Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
Congestion Control and Fairness for Many-to-One Routing in Sensor Networks Cheng Tien Ee Ruzena Bajcsy Motivation Congestion Control Background Simulation.
Surge: A Network Analysis Tool Crossbow Technology.
Routing Security in Ad Hoc Networks
Intrusion Detection in Wireless Sensor Networks Group Meeting Spring 2005 Presented by Edith Ngai.
WSN Simulation Template for OMNeT++
2008/7/3 NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and.
Ivy Equipment Inventory System Jaein Jeong Barbara Hohlt Kris Pister.
A Scalable Approach for Reliable Downstream Data Delivery in Wireless Sensor Networks Seung-Jong Park, Ramanuja Vedantham, Raghupathy Sivakumar and Lan.
Secure Routing in Wireless Sensor Networks. This Paper  One of the first to examine security on sensor networks prior work focused on wired and adhoc.
Power saving technique for multi-hop ad hoc wireless networks.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
David Rogers, Stu Andrzejewski, Kelly Desmond, Brad Garrod.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Project Introduction 이 상 신 Korea Electronics Technology Institute.
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Wireless Sensor Networks. By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u..
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Chris Karlof and David Wagner University of California at Berkeley
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
Simulation of the OLSRv2 Protocol First Report Presentation.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Implementation of Collection Tree Protocol in QualNet
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
Ad Hoc Network.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
A Web-based Console for Controlling a Wireless Sensor network Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Mote Clusters Thanos Stathopoulos CENS Systems Lab Joint work with Ben Greenstein, Lewis Girod, Mohammad Rahimi, Tom Schoellhammer, Ning Xu, Richard Guy.
Thermal Detecting Wireless Sensor Network Presenters: Joseph Roberson, Gautam Ankala, and Jessica Curry Faculty Advisor: Dr. Linda Milor ECE 4007: Final.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
IHP: Innovation for High Performance Microelectronics
A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks Name: Patrick Zwane University: National Taipei University of.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Wireless Sensor Networks (WSN’s) Security Lecture 13
An Overview of Security Issues in Sensor Network
Presentation transcript:

Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad

Outline Background Network Threats and Wireless Attacks Tool Architecture Overview Implemented Attacks and Actions Conclusion Reference

Background Network Threats and Wireless Attacks Tool Architecture Overview Implemented Attacks and Actions Conclusion Reference

Background Wireless sensor network – Monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Equip with a radio transceiver, a microcontroller, and a battery.

Background Network Threats and Wireless Attacks Tool Architecture Overview Implemented Attacks and Actions Conclusion Reference

Network Threats and Wireless Attacks Inadequate physical protection – Energy and Cost Through the air – Easy to be intercepted Wireless Attack – Interception – Alteration – Disruption – Injection

Background Network Threats and Wireless Attacks Tool Architecture Overview Implemented Attacks and Actions Conclusion Reference

Tool Architecture Overview Three Main Conceptual Modules: – Network Sniffer: Monitoring and logging of radio packets. – Network Attack Tool: Provides a number of actions for attack. – Network Visualization: Display topology 、 Traffic 、 Nodes State and Status of attack.

Tool Architecture Overview

Network Sniffer (1/3) The network sniffer relies on packets that are overheard in a sensor's node neighborhood. It captures them and logs them for later analysis. Components: – Local Packet Monitoring – Packet Storage – Packet Description Database

Network Sniffer (2/3) Local Packet Monitoring: – To gather audit data Packet Storage: – Logging and analysis – Construct graph of neighborhood topology Packet Description Database – User can specify msg content as C structs which automatically added to DB

Network Sniffer (3/3) Network Attack Tool Analysis & Graph

Network Attack Tool (1/3) Provide a number of actions for compromising the sensor network's security profile. Components: – Data Stream Framework – Attack Launcher

Network Attack Tool (2/3) Data Stream Framework: – Identified info as its configuration record – Basis msg for Attack Launcher Attack Launcher: – 6 types of attacks: Data Replay ‚Malicious Code Injection ƒSinkhole Attack „Selective Forwarding …Flooding †Program Image Dissemination & Ping Operation

Network Attack Tool (3/3) Network Sniffer

Background Network Threats and Wireless Attacks Tool Architecture Overview Implemented Attacks and Actions Conclusion Reference

Implemented Attacks and Actions (1/3) Data Replay – Msg are stored into the Packet Description Database. Malicious Code Injection – Buffer overflow – Create self-replicating worm and broadcast it. Selective Forwarding

Implemented Attacks and Actions (2/3) Sinkhole Attack – Use link quality (LQ) calculations as the routing cost metric to build the routing tree towards the base station. – Broadcast a beacon message. – Advertise a very good LQ in order for all neighboring nodes to choose the tools' attached node as their parent. Flooding – Send HELLO messages with high transmission power. Send Msg

Implemented Attacks and Actions (2/3) Program Image Dissemination & Ping Operation – The ping action sends a message to a specific sensor node to request about its state, its currently executing program image and what other images are stored in that node. – Program Image dissemination is a fundamental service in sensor networks that relies upon reliable broadcast of image updates.

Background Network Threats and Wireless Attacks Tool Architecture Overview Implemented Attacks and Actions Conclusion Reference

Conclusion To reveal the vulnerabilities of such networks To study the effects of severe attacks on the network itself To motivate a better design of security protocols.

Reference db.com/download_pdf/ _network