Sensor Network Security

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
A Survey of Secure Wireless Ad Hoc Routing
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Selective Forwarding Attack: Detecting Colluding Nodes in Wireless Mesh Networks Shankar Karuppayah National Advanced IPv6 Centre (NAv6) Universiti Sains.
Mehmet C. Vuran Vehbi C. Gungor Özgür B. Akan School of Electrical & Computer Engineering Georgia Institute of Technology Atlanta, GA {mcvuran,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
A Framework for Energy- Scalable Communication in High-Density Wireless Networks Telvis Calhoun Wireless Sensor Networks CSC Dr. Li 8/27/2008.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Cross-layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks IEEE INFOCOM 2008 Mehmet C. Vuran and Ian F.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Ad Hoc Network.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Security in Wireless Sensor Networks by Toni Farley.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Security of the Internet of Things: perspectives and challenges
DETECTION OF WORMHOLE ATTACK IN MANET
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
2016/7/31 A Survey on Sensor Networks Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci Georgia Institute of Technology Report.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME
ITIS 6010/8010 Wireless Network Security
An Overview of Security Issues in Sensor Network
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

Sensor Network Security Presenter Ahmed Galib Reza

Introduction Why wireless sensor networks (WSN)? Wireless sensor networks consist of a large number of such sensor nodes and are able to collect and disseminate data in areas. Sensor’s low cost has made wireless sensor network cost effective. Ordinary networks are unsuitable for environmental and/or strategic reasons [1]. Three different types of nodes used in WSN: Crossbow’s MICA2 [2], CSIRO’s FLECK [3] and Crossbow’s Imote [2].

Introduction (Contd.) Fig. 1: A typical wireless sensor network (WSN)

Applications of WSN Smart houses Smart farms Smart parking Smart hospitals Habitat monitoring Building and structure monitoring Distributed robotics Etc.

Obstacles to WSN WSN shares the common problems of the conventional network along with its own problems [4]. Very limited resources Limited memory and Storage space : A typical sensor has a 16 bit 8 Mhz CPU with 10K RAM, 48K Program Memory and 1M flash storage. Power limitation Unreliable communication media Unreliable Transfer : Packet-based routing of the sensor network is connectionless hence unreliable.

Obstacles to WSN (Contd.) Conflicts: Even if the channel is reliable, the communication may still be unreliable due to broadcast nature of WSN. Latency: Multi-hop routing, network congestion and node processing can lead to greater latency in the network. Unattended Operation: Exposure to Physical Attacks.

Obstacles to WSN (Contd.) Managed Remotely: Hard to detect physical tampering. No Central Management Point: Ideally a WSN should have no central management point. However, if the network is designed incorrectly it may lead to greater congestion.

Problems Identification WSN are more vulnerable to security breaches than traditional network due to: More physical access. Memory and energy limitation. Limitation of processing abilities. low coverage. Unreliable communication media. Broadcasting nature.

Security Goals of WSN Confidentiality [5] Integrity Authentication Availability

Goals of Security Solutions of WSN High computation Low memory Low storage Limited energy

Findings in Present Research Although considerable amount of researches have been done so far, yet solutions remain inadequate. Because: If low energy and memory consumption is achieved it compromises on the level of security and vice versa.

Layer Based Security Approach

Physical Layer The physical layer deals with the transmission of media between sending and receiving nodes, and includes the rate at which data is sent, the signal strength, and the frequency types. Jamming attacks are one of the common attacks on the physical layer. Ideally a frequency hopping spread spectrum (FHSS) is used in sensor networks. Wood et al. [6] propose a mapping protocol which builds a map of the jammed region to prioritize message delivery in the network in such a way as to overcome the jamming attacks.

Data Link Layer The data link layer does the error detection and correction, and the encoding of data. This link layer is vulnerable to jamming and DoS attacks. TinySec [7] introduces link layer encryption which depends on a key management scheme. However, an attacker with better energy efficiency can still launch a successful attack. Protocols like LMAC [8] have better anti-jamming properties which are viable countermeasure at this layer. Wood and Stankovic [9] suggest a number of solutions for detecting link layer attacks, such as collision detection techniques, modifying the MAC code to limit the rate of requests and using smaller frames for each packet.

