Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Security In Wireless Sensor Network CHIA-LING YANG CSCI 5235.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University.
TinySec: Security for TinyOS Chris Karlof Naveen Sastry David Wagner January 15, 2003
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam.
Security Issues In Sensor Networks By Priya Palanivelu.
1 CS 577 “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks” Chris Karlof, Naveen Sastry, David Wagner UC Berkeley Summary presented.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry, David Wagner Presented by Paul Ruggieri.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORK Presented by Chetan Rana U08CO213.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Hai Yan Computer Science & Engineering University of Connecticut.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks – Chris Karlof, Naveen Sastry & David Wagner Dr. Xiuzhen Cheng Department of Computer.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Security in WSN Vinod Kulathumani West Virginia University.
Delay Aware, Reconfigurable Security for Embedded Systems Philip Brisk 2 Tammara Massey 1 Foad Dabiri 1 Majid Sarrafzadeh
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Sensor Network Security
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Security in Wireless Sensor Networks by Toni Farley.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Author: Na Ruan, Yoshiaki Hori Published in:
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
MiniSec: A Secure Sensor Network Communication Architecture Carnegie Mellon UniversityUniversity of Maryland at College Park Mark Luk, Ghita Mezzour, Adrian.
TinySec: Security for TinyOS
Security Issues in Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Security Of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Security of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
An Overview of Security Issues in Sensor Network
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015

Outlines…… ► Introduction ► WSN Security ► Why, different from traditional network ? ► Seven Categories of security issues ► Existing Research in WSN ► Spins ► TinySec ► TinyPK ► Motivation for Security at Link Layer 210/28/2015

Introduction: WSN ► A WSN is a network made of many small devices consisting of: ► Battery, ► Radio Communication, ► Microcontroller and sensors. Wireless Sensor Network 310/28/2015

Motes…. 4

Application of WSN… ► Body Area Sensor Network (BASN):  ECG Sensor  SpO2 & Motion sensor  Motion Sensor 510/28/2015

WSN Security ► Sensor networks are vulnerable to security attacks due to the broadcast nature of transmission ► Sensor nodes can be physically captured or destroyed ► Protecting confidentiality, integrity, and availability of the communications and computations 610/28/2015

Why Security different from traditional network ? ► Sensor Node Constraints: ► CPU power:  8-bit CPU ► Memory:  Program Storage(Flash) and Working Memory(RAM) ► Battery:  Computational Energy Consumption  Communications Energy Consumption 710/28/2015

Security issues are divided in Seven Categories as referenced paper Security issues are divided in Seven Categories as referenced paper ► Cryptography ► Key Management ► Attack Detections and prevention ► Secure Routing ► Secure Location ► Secure Data Fusion ► And other Security issues Reference : Xiangqian Chen, k. Makki, Kang Yen, Niki P.,”Sensor network Security: A Survey”, IEEE communication surveys & Tutorial, Vol. 11, No. 2, Second Quarter /28/2015

Existing Research: ► SPINS: Security Protocol for Sensor Network ► SENP:  Sensor-Network Encryption Protocol.  Secures point-to-point communication ►  TESLA:  Micro Timed Efficient Stream Loss-tolerant Authentication  Provides broadcast authentication Reference: Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks”, Proceedings of 7th Annual International Conference on Mobile Computing and Networks (MOBICOM 2001), Rome, Italy July /28/2015

Cont… ► Use simple symmetric encryption function (RC5) provides: ► Encryption & Decryption ► Message Authentication Code ► Pseudorandom number generation ► Hash Function ► TESLA : efficient source authentication in multicast for wired networks. ► µTESLA: authentication in broadcast for WSNs. ►µ TESLA removes or adapts the expensive features of TESLA 1010/28/2015

TinySec….. ► Light weight and efficient generic link layer security package. ► Developers can easily integrate into sensor network applications. ► A research platform that is easily extensible and has been incorporated into higher level protocols. Reference: Chris Karlof, Naveen Sastry, David Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November /28/2015

TinySec-Design ► Two Security Options  Authentication Encryption (Tinysec-AE)  Authentication only (Tinysec-Au) ► Encryption :  Specifying the IV format  Selecting an encryption Scheme( CBC) 1210/28/2015

TinyPK ► In order to make TinyPK practical, protocol require only public key operations on the sensor. ► TinyPK is based on RSA cryptosystem. ► TinyPK requires a Certificate Authority. ► Any external party that wishes to interact with the node also requires its own Public/private key 1310/28/2015 Reference: TinyPK: Securing Sensor Networks with Public Key Technology”, R. Watro et al., ACM SASN, October 2004.

Motivation for Link Layer Security ► End-End security Mechanisms : Suitable only for conventional networks using end-end communications where intermediate routers only need to view the message headers. ► BUT, in Sensor networks In-network processing is done to avoid redundant messages-Requires intermediate nodes to have access to whole message packets and just not the headers as in conventional networks. 10/28/201514

Cont… ► Why end-end security mechanisms not suitable for sensor networks? ► If message integrity checked only at the destination, the networks may route packets injected by an adversary many hops before they are detected. This will waste precious energy. ► A link layer security mechanism can detect unauthorized packets when they are first injected onto the network. 10/28/201515

Next Plan…. ► Discuss more about related topic. ► Discuss Problems in existing research. 10/28/ Any Question ?