Security in Sensor Networks

Slides:



Advertisements
Similar presentations
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Advertisements

Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
Introduction to Wireless Sensor Networks
Sensor Networks Tiny sensor nodes, typically wireless capable of data sensing, processing and communications. Deployment in inaccessible terrains or disaster.
Wireless Sensor Networks ‘WSN’
SENSOR NETWORKS ECE 654 Irene Ioannou. Sensor networks communication architecture.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Fault Tolerant Routing in Tri-Sector Wireless Cellular Mesh Networks Yasir Drabu and Hassan Peyravi Kent State University Kent, OH
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
Wireless sensor networks: a survey 周紹恩 指導教授 : 柯開維 1.
Security Issues In Sensor Networks By Priya Palanivelu.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Topics in Internet Research
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wireless Distributed Sensor Networks Special Thanks to: Jasvinder Singh Hitesh Nama.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
NAME: NASIRAHMADPROGRAM: B.S TELECOMSEMESTER: 7THREG#: SU/ PRESENTED TO: ENGR. GUL ZAMEEN KHANDATE: UNIVERSITY: SARHAD UNIVERSITY.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Protocols for Self-Organization of a Wireless Sensor Network K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie IEEE Personal Comm., Oct Presented.
Introduction to Wireless Sensor Networks
A Survey on Sensor Networks
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
1 Wireless sensor network Wireless sensor network: a survey LF.Akyildiz, W. Su, Y. Sankarasubramanisam, E. Cayirci Computer Network 38 (2002) Speaker:
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
A Survey on Sensor Networks Hussein Alzoubi Rami Alnamneh
Ad Hoc Network.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
We hope that it is more important to know where you are going than to get there quickly. SNU INC Lab. A Survey of Energy Efficient Network Protocols for.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Wireless Mesh Networks Myungchul Kim
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Overview of Sensor Networks. Outline Introduction Sensor networks communication architecture – –Design factors – –Protocol stack Physical, Data link,
Sensor Networks Jason Turbyfill 16 February 2005.
ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
2016/7/31 A Survey on Sensor Networks Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci Georgia Institute of Technology Report.
Wireless sensor networks: a survey
Protocols for Wireless Sensor Networks
Overview of Wireless Networks:
Wireless Sensor Network Architectures
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Securing Wireless Sensor Networks
A Survey on Routing Protocols for Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Sensor Networks Tiny sensor nodes, typically wireless capable of data sensing, processing and communications. Deployment in inaccessible terrains or disaster.
Presentation transcript:

Security in Sensor Networks Overview of wireless sensor network Security in Sensor Network

Sensor Node Consists of sensing, data processing and communicating component. Randomly deployed in inaccessible terrain. Processes sensed (raw) data and transmits it. Characteristics Rapid deployment Self-organization Fault tolerance

Wireless Sensor Berkeley Motes

Mica Motes Prototype Sensor developed by UC Berkley Processor 4 MHz Memory 128 Kb flash & 4 Kb RAM Radio 916 MHz and 40Kbits/sec Transmission range 100 feet Tiny OS operating system: small, open source and energy efficient

Sensor Node Deployment Sensors Deploy

Application of Sensor Network Battle ground surveillance Enemy movement Environmental monitoring Habitat monitoring Forrest fire monitoring Hospital Tracking system Tracking patients,drug administration

Sensor Network vs. Wireless ad-hoc network Number of sensor nodes is much higher than nodes in ad hoc network. Sensor nodes are densely deployed. Topology changes frequently. Sensor nodes mainly use broadcasts as opposed to point-to-point used by ad hoc network. Sensor nodes have limited power, computational capacities and memory. No global addressing scheme for sensor nodes

Sensor node deployment Sink Sensor Network Internet & Satellite Task manager Node

Design Issues Fault tolerance Scalability Production Cost Hardware Constraints Network Topology Environment Transmission media Power consumption

Protocol Stack Application Transport Network Data Link Physical T A S M N G E P L M O B I L T Y A N G E P P O W E R M A N G T L Application Transport Network Data Link Physical

