Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security In Wireless Sensor Network CHIA-LING YANG CSCI 5235.

Similar presentations


Presentation on theme: "Security In Wireless Sensor Network CHIA-LING YANG CSCI 5235."— Presentation transcript:

1 Security In Wireless Sensor Network CHIA-LING YANG CSCI 5235

2 Abstract Wireless sensor networks are a device that can collect data and its size can range from a few hundred sensors to a few hundred thousand or possibly more [1]. As WSNs can be data collection, coordinated analysis, and automated event correlation [2], they can be applied to a wide range of purposes such as temperature monitoring, vehicle monitoring, animal monitoring…etc. These sensors, different from traditional networks, are deployed over our environment and it is more vulnerable to security attacks than wired networks, due to the broadcast communication [3]. Therefore, security issues become extremely important. In this paper, different kinds of threats in WSN are introduced and it indicates that how they can be avoided and protected by security services in WSN.

3 Outline Section I Introduction Section II Wireless Sensor Networks – What is WSN? – Where can it be used for? Section III Threats and Attacks in Wireless Sensor Networks – Passive Information Gathering – False Node insertion – Sybil Attack – Wormhole Attack Section IV Security Goals in Wireless Sensor Networks – Data Confidentiality – Data authentication – Data Integrity – Data Freshness – Robustness Section V Security Method: LEAP – Individual Key – Group Key – Cluster Key – Pairwise Shared Key Section VI Conclusion

4 Wireless Sensor Networks From: http://arri.uta.edu/acs/networks/WirelessSens orNetChap04.pdf

5 Threats and Attacks (1) Passive Information Gathering Physical location Message Use encryption to prevent it False Node insertion False data Inject False Messages Use authentication to prevent it

6 Threats and Attacks (2) Sybil Attack

7 Threats and Attacks (3) Wormhole Attack From: http://csie.npu.edu.tw/itaoi/6/B/6.pdf

8 Security Goals Data Confidentiality Data authentication Data Integrity Data Freshness Robustness

9 Security Method: LEAP Localized Encryption and Authentication Protocol Four types of keys – Individual key Each node has a unique key shared with the base station – Cluster key A node has the key shared with all of its neighboring nodes – Pairwise key A node has the key shared with its immediate neighbors. – Group key “This is a globally shared key that is used by the base station for encrypting messages that are broadcast to the whole group.”[3]

10 Reference [1] Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei, Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Springer Science + Business Media, LLC, 19 May 2006. [2] Adrian Perrig, “John Stankovic, and David Wagner, Security in Wireless Sensor Netoworks,” Communications of The ACM, Vol. 47 No. 6, pp. 53-57, June 2004. [3] Xiuli Ren, “Security Methods for Wireless Sensor Networks,” in International Conference on Mechatronics and Automation, 2006, pp. 1925-1930. [4] Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu, and Nael Abu-Ghazaleh, An application-Driven Perspective on Wireless Sensor Network Security, [5] F. L. LEWIS, Wireless Sensor Networks, http://arri.uta.edu/acs/networks/WirelessSensorNetChap04.pdf. http://arri.uta.edu/acs/networks/WirelessSensorNetChap04.pdf


Download ppt "Security In Wireless Sensor Network CHIA-LING YANG CSCI 5235."

Similar presentations


Ads by Google