DOS Attacks in Wireless Sensor Networks By Eric Bartocci & Justin Matthews.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Security In Wireless Sensor Network CHIA-LING YANG CSCI 5235.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Security Issues in Wireless Sensor Networks -Ninad Naik.
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
Denial of Service in Sensor Networks Szymon Olesiak.
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
THreshold based Energy-efficient FAtigue MEasurment for Wireless Body Area Sensor Networks using Multiple Sinks By : Sana Akram.
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Wireless Sensor Network Security Anuj Nagar CS 590.
Security in Wireless Sensor Networks
Networked Software Systems Laboratory Department of Electrical Engineering Technion The Internet communication speed is not as fast as we would like it.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
1 of 22 Markov Modeling of Fault-Tolerant Wireless Sensor Networks Arslan Munir and Ann Gordon-Ross + Department of Electrical and Computer Engineering.
Wireless Sensor Networks Self-Healing Professor Jack Stankovic University of Virginia 2005.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
WiCop: Engineering WiFi Temporal White-Space for Safe Operations of Wireless Body Area Networks in Medical Applications Yufei Wang, Qixin Wang, Zheng Zeng,
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
WP4 deliverable Critical Infrastructure Protection: Attack Prevention Solutions and Attacks.
Tufts University. EE194-WIR Wireless Sensor Networks. April 21, 2005 Increased QoS through a Degraded Channel using a Diverse, Cross-Layered Protocol Elliot.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
IntelliSense.io Beyond the hype - Real World Applications / Solutions of Internet of Things.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Multipath Routing for Wireless Sensor Networks: a Hybrid between Source Routing and Diffusion Techniques Mohamed Ebada Systems Science Program University.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Wireless Sensor Network (WSN). WSN - Basic Concept WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively.
Secure In-Network Aggregation for Wireless Sensor Networks
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
A Reliable and Efficient MAC Protocol for Underwater Acoustic Sensor Networks Junjie Xiong, Michael R. Lyu, and Kam-Wing Ng International Journal of Distributed.
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
A. Hangan, L. Vacariu, O. Cret, H. Hedesiu Technical University of Cluj-Napoca A Prototype for the Remote Monitoring of Water Parameters.
Cooperative Robotics and Sensor Networks Isaac Rieksts My web site
A Critical Analysis on the Security of IoTs
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Wireless sensor and actor networks: research challenges
A Web-based Console for Controlling a Wireless Sensor network Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew.
Overview of Network Security. Network Security2 New Challenges 1.Security does not focus on a “product” only; it is a process and focuses on the whole.
Wireless Sensor Network Layout Stefka Fidanova 1, Pencho Marinov 1 Enrique Alba 2 1 Institute of Information and Communication Technologies – BAS 2 University.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Wireless Body Area Networks (WBAN) 6137-Algorithms in Network Theory 2013.
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Prepared by: Ameer Sameer Hamood University of Babylon - Iraq Information.
Projekt „ESSNBS“ Niš, November 4 th – 7 th, DAAD Wireless Measurement System for Environmental Monitoring and Control MM. Srbinovska, V. Dimcev,
Security of the Internet of Things: perspectives and challenges
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
In the name of God.
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Wireless Sensor Network (WSN)
Algorithms for Big Data Delivery over the Internet of Things
Security Issues in Wireless Sensor Networks
Early Warning Flood Detection
Mobile ad hoc networking: imperatives and challenges
Game Theory Solutions 1 Find the saddle point for the game having the following payoff table. Use the minimax criterion to find the best strategy for.
An Overview of Security Issues in Sensor Network
Presentation transcript:

DOS Attacks in Wireless Sensor Networks By Eric Bartocci & Justin Matthews

Table of Contents Wireless Sensor Networks Denial of Service (DoS) Attacks Solutions Game Theory Approach Conclusion

Wireless Sensor Networks WSN spatially distributed Autonomous sensors Monitors environmental conditions Monitors physical conditions Passes information back to a base station

Denial of Service Attacks Most common attack implemented on WSN’s Can be implemented on bottom 4 layers of the OSI model with this network topology. DOS attacks focus on stopping a service all together Can be linked to Jamming, power outage, and even loss of data confidentiality

Game Theory Approach Theory where 2 players are playing for the same goal. Can be applied to resolve DOS attacks Maximize payoff of nodes Minimize payoff of attackers

Jamming Model Wood, A. D. and Stankovic, J. A., “Denial of Service in Sensor Networks”

Solutions Wood, A. D. and Stankovic, J. A., “Denial of Service in Sensor Networks”

Conclusion WSN is a growing field and very interesting Many ways this topology can be compromised(so security will be important) Coexisting with attacks is crucial for a WSN The applications of WSN are vast

References Al-Sakib K. P., Hyung-Woo L., Choong S. H., Security in Wireless Sensor Networks: Issues and Challenges, Feb 20, Shigen, S., Guangxue, Y., Qiying, C., & Fei, Y. (2011). A Survey of Game Theory in Wireless Sensor Networks Security. Journal Of Networks. Wood, A. D. and Stankovic, J. A., “Denial of Service in Sensor Networks”, Computer, Volume 35, Issue 10, Oct pp Yenumula B R., Security Issues in Wireless Sensor Networks,

Questions?