June 26-28. 2005All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Wireless Sensor Networks: Key Management Approaches
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Program Integrity Verification (PIV) in Wireless Sensor Networks (WSN) Based on Park and Shin 2005 presented by Therese Paul.
Michael Baswell WSN Security Wireless Ad Hoc Sensor Network Security Michael Baswell For CS591 S2007 5/7/20071.
Security in Wireless Sensor Networks Adrian Perrig, John Stankovic, and David Wagner.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Secure Routing in WSNs: Attacks & Countermeasures Chris Karlof & David Wagner, UC Berkeley 1 st IEEE International Workshop on Sensor Network Protocols.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Security Issues In Sensor Networks By Priya Palanivelu.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
1 CS 577 “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks” Chris Karlof, Naveen Sastry, David Wagner UC Berkeley Summary presented.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Key management in wireless sensor networks Kevin Wang.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
10/31/20051 Designing Secure Sensor Networks Paper Authors: Paper Authors: Elaine Shi and Adrian Perrig, Carnegie Mellon University Presenter: Matt Egyhazy.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Hai Yan Computer Science & Engineering University of Connecticut.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks – Chris Karlof, Naveen Sastry & David Wagner Dr. Xiuzhen Cheng Department of Computer.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
TRUST NSF Site Visit, Berkeley, March, 2007 Sensor Networks: Technology Transfer Stephen Wicker – Cornell University.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Chris Karlof and David Wagner University of California at Berkeley
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – C. Karlof and D. Wagner Dr. Xiuzhen Cheng Department of Computer Science The.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Security in Wireless Sensor Networks by Toni Farley.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Wireless Sensor Networks
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
An Overview of Security Issues in Sensor Network
Presentation transcript:

June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry

June 26-28, 2005 TRUST All Hands Meeting Overview  Sensor Networks  Motivation  Security Requirements  Limitations  Threat Models  Previous Work  Research Problems

June 26-28, 2005 TRUST All Hands Meeting Background on Sensor Network  Wireless networks consisting of a large number motes  self-organizing  highly integrated with changing environment and network  Highly Constrained resources  processing, storage, bandwidth, power  Facilitate large scale deployment  Health care monitoring  Surveillance  Traffic monitoring  Military application

June 26-28, 2005 TRUST All Hands Meeting Sensor Network Security  Design time security  Privacy of collected data  New research challenges arising from new applications

June 26-28, 2005 TRUST All Hands Meeting Basic Security Requirements  Confidentiality  Authentication  Integrity  Freshness  Secure Group Management  Availability

June 26-28, 2005 TRUST All Hands Meeting Limitations in Sensor Networks  Deployed in Hostile Environment  Vulnerability to physical capture  Random Topology  No prior knowledge of post-deployment topology  Limited Resources  Energy Restrictions  Limited Communication and Computational Power (10 KB RAM, 250 kbps data rate)  Storage Restrictions

June 26-28, 2005 TRUST All Hands Meeting Attacker Models for Sensor Networks  Mote-class Attacker  Controls a few ordinary sensor nodes  Laptop-class Attacker  Greater battery & processing power, memory, high-power radio transmitter, low-latency communication

June 26-28, 2005 TRUST All Hands Meeting Threat Models in Sensor Networks  Outsider Attacks  Passive eavesdropping  Denial of service attacks  Replay attacks  Insider Attacks: compromised node  Node runs malicious code  The node has access to the secret keys and can participate in the authenticated communication.

June 26-28, 2005 TRUST All Hands Meeting Previous Work  Secure communication  SPINS: Security Protocols for Sensor Networks (Perrig)  TinySec: Link Layer encryption for tiny devices (Karlof)  Robust aggregation  SIA: Secure Information Aggregation for Sensor Networks (Przydatek)  Resilient Aggregation in Sensor Networks (Wagner)  Secure routing  Countermeasures for Sybil attack (Perrig)  Countermeasures for Worm hole attack (Y. Hu, Capkun)

June 26-28, 2005 TRUST All Hands Meeting Previous Work (cont.)  Secure location verification  Verification of Location Claims (N. Sastry)  Robust localization  Statistical Methods for Robust Localization (Z. Li)  SeRLoc (Lazos)  Key distribution protocols  Random Key Distribution Protocol (Perrig, Eschenauer)

June 26-28, 2005 TRUST All Hands Meeting Future Research  Clock synchronization  Secure location discovery & verification of location claims  Privacy  Location  Collected data  Secure aggregation & in-network processing  Cluster formation/Cluster-head election  Differentiating between node failure & security attack

June 26-28, 2005 TRUST All Hands Meeting Research at Berkeley  Time synchronization security  Attacks on time sync protocols  Designing secure time sync protocols  Secure Tracking  MCMCDA tracking  Statistical modeling for intrusion detection  Reputation system framework  Wireless mobile systems  Data security/privacy

June 26-28, 2005 TRUST All Hands Meeting Participants at Berkeley  Shankar Sastry  Doug Tygar  David Wagner  Chris Karlof  Tanya Roosta  Prabal Dutta  Jonathan Hui  Umesh Shankar  Deirdre Mulligan  Jack Lerner