Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Presented by: Ivor Rodrigues Worcester Polytechnic Institute.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Authors: Chris Karlof and David Wagner
Security in Wireless Sensor Networks: Key Management Approaches
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
EKC Journal Paper Scouting A Presentation for the ResiliNets Group © 2008 Egemen Cetinkaya July 2008 Egemen Çetinkaya Department of Electrical Engineering.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of Califonia at Berkeley Paper review and.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Secure Routing in WSNs: Attacks & Countermeasures Chris Karlof & David Wagner, UC Berkeley 1 st IEEE International Workshop on Sensor Network Protocols.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
1 Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures Authors: Chris Karlof and David Wagner Presenter: Ivanka Todorova.
Chris Karlof, David Wagner Presented by Michael Putnam
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
Chris Karlof David Wagner University of Califonia at Berkeley
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Secure Routing in Wireless Sensor Networks. This Paper  One of the first to examine security on sensor networks prior work focused on wired and adhoc.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Key management in wireless sensor networks Kevin Wang.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Security Protocols In Sensor Networks. Introduction –Security in sensor networks is important to prevent unauthorized users from eavesdropping, obstructing.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Ubiquitous Networks WSN Routing Protocols Lynn Choi Korea University.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Chris Karlof and David Wagner University of California at Berkeley
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – C. Karlof and D. Wagner Dr. Xiuzhen Cheng Department of Computer Science The.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
By Mike McNett 20 Oct 2003 Computer Science Department University of Virginia Secure Routing in Sensor Networks: Attacks and Countermeasures (Authors:
Security in Wireless Sensor Networks by Toni Farley.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Mobile ad hoc networking: imperatives and challenges
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Wireless Sensor Networks (WSN’s) Security Lecture 13
Chris Karlof and David Wagner Presenters: Hyowon Lee & Yongbae Bang
Presentation transcript:

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Presented by: Ivor Rodrigues Worcester Polytechnic Institute

What is a Sensor network?  A heterogeneous system combining tiny sensors and actuators with general purpose computing elements.

Sensor Network  1 km  38 strong-motion seismometers in 17-story steel-frame Factor Building. 100 free-field seismometers in UCLA campus ground at 100-m spacing Mobicom 2002 Wireless Sensor Networks-Deborah Estrin

Sensors Passive Nodes: seismic, acoustic, infrared, strain, salinity, humidity, temperature, etc. Active sensors: radar, sonar –High energy, in contrast to passive elements Small in Size- IC Technology

Use of Sensor Networks? Wireless Communications and Computing: Interacting with the physical world Security and surveillance applications Monitoring of natural habitats Medical Sensors such as Body Id

This Paper  Propose threat models and security goals for secure routing in wireless sensor networks  Discuss the various kinds of attacks  Show how attacks against ad-hoc wireless networks and peer-peer networks can be adapted as powerful attacks against sensor networks.  Discuss counter measures and design considerations

Motivation  Security for Routing using Sensor Networks  Security is not considered as a top priority  So we see, why sensor networks are so prone to attacks.

Sensor network protocols and Possible Attacks

Requirements for Sensor Networks  Nodes and network  Central information processing Unit  Power  Memory  Synchronization, co-operabibility

Definitions  BS- Base Stations or Sinks  Nodes  Aggregate Points  Sources

Requirements for Sensor Networks  Power restrictions  Number of nodes required for deployment  Duty cycle depends on longevity  Data rate-Power relation  Security  Memory  Simplicity

Ad-hoc vs. WSN Multi-hop  Routing between any pair of nodes  Somewhat resource constrained Ad - hoc

Ad-hoc vs. WSN Routing Patterns  Many-to-One  One-to-Many  Local Extremely resource constrained Trust Relationships to prune redundant messages  In-network processing  Aggregation  Duplicate elimination WSN

Mica Mote 4 MHz 8-bit Atmel ATMEGA103 Processor  Memory  128KB Instruction Memory –4 KB RAM / 512KB flash memory  916 MHz radio –40 Kbps single channel  Range: few dozen meters  Power –12 mA in Tx mode  4.8 mA in Rx mode  5 µA in sleep mode  Batteries –2850 mA on 2 AA Image source:

Mote Class vs Laptop Class Attacker  Small  Less Powerful  Fewer Capabilities  Large  like laptops, highly powerful  Large capabilities

Outsider Attacker vs Insider Attacker  Less access  Does not include compromised nodes  Big threat  May or may not include compromised nodes

– Authentication Public key cryptography Too costly WSN can only afford symmetric key – Secure Routing Source routing / distance vector protocols Require too much node state, packet overhead Useful for fully connected networks, which WSN are not

– Controlling Misbehaving Nodes Punishment Ignore nodes that don’t forward packets Susceptible to blackmailers – Security protocols SNEP – provides confidentiality, authentication µTESLA – provides authenticated broadcast

Assumptions  Network Assumptions  Trust Requirements  Threat Models  Security Goals

Attacks on Sensor Network Routing  Spoofed, Altered or replayed routing information

Attacks on Sensor Network Routing- Selective forwarding

Attacks on Sensor Network Routing On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks-Edith C. H. Ngai,1 Jiangchuan Liu,2 and Michael R. Lyu1  Sinkhole Attack

Attacks on Sensor Network Routing  Sybil Attack

Attacks on Sensor Network Routing  Wormholes

Attacks on Sensor Network Routing  Hello Flood Attack

Attacks on Sensor Network Routing  Acknowledgment spoofing

Acknowledgment Spoofing  If a protocol uses link-layer acks, these acks can be forged, so that other nodes believe a weak link to be strong or dead nodes to be alive.  Packets sent along this route are essentially lost  Adversary has effected a selective forwarding attack

Hello flood attack  In a HELLO flood attack a malicious node can send, record or replay HELLO-messages with high transmission power.  It creates an illusion of being a neighbor to many nodes in the networks and can confuse the network routing badly.  Assumption that sender is within normal range  A laptop class attacker could trick all nodes in network into thinking it’s a parent/neighbor

Hello flood attack  End result can be a feeling of sinkhole, wormhole, selective forwarding symptoms.  Adversary is my neighbor  Result: Network is confused Neighbors either forwarding packets to the adversary Attack primarily on protocols that require sharing of information for topology maintenance or flow control.

Wormholes  The wormhole attack usually needs two malicious nodes.  The idea is to distort routing with the use of a low- latency out-of-bound channel to another part of the network where messages are replayed.  These can be used, for example, to create sinkholes and to exploit race conditions.  Useful in connection with selective forwarding, eavesdropping  Difficult to detect when used in conjunction with Sybil attack  Wormholes are difficult to detect.

Sybil Attack  The Sybil attack is targeted to undermine the distributed solutions that rely on multiple nodes cooperation or multiple routes. In a Sybil attack, the malicious node gathers several identities for posing as a group of many nodes instead of one. This attack is not relevant as a routing attack only, it can be used against any crypto-schemes that divide the trust between multiple parties. For example, to break a threshold crypto scheme, one needs several shares of the shared secret.

Sybil Attack  Affects geographic routing.  Sending multiple (fictitious) results to a parent  Sending data to more than one parent

Sinkhole Attack sinkhole  A malicious node uses the faults in a routing protocol to attract much traffic from a particular area, thus creating a sinkhole  Tricking users advertising a high-quality link  Use a laptop class node to fake a good route  Highly Attractive and susceptibility due to communication pattern.  Sinkholes are difficult to defend

Selective Forwarding  A malicious node can selectively drop only certain packets.  Especially effective if combined with an attack that gathers much of the traffic via the node, such as the sinkhole attack or acknowledgment spoofing.  The attack can be used to make a denial of service attack targeted to a particular node. If all packets are dropped, the attack is called a “black hole”.

Selective Forwarding  An Insider attacker included in the routing path An Outsider attacker causes collisions on an overheard flow.

Spoofed, Altered or replayed routing information  An unprotected ad hoc routing is vulnerable to these types of attacks, as every node acts as a router, and can therefore directly affect routing information.  Create routing loops  Extend or shorten service routes  Generate false error messages  Increase end-to-end latency

Attacks on Specific Sensor Network Protocols  TinyOS Beaconing  Directed diffusion  Geographic routing  Minimum cost forwarding  LEACH  Rumor routing  SPAN & GAF

TinyOS Beaconing  In TinyOS beaconing, any node can claim to be a base station. If routing updates are authenticated, a laptop attacker can still do a wormhole/sinkhole attack: Laptop attacker can also use a HELLO flood attack to the whole network: all nodes mark it as its parent, but their radio range will not reach it. Mote-class attackers can also create routing loops.

TinyOS Beaconing  Routing algorithm constructs a breadth first spanning tree rooted at the base station  The Nodes mark base station as its parent, then inform the base station that it is one of its children node.  Receiving node rebroadcasts beacon recursively  Threat Level: Orange

Directed diffusion Data Centric Sensor Node don’t need global identity Application Specific Traditional Networks perform wide variety of tasks. Sensor Networks are designed for specific task. Data aggregation & caching. Positive reinforcement increases the data rate of the responses while negative reinforcement decreases it.

Directed diffusion  Suppression  Cloning  Path Influence

Selective Forwarding  Worming and Sybiling on directed diffusion WSN's

GEAR and GPSR  GPSR: unbalanced energy consumption  GEAR: balanced energy consumption  GPSR: routing using same nodes around the perimeter of a void  GEAR: weighs the remaining energy and distance from the target  GPSR: Greedy routing to Base station  GEAR: distributed routing, energy and distance aware routing.  Construct a topology on demand using localized interactions and information without initiation of the base station

Geographical Attacks and Attackers  Forging fake nodes to try to plug itself into the data path.

Geographical Attacks and Attackers  GPSR.

Countermeasures  Sybil attack  Unique symmetric key  Needham- Schroeder  Restrict near neighbors of nodes by Base station

Countermeasures  Hello Flooding  Bi-directionality  Restricting the number of nodes by the base station

Countermeasures  Wormhole and sinkhole attacks  Use time and distance  Thus Geographic routing protocols like GPSR and GEAR work against such attacks  Traffic directed towards Base station and not elsewhere like sinkholes

Leveraging Global knowledge  Fixed number of nodes  Fixed topology.

Selective Forwarding  Messages routed over n disjoint paths protected from n compromised nodes Image Source:

Conclusions  The Authors state that for secure routing, networks should have security as the goal  Infiltrators can easily attack, modify or capture vulnerable nodes.  Limiting the number of nodes, using public/global/local key are some of the ways to counter being attacked by adversaries.

Few Observations  More insight on capturing packets of the air  Foes or Friends?  What happens when data is captured, copied and forwarded unnoticed?  Real issues not stated?  Real attacks not described, analyzed or observed

Few Observations  Paper was presented at IEEE Workshop Conference.  What happens if someone spoofs a legitimate node identity and paralyze it. What are the countermeasures. Can it be detectable  Should sensor networks provide security or is it their goal to be secure?

References  Securities in Sensor networks-Yang Xiao  Mobicom 2002 Wireless Sensor Networks-Deborah Estrin  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks-Edith C. H. Ngai Jiangchuan Liu, and Michael R. Lyu  The Sybil Attack – John Douceur (Microsoft) e