1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
TDMA based MAC protocol to assist in Wide area Sensor Network Deployment Nuwan Gajaweera.
Wireless Sensor Networks Craig Ulmer. Background: Sensor Networks n Array of Sensor Probes ( ) n Collect In-Situ Data about Environment n Wireless.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Queensland University of Technology CRICOS No J Mitigating Sandwich Attacks against a Secure Key Management in WSNs for PCS/SCADA Hani Alzaid, DongGook.
David B. Johnson Rice University Department of Computer Science DSR Status Update Monarch Project 55th.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Introduction to Wireless Sensor Networks. 2 Learning Objectives Understand the basics of Wireless Sensor Networks (WSNs) –Applications –Constraints.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
Generic Sensor Platform for Networked Sensors Haywood Ho.
Challenge: Securing Routing Protocols Adrian Perrig
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presenter: Sandeep Mapakshi.
Generic Sensor Platform for Networked Sensors Haywood Ho.
CS526 Wireless Sensor Networks Instructor: KD Kang.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
The Performance of a Wireless Sensor Network for Structural Health Monitoring Jeongyeup Paek, Nupur Kothari, Krishna Chintalapudi, Sumit Rangwala, Ramesh.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Wireless Sensor Networks
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Presented by : Poorya Ghafoorpoor Yazdi 2012_2013 Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern.
Software Solutions for Product Developers Copyright 2005 Software Technologies Group, Inc. All Rights Reserved. An Overview of ZigBee The Power of the.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Wave Relay: Multi-hop Wireless Ad hoc Network Baruch Awerbuch, David Holmer, Herbert Rubens {baruch dholmer Johns Hopkins University Department.
Intelligent Shipping Container Project IMPACT & INTEL.
DESIGN & IMPLEMENTATION OF SMALL SCALE WIRELESS SENSOR NETWORK
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Introduction to Wireless Sensor Networks
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Overview of Sensor Networks David Culler Deborah Estrin Mani Srivastava.
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presented By: Nitin Subramanian.
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Security in Wireless Sensor Networks by Toni Farley.
EmberNet – Wireless Networks for Industrial Systems Presented by Ryan Wu April 11, 2003 Some slides and figures courtesy EmberNet, Rob Poor and Cliff Bowman.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2,
Introduction to Wireless Sensor Networks
Thermal Detecting Wireless Sensor Network Presenters: Joseph Roberson, Gautam Ankala, and Jessica Curry Faculty Advisor: Dr. Linda Milor ECE 4007: Final.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
Wireless Sensor Networks
Distributed Algorithms for Mobile Sensor Networks
Securing Wireless Sensor Networks
Presentation transcript:

1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID

2 Overview Background. The Wormhole Attack on WSN. BANAID. Conclusion.

3 Sensor Networks Distributed network of wireless nodes that monitor the environment or other systems. Deployed in large numbers Nodes have limited battery life Nodes have low computational power Nodes have small data storage Background

4 Sensor Networks Thousands of small devices with sensors communicating wirelessly Base station s0s0 s1s1 A Background

5 WSN Application Civil structural monitoring Habitat/ecosystem monitoring Environmental monitoring Smart homes Chemical Detection Traffic/Vehicle Monitoring Human Health Monitoring Homeland Security Background

QUIZ What are the limited resources in WSN? 1. Energy, memory, and computation. 2. Energy, communication, and memory. 3. Computation, communication, and memory. Background

QUIZ WINNER IS… Who is it?

8 Overview Background. The Wormhole Attack on WSN. BANAID. Conclusion.

9 Routing Tree Adapted from Chris Karlof and David Wagner's WSNPA slides Wormhole Attack

10 Routing Adapted from Chris Karlof and David Wagner's WSNPA slides Wormhole Attack

11 Wormhole Attack Tunnel packets received in one place of the network and replay them in another place The attacker can have no key material. All it requires is two transceivers and one high quality out-of- band channel Adapted from Chris Karlof and David Wagner's WSNPA slides Wormhole Attack

12 Disrupted Routing Most packets will be routed to the wormhole The wormhole can drop packets or more subtly, selectively forward packets to avoid detection Adapted from Chris Karlof and David Wagner's WSNPA slides Wormhole Attack

13 Overview Background. The Wormhole Attack on WSN. BANAID. Conclusion.

14 BANAID BANAID is composed of: 7 Mica2 sensors. 2 Stargates. The topology is assumed to be fixed. Each sensor knows its neighbors. BANAID

15 BANAID Three programs have been written and installed: TOSBase program (sensor 5, and 6). Stargate program (stargate 1, and 2). Simple customized AODV program (sensor 1,2,3 and 4). BANAID

16 BANAID Timing mechanism is required to detect Wormhole attack [1]. The average transmission delay in each sensor is ≈45 msec (Td ≈ 45msec) [2]. BANAID

17 BANAID Delay on the real path: Ns * Td. 3 * Td. Delay on the fake path: Ns * Td. 2 * Td BANAID

18 Overview Background. The Wormhole Attack on WSN. BANAID. Conclusion.

19 Conclusion Wormhole attack is a significant danger to routing protocols WSN. BANAID implemented one of the Wormhole attack’s solutions for WSN which is Packet Leaches [1]. The destination is able to detect the fake packet if the difference in time stamp is < (Ns * Td) where Ns is the number of sensors/hops between source and destination in the real path.

QUIZ What is the function of TOSBase? 1. Initiates Wi-Fi connection 2. Exchange packets with other Mica2 3. Forwards packets received from radio antenna to serial port and vice versa. 4. Exchange routing information.

QUIZ WINNER IS… Who is it?

22 References [1] Hu, Y., Perrig, A., & Johnson, D.B. “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks,” Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), vol. 3, pp , IEEE, San Francisco, CA, April [2] Paek, J., Chintalapudi, K., & Govindan, R.“A Wireless Sensor Network for Structural Health Monitoring: Performance and Experience”2005. [3] Crossbow Technology, Inc., MPR/MIB Mote Hardware Users Manual, MIB_Series_Users_Manual.pdf MIB_Series_Users_Manual.pdf [4] Crossbow Technology, Inc., Stargate Developer’s Manual,

23 Thank you Questions?

24 Node Hardware Embedded Processor Transceiver Memory Sensors Battery Limited Lifetime 8-bit, 10 MHz Slow Computations 1Kbps - 1Mbps, Meters, 128KB-1MB Limited Storage BANAID

25 Mica2 [3] Extremely popular mote 8-bit Atmega128 micro- controller FSK radio TinyOS. Back BANAID

26 Stargate [4] 400 MHz processor. Linux. Wi-Fi compact flash card. MICA2 connector. Back BANAID