Denial of Service in Sensor Networks Anthony D. Wood John A. Stanovich Presenter: Todd Fielder.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Chris Karlof and David Wagner
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
TYPES OF NETWORK.
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
HIERARCHY REFERENCING TIME SYNCHRONIZATION PROTOCOL Prepared by : Sunny Kr. Lohani, Roll – 16 Sem – 7, Dept. of Comp. Sc. & Engg.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
A Survey of Secure Wireless Ad Hoc Routing
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
1 On Handling QoS Traffic in Wireless Sensor Networks 吳勇慶.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
A Transmission Control Scheme for Media Access in Sensor Networks Presented by Jianhua Shao.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
CS541 Advanced Networking 1 A Real-Time Communication Architecture for Wireless Sensor Networks Neil Tang 4/22/2009.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Shambhu Upadhyaya 1 Sensor Networks Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 21)
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Chapter 4: Managing LAN Traffic
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Security in Wireless Sensor Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Wireless Ad-Hoc Networks
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
Computer Networks with Internet Technology William Stallings
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
Denial-of-Service Attacks: Real Vulnerabilities & Practical Solutions Luat Vu Alexander Alexandrov.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Network Security Introduction
Security in Wireless Networks Mike Swift CSE b Summer 2003.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Jamming for good: a fresh approach to authentic communication in WSNs
An Overview of Security Issues in Sensor Network
Sensor Networks Security
Presentation transcript:

Denial of Service in Sensor Networks Anthony D. Wood John A. Stanovich Presenter: Todd Fielder

Denial of Service Any event that diminishes or eliminates a network’s capacity to perform it’s expected function. –Hardware failure –Software bugs –Resource exhaustion This article is primarily concerned with protocol or design level vulnerabilities.

Complications in Sensor Networks Harsh environments –Fault tolerant Must be resilient in the presence of failures Subverted nodes which are as powerful as network nodes Potentially more powerful computing capabilities at adversary –i.e. could be wired

Network Architecture A layered network architecture –Clean Division Increases robustness by –Clean Division Increases robustness by defining layer interactions and interfaces –Sensor Networks sacrifice robustness, cross layers, to increase performance Each layer vulnerable to different DOS attacks

Physical Layer Wireless communication due to large scale ad-hoc network Wired base station rare

Jamming Interference with the radio frequency the network is using. Easily detectable due to constant energy Defenses: –Spread Spectrum: frequency hopping based on a predetermined algorithm. Resource intensive –Jamming rarely affects entire network, route around affected area

Tampering Attacker can gain access to physical sensor and either analyze device to obtain sensitive information and/or replace sensor. –Obtain cryptographic keys –Reprogram Nodes Defenses: –Tamper proof physical packaging Node should react in fail-complete manner –Camouflage or hide nodes

Link Layer Provides channel arbitration for neighbor to neighbor communication Cooperative Schemes, such as carrier sense, are particularly vulnerable to DOS attacks.

Collision (corruption) Can disrupt an entire packet by introducing a collision in only small portion of packet –Requires only fractional portion of energy Causes heavy expenditure in energy by target (exponential backoff ) Defenses: –Error correcting codes Usually used for small errors (environmental or probabilistic) –Collision detection Still requires communication among nodes…not completely effective

Exhaustion Communicate in such a way so as to drain battery resources –If retransmission is repeated and collision induced near end of frame, nearby nodes would become exhausted of energy. –Self-Sacrificing node Interrogation – node continually sends RTS to attacker to solicit a CTS, thereby exhausting both nodes battery resources Defenses: –Rate-limiting Network ignores excessive requests without transmitting additional packets

Unfairness Intermittent application of previous attacks could degrade service of the network –Cause loss of real-time services Defenses: –Small Frame: Allows individual nodes to capture the channel for a small period of time

Network and Routing Layer Most nodes will serve as routers –Due to ad-hoc nature of network Causes additional complexities for protocol –Simple enough to scale to large networks –Robust enough to deal with failures several hops from source

Neglect and Greed Node-as-Router –Neglect: Does not forward other packets –Greed: Gives undue priority to own packets Difficult to detect Defenses: –Multiple routing paths –Redundant message transmission

Homing Passive adversary observes traffic to determine which nodes are critical to network function, then concentrates attack on that node Defenses: –Encrypt headers at each hop, to prevent source and/or destination from becoming discovered

Misdirection Forward Packets along wrong paths –Smurf: forge the victim’s address as the source of message, causing all responses to be sent to that address. Defenses: –Egress Filtering Verify source address and only route legitimate packets.

Black Holes Nodes advertise zero-cost routes to every other node, causing every other node to route in their direction. Defenses: –Easy to detect

Defenses Authorization –Only authorized nodes may exchange routing information Monitoring –Observe neighbors to ensure proper routing behavior Probing –Periodically send probes that cross the network’s diameter Redundancy –Duplicate messages across multiple paths protects against routing failures

Transport Layer Provides services for end-to-end communication –Tend to be simple to reduce overhead

Flooding Feasible in state protocols, an adversary sends many connection establishments to an adversary, who must keep these SYN request in a Queue, which eventually fills up Defenses: –Limit number of connections Prevents resource exhaustion Can still Deny Service to legitimate connections –Client Puzzles Requires clients to demonstrate resources they are willing to commit to the connectionby solving a puzzle distributed by the server

De-synchronization An existing connection is disrupted by an adversary repeatedly forging messages with incorrect timing data (seq. num, control flags) Defenses: –Authenticate each packet

Adaptive Rate Control Improvements to standard MAC protocols for Wireless Sensor Nets. –Random transmission delay – –Back off that shifts an application’s periodicity phase – –Minimization of overhead in contention control mechanisms – –Passive adaptation of originating and route through admission control rates – –Anticipatory delay for avoiding multi-hop hidden-node problems. Preference given to route through traffic in admission control protocol (back-off less at distant nodes). –Preserves networks investment in packets that have been forwarded many hops. Problem: Problem: High bandwidth packet streams generated by an adversary will receive preference during collisions. – –The network must not only bear the malicious traffic, it also gives preference to it.

Real-Time Location-Based Protocols (RAP) Real-time communication architecture Geographic forwarding with a velocity monotonic scheduling (VMS) policy. –Based on packet deadline and distance to travel. Problem: Problem: Adversary can inject messages with geographic destinations far away. – –Static Velocity: Intermediate nodes only need to make local forwarding decisions. –Dynamic Velocity: I –Dynamic Velocity: Intentionally lowering its velocity so that the packet misses its deadline. Solutions: – –Static Velocity: Use cryptographic keys to authenticate velocity –Dynamic Velocity: –Dynamic Velocity: Clock Synchronization to prioritize packets

Questions???