Dissection of Protocol Physical Layer Frequency selection, carried frequency generation, signal detection, modulation & data encryption (not always). Data Link Layer Multiplexing data streams, data frame detection, medium access and error control. MAC protocol in wireless multi-hop self-organizing sensor network must Creation of network infrastructure Efficiently share communication resources

Existing MAC protocols Cellular system Nodes only single hop away from nearest base station. MAC layer provides high QoS and bandwidth efficiency. Power efficiency not an issue. Bluetooth & mobile ad hoc network ( MANET ) Closest peer to sensor network. MAC protocol forms the network and maintains mobility. Primary goal is providing high QoS in face of mobility. Sensor network Much larger nodes with transmission power ( ~0dBm ) Radio range is much less. Topology changes more frequent. Primary importance on power conservation renders cellular and MANET useless.

MAC for sensor Self organizing medium access control for sensor networks (SMACS) and Eavesdrop-and-Register (EAR) algorithm SMACS is a distributed protocol which achieves network startup by neighbor discovery and channel assignment. EAR protocol attempts to offer continuous service to nodes under mobile and static conditions. CSMA based Medium Access Traditional protocol is ineffective because of the assumption that traffic is stochastically distributed. MAC protocol for sensor network should support periodic traffic. Hybrid TDMA/FDMA based TDMA dedicates full bandwidth while FDMA allocates minimum Optimum number of channels is calculated for lowest power consumption.

MAC for sensors (Cont…) Error control 2 different modes Forward Error Control (FEC) Automatic Repeat Request (ARQ) Both unsuitable for overhead (decoding complexity for FEC and retransmissions for ARQ) Simple error control with low complexity encoding/decoding is desirable.

Research issues SMACS and EAR are effective for static sensor networks. Improvement required for extensive mobility. Determination of lower bounds on energy required for sensor network self-organization. Error control coding schemes. Power saving modes of operation. To prolong network activity nodes must enter into periods of reduced activity specially when running low on battery.

Network Layer Mainly concerned with routing traffic Power efficiency important consideration. Sensor network mainly data-centric. Ideal sensor network has attribute-based addressing and location awareness. Interconnecting with external network, command and control system and Internet. Data aggregation Solves overlap problem in data-centric routing. Method for combining the data coming from multiple sensor nodes into meaningful information.

Routing protocols Small Minimum Energy Communication Network Flooding Computes energy-efficient sub-network given a communication network. Maintains minimum energy property such that there is a minimum energy path in sub-graph for every pair of node. Flooding Each node broadcasts the data until maximum hops or destination reached. Not suitable because of implosion, overlap and resource blindness. Gossiping Here node randomly picks up a neighbor and forwards the packet. Avoids implosions but takes longer time to route the packet.

Routing Protocols (Cont…) Sensor protocol for information via negotiation (SPIN) Addresses deficiency of flooding by negotiation and resource adaptation. Based on data-centric routing where sensor nodes broadcast an advertisement for available data and waits for request from interested nodes. Sequential Assignment Routing (SAR) Creates multiple trees such that root is one hop away from sink. Each tree grows outwards avoiding nodes with low QoS and energy reserves. Nodes belong to multiple trees and selects one tree to relay information back to sink based on 2 parameters and priority level of the packet. Two parameters associated with each path Energy resource Additive QoS metric

Routing Protocols (Cont…) Low-Energy Adaptive Clustering Hierarchy Minimizes energy dissipation Two phases: Setup Randomly selects clusterheads which communicates with sink. Clusterheads broadcast their address and sensor nodes pickup clusterheads based on signal strength of clusterheads. Steady Begin sensing and transmitting data Clusterheads do data aggregation After sometime in this phase the network goes back in setup phase.

Routing Protocols (Cont…) Directed Diffusion Sink sends out interest ( task description ) to all sensor. Node stores interest entry which contains timestamp and several gradient fields. As interest propagates in network the gradient from source to sink is setup. Sink must refresh and reinforce the interest when it starts to receive data from the source.

