reception at the other end Nodes can distinguish jamming from failure as in jamming constant energy rather than lack of response impedes communication

Shambhu Upadhyaya 11 Jamming Attacks (Contd…) Most common defense against jamming attacks is to use spread spectrum techniques These techniques can be defeated by following the exact hopping sequence or by jamming a large bandwidth Defense -The nodes can combat jamming by switching to a lower duty cycle and hence preserving power

Shambhu Upadhyaya 12 Jamming Attacks

Shambhu Upadhyaya 13 Tampering (DoS) This attack involves physical access, interrogation and compromise of the nodes Providing physical security to all the nodes in a large sensor network is impractical Defense -The nodes should react to tamper in a fail- complete manner

Shambhu Upadhyaya 14 Link Layer (DoS) Link Layer provides channel arbitration for neighbor to neighbor communication. It uses cooperative schemes like carrier sense that makes it vulnerable to DoS attacks -Exhaustion This involves induction of continuous collisions and other messages to exhaust the resources of the other nodes -Collision In this type of attacks adversaries induce a collision during the transmission of frame causing retransmission

Shambhu Upadhyaya 15 Collision Attack This attack involves inducing a collision in just one octet of transmission The collision causes a checksum error at the other end Corrupted ACK control messages can cause expensive exponential back-off in some protocols

Shambhu Upadhyaya 16 Collision Attack Error Correcting codes can be used to minimize the effect of such attacks but these have expensive overheads Although networks can use collision detection to thwart such attacks, however, a degree of cooperation is required among the nodes for network operation

Shambhu Upadhyaya 17 Exhaustion Attack This type of attack involves introducing collisions in frames towards the end of transmission Thus the transmitting node continuously retransmits the packets and finally dies off A self sacrificing node can use the interactive nature of MAC protocols to launch an interrogation attack Defense -One solution is to make MAC admission control rate limiting so that network ignores excessive requests

Shambhu Upadhyaya 18 Network Layer (DoS) Routing protocols that exist in the network layer must be simple enough to scale to a large number of nodes yet robust enough to cope with failures -Homing Attack In this type of attack the attacker tries to get down Nodes with special functions -Neglect and Greed In this attack the adversary node confirms the reception of the transmission but then drops it rather than forwarding it

Shambhu Upadhyaya 19 Network Layer Misdirection This involves forwarding of packets along wrong paths so as to waste network bandwidth Black Holes This type of attacks are used in networks using distance vector routing where the adversary sends out incorrect route cost advertisements

Shambhu Upadhyaya 20 Neglect and Greed This is one of the simplest form of attack where the malicious node acknowledges the reception of message from other node but then drops the packet This leads to waste of precious network bandwidth and causes retransmission If the node gives undue priority to its own messages then it is also called as Greedy

Shambhu Upadhyaya 21 Neglect and Greed The Dynamic Source Routing (DSR) protocol is susceptible to this attack As the network caches routes, nodes use the same route to the destination and if a node is not generous, it may degrade or block traffic Defense -Use of multiple routing paths -Sending redundant messages

Shambhu Upadhyaya 22 Homing Attack In a sensor network some nodes are assigned special responsibilities Location based network protocols that rely on geographic forwarding expose the network to such attacks In these attacks the attacker passively listens to the network and learns the location of such nodes Then with the help of powerful mobile devices these nodes are attacked and brought down Defense -One approach is to encrypt the headers so as to hide the location of the important nodes

Shambhu Upadhyaya 23 Misdirection This is a more active form of attack where the messages are forwarded along wrong paths perhaps by fabricating malicious route advertisements One variant of this attack is the Internet Smurf attacks In sensor network an adversary can forge the address of a node and send route discovery messages to all the nodes Defense -This type of attack can be thwarted by using egress filtering -Using authentication of sender can also help

