Security in Wireless Sensor Networks by Toni Farley.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
L0. Introduction Rocky K. C. Chang, January 2013.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Cryptography and Network Security Chapter 1
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Overview of Sensor Network Security Yang Liu Graduate student, University of Tennessee 2003 spring group seminar.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORK Presented by Chetan Rana U08CO213.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
1 Secure Ad-Hoc Network Eunjin Jung
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
ACM 511 Introduction to Computer Networks. Computer Networks.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
By Prateek Arora Security for Sensor Networks By: Prateek Arora.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Network Security Celia Li Computer Science and Engineering York University.
Author: Na Ruan, Yoshiaki Hori Published in:
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Presented by: Reut Barazani Limor Levy. Contents Introduction Digital signature broadcast message authentication TESLA broadcast message authentication.
Security of the Internet of Things: perspectives and challenges
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Security Issues in Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Security in SDR & cognitive radio
Introduction to Cryptography
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Security in Wide Area Networks
Presentation transcript:

Security in Wireless Sensor Networks by Toni Farley

Security Concerns ©Security Concerns Defined  Integrity - Ensure that information is accurate, complete, and has not been altered in any way.  Availability - Ensure that a system can accurately perform it’s intended purpose and is accessible to those who are authorized to use it.  Confidentiality - Ensure that information is only disclosed to those who are authorized to see it. Integrity Availability Confidentiality

Security Concerns  Authentication – Ensure correctness of claimed identity.  Authorization – Ensure permissions granted for actions performed by entity. Authentication Authorization ICA 3

Points of Security Concern ©System  System Integrity  Availability ©Source  Authentication  Authorization ©Data  Data Integrity  Confidentiality WSN DataSource

Threats ©Authentication  Man in the middle ©Data Integrity  Modification  Forgery  Deletion  Replay ©Confidentiality  Eavesdropping

Wireless Security ©Magnified Threats  Detectability – Ability to discover a wireless system  Theft of Service – Unauthorized use of wireless signal  Interception – Easy to capture signals transmitted through air ©Limited Resources  Low b/w  Low memory capacity  Slow CPU  Battery Power Limits

Current Solution: Encryption ©Symmetric (private key) encryption  Fixed keys cannot be changed when compromised  Dynamic keys require high cost key exchange protocol  Faster algorithms – computational overhead ©Asymmetric (public/private) key encryption  Data sent to many devices must be encrypted separately with each device’s public key ©Longer keys provide better security  Longer keys require more resources, which becomes problematic if many keys are needed

Current Solution: Encryption ©Pretty Good Privacy (PGP)  Uses session key to encrypt data, thus only need to encrypt data one time for multiple recipients  Uses public keys to encrypt session key, requires multiple smaller encryptions  Overhead is reduced, but still exists

Research: SPINS ©Security Protocols for Sensor Networks [1]  Securing Node/Base Station communications  Secure Network Encryption Protocol (SNEP) 4Secure channels for confidentiality 4Data integrity through authentication 4Data freshness through partial message ordering (weak) and total order with delay estimation (strong)  micro Timed, Efficient, Streaming, Loss-tolerant Authentication Protocol (μTESLA) 4Authentication through asymmetric authenticated broadcast

Research: Security for Sensor Networks ©Security for Sensor Networks [2]  Securing Node/Base Station communications  Broadcasts of end-to-end encrypted packets 4Authentication 4Integrity 4Confidentiality 4Replay  Base station looks for corrupted packets or long period of inactivity 4Mechanism for detecting “bad” behavior

Research: Secure Routing in WSN ©Security Routing in Wireless Sensor Networks: Attacks and Countermeasures [3]  Describes routing attacks 4Known attacks 4Invented attacks 4Protocol specific attacks  Describes countermeasures for each attack 4Encryption with globally shared key 4Unique key between each node & base station 4Neighbor authentication between nodes 4Authenticated broadcast techniques

Security Sources ©SANS Glossary of Terms Used in Security and Intrusion Detection, May ©MobileBook ©Andrew S. Tanenbaum, Computer Networks, Prentice Hall, ©Encyclopedia of Cryptography and Security, Kluwer, to be published in 2004.

Research References ©[1] SPINS: Security Protocols for Sensor Networks. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. In Seventh Annual ACM International Conference on Mobile Computing and Networks (Mobicom), ©[2] Jeffery Undercoffer, Sasikanth Avancha, Anupam Joshi, and John Pinkston, Security for Sensor Networks 2002 CADIP Research Symposium ©[3] Secure Routing in Sensor Networks: Attacks and Countermeasures, Chris Karlof and David Wagner, To appear in Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols.