Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Authors: Chris Karlof and David Wagner
Security in Wireless Sensor Networks: Key Management Approaches
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Security in Wireless Sensor Networks Adrian Perrig, John Stankovic, and David Wagner.
EKC Journal Paper Scouting A Presentation for the ResiliNets Group © 2008 Egemen Cetinkaya July 2008 Egemen Çetinkaya Department of Electrical Engineering.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of Califonia at Berkeley Paper review and.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Secure Routing in WSNs: Attacks & Countermeasures Chris Karlof & David Wagner, UC Berkeley 1 st IEEE International Workshop on Sensor Network Protocols.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
1 Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures Authors: Chris Karlof and David Wagner Presenter: Ivanka Todorova.
Chris Karlof, David Wagner Presented by Michael Putnam
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
Chris Karlof David Wagner University of Califonia at Berkeley
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Secure Routing in Wireless Sensor Networks. This Paper  One of the first to examine security on sensor networks prior work focused on wired and adhoc.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Presented by: Ivor Rodrigues Worcester Polytechnic Institute.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Security in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof, David Wagner University of California at Berkeley
Security Protocols In Sensor Networks. Introduction –Security in sensor networks is important to prevent unauthorized users from eavesdropping, obstructing.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Wireless Sensor Networks. By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u..
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Chris Karlof and David Wagner University of California at Berkeley
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
1 Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks Asad Amir Pirzada and Chris McDonald.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – C. Karlof and D. Wagner Dr. Xiuzhen Cheng Department of Computer Science The.
By Mike McNett 20 Oct 2003 Computer Science Department University of Virginia Secure Routing in Sensor Networks: Attacks and Countermeasures (Authors:
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Wireless Sensor Networks (WSN’s) Security Lecture 13
Chris Karlof and David Wagner Presenters: Hyowon Lee & Yongbae Bang
An Overview of Security Issues in Sensor Network
Presentation transcript:

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003 2010-11-24 최훈규 (2008-20999)

Contents Introduction Background Attacks on sensor network routing Attacks on specific sensor network protocols Countermeasures Conclusion DIP2010F

Introduction Wireless Sensor Network (WSN) Application: monitoring disaster areas Sink Node Sensor Field Resource constraints Sensor Node DIP2010F

Example In-Network Processing network Aggregation Point 67° 64° 69° 71° 68° f (67°, …, 68°) Resource constraints Sensor Nodes DIP2010F

Background Sensor Network Sensor Node Base Station (aka. sink) Heterogeneous system consisting of tiny sensor nodes having some computing elements Sensor Node Limited in power, computational capacities, memory, and battery Base Station (aka. sink) Point of centralized control Gateway to another network, powerful data processing unit, or point of human interface More processing capability, memory & power Aggregation point Node at which the messages are processed before sending to base station DIP2010F

WSN vs. Ad-hoc Wireless Networks Similarity Support Multi-hop networking Differences Sensor : Supports Specialized communication patterns Many-to-One One-to-Many Local Communication Sensor nodes more resource constrained than Ad-hoc nodes Public key cryptography not feasible Higher level of trust relationship among sensor nodes In-network processing, aggregation, duplication elimination Duty cycle DIP2010F

Overview Current sensor routing protocols are not designed for security and be insecure, mostly optimized for the limited capabilities of the nodes Wireless sensor network (WSN) cannot depend on many of the resources available to traditional networks for security Analyze current protocols to find attacks and suggest countermeasures and design consideration The effective solution for secure routing is to design such sensor routing protocols with security in mind DIP2010F

Problem Statement Network Assumptions Trust Requirements Insecure Radio links Eavesdropping, injection and replay Malicious nodes collude to attack the system By purchasing or capturing them None tamper resistant Adversary can access all key material, data, and code stored on the captured node Trust Requirements Base stations are trustworthy Nodes (and aggregation points) may not necessarily be trustworthy DIP2010F

Problem Statement Threat Models Based on device capability Mote-class attacker Access to few sensor nodes Laptop-class attacker Access to more powerful devices More battery power, better CPU, sensitive antenna, powerful radio TX, etc Based on attacker type/location Outside attacks Attacker external to the network Inside attacks Authorized node in the network is malicious DIP2010F

Security Goal Integrity, authenticity, and confidentiality Guaranteed by link layer security mechanisms Availability Still must rely on the routing protocol In the presence of outsider adversaries Conceivable to achieve these goals In the presence of insider adversaries These goals are not fully attainable -> Graceful degradation Protection against the replay attack is not a security goal of a secure routing protocol Delegate it to the application layer DIP2010F

Attack Model Spoofed, altered, or replayed routing information Selective forwarding Sinkhole attacks Sybil attacks Wormholes attacks HELLO flood attacks Acknowledgement spoofing DIP2010F

Attack Model Spoofed, altered or replayed routing information May be used for loop construction, attracting or repelling traffic, extend or shorten source route Selective forwarding A malicious node behaves like a black hole Refuse to forward certain messengers, selective forwarding packets or simply drop them B A1 A3 A2 A4 DIP2010F

Attack Model Sinkhole attacks The Sybil Attack Wormholes Attacker creates metaphorical sinkhole by advertising for example high quality route to a base station Almost all traffic is directed to the fake sinkhole The Sybil Attack Forging of multiple identities - having a set of faulty entities represented through a larger set of identities. Sybil Attack undermines assumed mapping between identity to entity Wormholes Tunneling of messages over alternative low-latency links, e.g. confuse the routing protocol, create sinkholes. etc. Exploit routing race condition DIP2010F

Attack Model HELLO flood attack Acknowledgement spoofing An attacker sends or replays a routing protocol’s HELLO packets with more energy Acknowledgement spoofing Spoof link layer acknowledgement to trick other nodes to believe that a link or node is either dead or alive DIP2010F

Attacks on specific protocols TinyOS beaconing Directed diffusion Geographic routing DIP2010F

TinyOS beaconing Base station broadcast Route update(beacon) periodly, Nodes received the update and mark the base station as parent and broadcast it Relevent Attack mode Bogus routing information Selective forwarding Sinkholes Sybil Wormholes Hello floods DIP2010F

TinyOS beaconing Spoof information Bogus and replayed routing information (such like “I am base station”) send by an adversary can easily pollute the entire network DIP2010F

TinyOS beaconing Wormhole & sinkhole Combination Tunnel packets received in one place of the network and replay them in another place The attacker can have no key material. All it requires is two transceivers and one high quality out-of-band channel Unauthenticated route updates DIP2010F

TinyOS Beaconing Wormhole & sinkhole Combination Most packets will be routed to the wormhole The wormhole can drop packets directly (sinkhole) or more subtly selectively forward packets to avoid detection DIP2010F

Directed Diffusion Data and Application Specific Content based naming Interest distribution Interests are injected into the network from base station Interval specifies an event data rate Interest entry also maintains gradients Data flows from the source to the sink along the gradient Data propagation and reinforcement Reinforcement to single path delivery Multipath delivery with selective quality along different paths DIP2010F

Directed Diffusion Source Sink DIP2010F “In what direction is that lion in region Y moving?” interest Sink gradient reinforcement data DIP2010F

Directed Diffusion Relevant Attack Due to the robust nature of floodings, it may be difficult for an adversary to prevent interesting Replay of interest by the adversary Selective forwarding and data tampering Spoofing positive/negative reinforcements DIP2010F

Geographic Routing Two protocols Description GPSR (Greedy Perimeter Stateless Routing) GEAR (Geographic and Energy Aware Routing) Description Greedy forwarding routing each packet to the neighbor closest to the destination GEAR weighs the choice of the next hop by both remaining energy and distance from the target DIP2010F

Geographic Routing Relevant attack Sybil attack Bogus routing information DIP2010F

Countermeasures Secret shared key & Link layer encryption Prevents the majority of outsider attacks False routing information, Selective forwarding, Sinkhole attacks, Sybil attacks, ACK spoofing This does not prevent to tunnel or amplify legitimate message Wormhole attacks HELLO flood attacks By amplifying an overheard broadcast packet with sufficient power Every node shares a unique symmetric key with the base station DIP2010F

Countermeasures Wormhole and Sinkhole attacks Selective Forwarding These are very difficult to defend especially when used in combination Geographic routing protocol can be one solution Topology in geographic protocol is constructed using localized interaction Selective Forwarding Multipath routing can be used to counter these types of selective forwarding attacks Messages routed over n paths whose nodes are completely disjoint are completely protected against selective forwarding attacks involving at most n compromised nodes DIP2010F

Conclusion Link layer encryption and authentication, multipath routing, identity verification, bidirectional link verification and authenticated broadcast is important Cryptography is not enough for insiders and laptop-class adversaries, careful protocol design is needed as well DIP2010F