Network Layer The network layer is responsible for routing of messages from node to node, node to cluster leader, cluster leader to cluster leader, cluster leaders to base station and vice versa. Possible attacks at this layer are: Spoofing, altering information, selective forwarding, sinkhole attacks, Sybil attacks, worm-holes Authors in Poovendram and Lazos [10] propose a solution of the problem addressed above based on graph theory. Yih-Chun and Johnson [11] packet leashes which add additional information to the packet to restrict the maximum distance a packet can travel in a given amount of time are proposed.

Related Work Jeffery et al. [12] proposes a light-weight security protocol that operates in the base station of sensor communication whereby the base station can detect and remove an aberrant node if it is compromised. This protocol does not specify any security measures in case of a passive attack on a node where an adversary is intercepting the communication. Zhu et al. [13] present LEAP, a security mechanism using a key management scheme based on a set of four keys for each sensor node which for security purposes restricts the impact of nodes in the immediate neighborhood of the compromised node.

Related Work (Contd.) Marti et al. [14] propose watchdog and path-rater tools to detect and mitigate routing behavior, whereby the watchdog detects a misbehaving node. However, weaknesses such as ambiguous collisions, limited transmission power, false misbehavior and collusions make this technique less effective. A security-enhanced version of AODV called Security- aware AODV (SAODV) is introduced by Yi et al. [15]. It is claimed that SAODV achieves a satisfactory performance-overhead trade-off. However, the fact that it is a metric-centric approach that relies on an user- defined, application-dependent parameter for evaluating trust levels, does not solve the fundamental security problem and leaves a lot of questions unanswered.

Reference [1] Akyildiz, I.F., Su, W., Sankarasubramaniam Y. and Cayirci, E. (2002) Wireless sensor networks: A survey. Computer Networks, 38 (4) March, pp. 393-422. [2] Crossbow Technologies Inc. (2004)Wireless sensor networks: getting started guide. [online] Available at http://www.xbow.com/Support/Support_pdf_files/MoteWorks_Getting_S tarted_Guide.pdf [Accessed 05 October 2009] [3] Corke, P., Sen, S., Sikka, P., Valencia, P. andWark, T. (2006) Wireless sensor and actuator networks. CSIRO, 2-year Progress Report: July 2004 – June 2006. [online] Available at http://www.csiro.gov.au/csiro/content/file/pfik.html [Accessed 05 October 2009] [4] Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, J.D. (2002) SPINS: security protocols for sensor networks. In Wireless Networks Journal (WINE), September 2002. [5] Carman, D.W., Krus, P.S. and Matt, B.J. Constraints and approaches for distributed sensor network security. Technical Report 00-010. Glenwood, Maryland, USA, NAI Labs, Network Associates, 2000.

Reference [6] Wood, A., Stankovic, J. and Son, S.H. (2003) A jammed-area mapping service for sensor networks. In Proceedings of the Real-Time Systems Symposium, December 3-5, Cancun, Mexico. [7] Karlof, C., Shastry, N. and Wagner, D. (2004) Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of SenSys’04, November 3-5, 2004, Baltimore, Maryland, USA. [8] Hoesel, L.V. and Havinga, P. (2005) A lightweight medium access protocol (LMAC) for wireless sensor networks: reducing preamble transmissions and transceiver state switches. In Proceedings of INSS, June 27-28, 2005, San Diego, California, USA. [9] Wood A. and Stankovic, J. (2002) Denial of service in sensor networks. IEEE Computer, October, pp. 54-62. [10] Poovendran, R. and Lazos, L. (2005) A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Journal on Wireless Networks.

Reference [11] Yih-Chun, H. and Johnson, D. (2006) Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications (JSAC) 24 (2), February. [13] Zhu, S., Setia, S. and Jajodia, S. (2003) LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communications Security (CCS '03), October 27-30 2003, Washington, DC. [14] Marti, S., Giuli, T. J., Lai, K. and Baker, M. (2000) Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000) August 6-11, 2000, Boston, USA. Boston, MA, ACM Press, pages 255-265. [15] Yi, S., Naldurg P. and Kravets R. (2001) Security aware ad hoc routing for wireless sensor networks. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ’01), October 4-5, Long Beach, California, USA ACM Press, pp. 299-302.