Research Issue New improved protocol to address high topology changes and higher scalability.

Transport Layer Needed when the system is accessed through internet or external network. Clearly TCP is not suitable. Communication between user and sink can be done using TCP or UDP via internet or satellite Between sink and nodes can be done using UDP.

Research Issues Development of transport layer protocol considering the hardware constraints such as limited power & memory.

Application Layer Sensor Management Protocol Sysadmin can interact using SMP. Nodes have no global addressing and so SMP needs to access them using attribute based naming. SMP can be used to carry out tasks such as Introducing new rules to data aggregation. Exchanging data Moving sensors Turning sensor on and off. Authentication, key distribution and security in data communication. Reconfiguring the sensor nodes.

Research Issues Application layer protocol needs to be developed with basic functionalities of monitoring the sensor network and high level functions such as interest dissemination.

Dissection of Protocol (Cont…) Power management plane efficiently manages the power usage of sensor nodes. Mobility planes detects and registers the movement ..so remembers the route back to a user and keep track of neighbors. Task management plane balances and schedules the sensing task given to a specific region.

Why security? Protecting confidentiality,integrity and availability of communications. Conventional view of security from cryptography community: cryptographically unbreakable design in practical sense Vulnerable to sniffing due to broadcast nature of communication. Physical threat.

How is Security Different? Wireless Sensor networks have NO clear line of defense Each node is a host as well as a “router” Secure Network/service “infrastructure” has to be collaboratively established Wireless channel is easily accessible by both good citizens and attackers Resource Constraints - battery - cpu power - memory

Incomplete List of Challenges Resource-Efficient Secure Network Services Network Initialization, single/multihop neighbor discovery Multihop path establishment & Routing Supporting application services Cryptographic services Broadcast authentication Key management Security mechanisms for fundamental services Clock synchronization Secure location discovery and verification of claims Location privacy Secure aggregation and in-network processing Cluster formation/cluster head election

Sensor Node Constraints Battery Power Constraints Computational Energy Consumption Crypto algorithms Public key vs. Symmetric key Communications Energy Consumption Exchange of keys, certificates, etc. Per-message additions (padding, signatures, authentication tags)

Sensor Node Constraints (Cont…) Public Key Cryptography Slow 1000 times slower than symmetric encryption Hardware is complicated Energy consumption is high Processor Energy Consumption (mJ/Kb) RSA/E/V RSA/D/S AES MIPS R4000 0.81 16.7 0.00115 MC68328 42 840 0.0130

Related Work Security Aware Ad hoc Routing (SAR) SPINS Uses trust values of nodes to do secure routing Employ route discovery protocol where nodes with security metric equivalent to sender receiver participate. Based on Bell-La Confidentiality model. SPINS Comprises of SNEP & Mu-TESLA. SNEP provides confidentiality, integrity and freshness. Mu-TESLA provides authentication to data broadcasts. Each node shares a master key with base station and also a counter which is used as an input to RC5 to get encryption key. Mu-TESLA uses symmetric mechanisms with a delayed disclosure of keys achieving asymmetry in digital signature.

Related Work (Cont…) Key Management Problem Trusted server scheme Finding trusted server is difficult. Public key scheme Expensive and infeasible for sensors Key Pre-distribution schemes Loading keys into sensor prior to deployment. Two nodes should find a common key after deployment.

Key Pre-Distribution scheme Master key approach Memory efficient but low security Requires tamper resistant hardware. Pair-wise key approach (N-1) keys for each node Security perfect but memory is an issue. New nodes cannot be added.

Eschenauer-Gligor Scheme Key Pool S Each node randomly selects m keys A B C D E When |S| = 10,000, m=75 Pr (two nodes have a common key) = 0.50

Eschenauer-Gligor Scheme (Cont…) B A C

Conclusion The low cost,flexibility,fault tolerance,high sensing fidelity and rapid deployment makes way for new applications on remote sensing. Realization needs to satisfy the constraints such as scalability,topology changes, power consumption, environment etc. New wireless ad hoc networking techniques are required to overcome this contraints.