Download presentation
Presentation is loading. Please wait.
Published byKory Rodgers Modified over 9 years ago
1
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015
2
Outlines…… ► Introduction ► WSN Security ► Why, different from traditional network ? ► Seven Categories of security issues ► Existing Research in WSN ► Spins ► TinySec ► TinyPK ► Motivation for Security at Link Layer 210/28/2015
3
Introduction: WSN ► A WSN is a network made of many small devices consisting of: ► Battery, ► Radio Communication, ► Microcontroller and sensors. Wireless Sensor Network 310/28/2015
4
Motes…. 4
5
Application of WSN… ► Body Area Sensor Network (BASN): ECG Sensor SpO2 & Motion sensor Motion Sensor 510/28/2015
6
WSN Security ► Sensor networks are vulnerable to security attacks due to the broadcast nature of transmission ► Sensor nodes can be physically captured or destroyed ► Protecting confidentiality, integrity, and availability of the communications and computations 610/28/2015
7
Why Security different from traditional network ? ► Sensor Node Constraints: ► CPU power: 8-bit CPU ► Memory: Program Storage(Flash) and Working Memory(RAM) ► Battery: Computational Energy Consumption Communications Energy Consumption 710/28/2015
8
Security issues are divided in Seven Categories as referenced paper Security issues are divided in Seven Categories as referenced paper ► Cryptography ► Key Management ► Attack Detections and prevention ► Secure Routing ► Secure Location ► Secure Data Fusion ► And other Security issues Reference : Xiangqian Chen, k. Makki, Kang Yen, Niki P.,”Sensor network Security: A Survey”, IEEE communication surveys & Tutorial, Vol. 11, No. 2, Second Quarter 2009. 810/28/2015
9
Existing Research: ► SPINS: Security Protocol for Sensor Network ► SENP: Sensor-Network Encryption Protocol. Secures point-to-point communication ► TESLA: Micro Timed Efficient Stream Loss-tolerant Authentication Provides broadcast authentication Reference: Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks”, Proceedings of 7th Annual International Conference on Mobile Computing and Networks (MOBICOM 2001), Rome, Italy July 2001 910/28/2015
10
Cont… ► Use simple symmetric encryption function (RC5) provides: ► Encryption & Decryption ► Message Authentication Code ► Pseudorandom number generation ► Hash Function ► TESLA : efficient source authentication in multicast for wired networks. ► µTESLA: authentication in broadcast for WSNs. ►µ TESLA removes or adapts the expensive features of TESLA 1010/28/2015
11
TinySec….. ► Light weight and efficient generic link layer security package. ► Developers can easily integrate into sensor network applications. ► A research platform that is easily extensible and has been incorporated into higher level protocols. Reference: Chris Karlof, Naveen Sastry, David Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004. 1110/28/2015
12
TinySec-Design ► Two Security Options Authentication Encryption (Tinysec-AE) Authentication only (Tinysec-Au) ► Encryption : Specifying the IV format Selecting an encryption Scheme( CBC) 1210/28/2015
13
TinyPK ► In order to make TinyPK practical, protocol require only public key operations on the sensor. ► TinyPK is based on RSA cryptosystem. ► TinyPK requires a Certificate Authority. ► Any external party that wishes to interact with the node also requires its own Public/private key 1310/28/2015 Reference: TinyPK: Securing Sensor Networks with Public Key Technology”, R. Watro et al., ACM SASN, October 2004.
14
Motivation for Link Layer Security ► End-End security Mechanisms : Suitable only for conventional networks using end-end communications where intermediate routers only need to view the message headers. ► BUT, in Sensor networks In-network processing is done to avoid redundant messages-Requires intermediate nodes to have access to whole message packets and just not the headers as in conventional networks. 10/28/201514
15
Cont… ► Why end-end security mechanisms not suitable for sensor networks? ► If message integrity checked only at the destination, the networks may route packets injected by an adversary many hops before they are detected. This will waste precious energy. ► A link layer security mechanism can detect unauthorized packets when they are first injected onto the network. 10/28/201515
16
Next Plan…. ► Discuss more about related topic. ► Discuss Problems in existing research. 10/28/201516 Any Question ?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.