Shambhu Upadhyaya 24 Black Hole Attack Networks using distance vector routing protocols are susceptible to this attack It involves network nodes sending zero cost route advertisements to all its neighbors As these cost advertisements propagate all network traffic is directed towards this node which leads to intense resource contention in the neighboring nodes Hence this forms a sort of Black Hole in the network Defense -Allow only authorized nodes to exchange route info -Monitoring of nodes and node watchdogs -Test network connectivity by probing -Use message redundancy

Shambhu Upadhyaya 25 Transport Layer (DoS) This layer is responsible for maintaining end to end connections among the communicating entities. Sensor networks are vulnerable to the following attacks at this layer -Flooding Attacks protocols maintaining state at either end of the connection by causing memory exhaustion -De-synchronization This involves disrupting existing connections among the nodes by desynchronizing their transmissions

Shambhu Upadhyaya 26 Flooding Attack This attack is similar to the TCP SYN attack where a node opens a large number of half open connections with another node to use up the resources Limiting the total number of connections prevents complete resource exhaustion but it also may prevent legitimate users from accessing the node Defense -This type of attack can be prevented by the use of client puzzles -The puzzles are computationally expensive and hence serve as a deterrent

Shambhu Upadhyaya 27 De-synchronization This attack is used to disrupt existing connection by causing them to go out of synchronization This involves repeatedly sending forged messages to both of the communicating parties with various flags like Seq, Control flags set so that the nodes go out of synchronization If the attacker can maintain proper timing then it can prevent both the nodes from exchanging any useful information Defense -Use message authentication for control packets

Shambhu Upadhyaya 28 Attacks and Defenses

Shambhu Upadhyaya 29 Attacks on Improved MAC Protocols in Sensor Networks Adaptive Rate Control Protocol -Developed to improve MAC layer performance but lends itself vulnerable to DoS attacks Real Time Location Based Protocols (RAP) -Uses a novel velocity monotonic scheduling (VMS) policy but adversary can exploit this feature

Shambhu Upadhyaya 30 Adaptive Rate Control Protocol Random delays for transmissions Back off that shifts an application’s periodicity phase Minimization of overhead in contention control mechanisms Passive adaptation of originating and route through admission control rates Anticipatory delay for avoiding multi-hop hidden-node problems

Shambhu Upadhyaya 31 Adaptive Rate Control Protocol All these features help in improving the efficiency of the protocol but still rely on co- operation among nodes The protocol also gives preference to route-through traffic by reducing the back- off for such packets by 50% This increases the probability of Flooding attacks

Shambhu Upadhyaya 32 Real Time Location Based Protocol (RAP) The VMS layer stamps packets with a desired velocity, calculated from the distance to travel and the end-to-end deadline The originator can compute the velocity statically or the network can re-compute it dynamically at each intermediate node, based on the distance left and the time taken so far Nodes schedule packet relay by giving higher priority to higher-velocity packets

Shambhu Upadhyaya 33 Real Time Location Based Protocol (RAP) An attacker can exploit the vulnerabilities in the RAP protocol by generating a large number of High Velocity packets. This can be achieved by -Making the deadlines short -Making the distance extraordinarily large This attack could succeed even if the network uses a location directory to detect out of network nodes

Shambhu Upadhyaya 34 Real Time Location Based Protocol (RAP) The malicious node can also cause the packets being routed from it to miss their deadlines by intentionally lowering the velocity Also the RAP Protocol uses a synchronized clock to compute the time frame for the packets. Hence this also forms a possible area of attack

Shambhu Upadhyaya 35 Conclusion Secure routing is vital to acceptance and use of sensor networks The current protocols lack the support and are inherently insecure Authentication and cryptography presents the first line of defense but is not enough Security in sensor networks is an open problem and requires much more work

Shambhu Upadhyaya 36 References Wood, A.D., and Stankovic, J.A., “Denial of Service in`Sensor Networks”, IEEE Computer, Oct 2002, pp Shi E. and A. Perrig, “Designing Secure Sensor Networks”, IEEE Wireless Communications, Dec A. Perrig, J. Stankovic and D. Wagner, “Security in Wireless Sensor Networks”, CACM, June 2004