Download presentation
Presentation is loading. Please wait.
Published bySharon Morgan Modified over 9 years ago
1
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1
2
Outline Overview and background Statement of routing security problem Attacks on sensor network routing Attack on specific sensor network protocol Countermeasure 5/11/2015Kent State University2
3
Overview and Background Current Routing Protocol Goal: Low Energy Robust Scalable Low Latency Small Footprint So for Wireless Sensor Network: Current routing protocol not designed for security & be insecure Unlike traditional network, they can’t depend on many available resources for security Goal: to design sensor routing protocol with security in mind 5/11/2015Kent State University3
4
Problem Statement Assumption about underlying network Radio link, sensor node and MAC layer are not secured and easily tampered Base stations and aggregation points can be trusted to some extend Different threat models Mote class Vs Laptop class Inside Vs Outside Security goals in this settings Reliable delivery of messenger in conventional network Sensor network need in-network processing Graceful degradation Confidentiality Protection against Reply of data packet should be handle by higher level 5/11/2015Kent State University4
5
Attack model Spoofed, altered or replay routing information May be used for loop construction, attracting or repelling traffic, extend or shorten source route Selective forwarding Refuse to forward certain messengers, selective forwarding packets or simply drop them by trying to follow the path of least resistance and attempt to include itself on the actual data path flow Sinkhole attacks Attracting nearly all traffic from a particular area through a specific compromised node 5/11/2015Kent State University5
6
Attack model Sybil attacks Forging of multiple identities – having a set of faulty entities representing through a large set of identities. It undermines assumed mapping between identity to entity Wormhole attacks Tunneling of messages over alternative low – latency links like confuse the routing protocol, creates sinkhole Hello flood attacks An attacker sends or replays a routing protocol’s hello packets with more energy Acknowledgement spoofing Spoof link layer acknowledgement to trick other nodes to believe that link or node is either dead or alive 5/11/2015Kent State University6
7
General sensor routing protocol type Flooding Gradient Clustering Geographic Energy Aware 5/11/2015Kent State University7
8
Protocols used in sensor network TinyOS beaconing Directed diffusion Geographic routing Minimal cost forwarding Cluster – head – LEACH Rumor routing Energy conserving topology maintenance 5/11/2015Kent State University8
9
Attacks on specific protocols TinyOS beaconing: It constructs a breath first spanning tree rooted at base station. Periodically the base station broadcasts a route updates and mark the base station as parents and broadcast it. Relevant Attack mode: Bogus routing information Selective forwarding Sinkhole Wormholes Hello floods 5/11/2015Kent State University9
10
TinyOS beacon Spoof information Bogus and replayed routing information (such as “I am base station”) send by an adversary can easily pollute the entire network. 5/11/2015Kent State University10
11
TinyOS beacon Wormhole & Sinkhole Combination Tunnel packets received in one place of the network and replay them in another place The attacker can have no key material. All it requires is two transceivers and one high quality out-of-bound channel 5/11/2015Kent State University11
12
TinyOS beacon Wormhole & Sinkhole Combination Most packet will be routed to the wormhole The wormhole can drop packet directly (sinkhole) Or more subtly selectively forward packets to avoid detection 5/11/2015Kent State University12
13
TinyOS beacon Hello flood attack A Laptop class adversary that can retransmit a routing updates with enough power to be received by the entire network 5/11/2015Kent State University13
14
Direct Diffusion Relevant attack Suppression – by spoof negative reinforcement Cloning – by replay information with malicious listed as base station (send both) Path influence – by spoof positive or negative reinforcements and bogus data events Selective forwarding and data tampering – by above attack method to put the malicious node in the data flow Wormholes attack Sybil attack 5/11/2015Kent State University14
15
Geographic routing GEAR & GPSR Cost function depends on destination location and the neighbor nodes used to determine next hop It uses greedy geographic query routing technique Better than Directed Diffusion (e.g. flooding technique) It restrict broadcast within sampling region 5/11/2015Kent State University15
16
Geographic routing Possible attack Sybil attack Bogus routing information Selective forwarding No wormhole and sinkhole attack An adversary may present multiple identities to other nodes. The Sybil attack can disrupt geographic and multi-path routing protocols by being in more than one place at once and reducing diversity. From B-> C, now will go through B-> A3 ->C 5/11/2015Kent State University16
17
Geographic routing example 2 From B -> D, A forge a wrong information to claim B is in (2, 1), so C will send packets back to B which cause loop at last. 5/11/2015Kent State University17
18
Minimum cost forwarding It is an backoff – based cost field algorithm for efficiently forwarding packets from sensor nodes to base station Once the field is established the message, carrying dynamic cost information, flows along the minimum cost path in the cost field. Each intermediate node forwards the message only if it finds itself on the optimal path A = 110, will select B for this message. 5/11/2015Kent State University18
19
Minimum cost forwarding Possible attacks Sinkhole attack Mote – class adversary advertising cost zero anywhere in network Hello flood attack Bogus routing information Selective forwarding Wormholes 5/11/2015Kent State University19
20
LEACH It is termed as Low – Energy Adaptive Clustering Hierarchy. Randomized and self – configuration Low energy media access control Cluster-head collect data and perform processing then transmit to base station. Possible attack Hello floods: Cluster – head selection based on signal strength what means a powerful advertisement can make the malicious attack be cluster – head. Selective forwarding Sybil attack: Combined with hello floods if nodes try to randomly select cluster – head instead of strongest signal strength. 5/11/2015Kent State University20
21
Rumor Routing Designed for query/event ratios between query and event flooding Lower the energy cost of flooding 5/11/2015Kent State University21
22
Rumor routing Possible attack Bogus routing information Create tendrils by FWD copies of agent Send them as long as possible (TTL) Selective forwarding Sinkholes Sybil Wormholes 5/11/2015Kent State University22
23
Energy conserving topology maintenance GAF SPAN Physical space is divided into equal virtual size squares, where nodes know its location and nodes with a square are equivalent Identifies nodes for routing based on location information Dense node deployment hence turn off unnecessary nodes ( like sleep, discovery or active state) Each grid square has one active node Nodes are ranked with respect to current state & expected lifetime An energy – efficient coordination algorism for topology maintenance Backbone for routing fidelity is build by coordinators A node become eligible to be coordinate if two of its neighbors can’t reach other directly or via one or two coordinators Traffic only routed by coordinator Random back off for delay coordinator announcement Hello messenger being broadcasted periodically 5/11/2015Kent State University23
24
Energy conserving topology maintenance GAF SPAN Possible attack Bogus routing: Broadcasting high ranking discovery messages, then they can use some selective forwarding attack Sybil & Hello flood: Target individual grids by a high ranking discovery messages with a non – existent node, frequently advertisements can disable the whole network by making most node sleep Possible attack Hello floods: Broadcast n Hello messages with fake coordinator and neighbors which will prevent nodes from becoming coordinators when they should, then they can use some selective forwarding attack 5/11/2015Kent State University24
25
Summary of attacks 5/11/2015Kent State University25
26
Countermeasures Selective Forwarding can be limited by implementing multipath and probabilistic routing. Outsider attack like Bogus routing information, Sybil, Sinkholes can be prevented by implementing key management at the link layer. Insider attack like HELLO floods can be prevented by establishing link keys with the trusted base station which will verifies bidirectional. Authenticated broadcast and flooding are important primitives. Cluster-based protocols and overlays can reduce attack for the nodes closer to base station 5/11/2015Kent State University26
27
Attacks difficult to defend Wormhole are difficult to defend. This type of attack is done by mainly laptop-class both from inside and outside. To some extend geographic and clustering based protocol defend against this attack. 5/11/2015Kent State University27
28
Conclusion Link layer encryption and authentication, multipath routing, identity verification, bidirectional link verifies and authenticated broadcast is important. Cryptography is not enough for insider and laptop-class adversaries, careful protocol design is needed as well 5/11/2015Kent State University28
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.