Security in sensor network1
Upcoming SlideShare
Loading in...5
×
 

Security in sensor network1

on

  • 149 views

 

Statistics

Views

Total Views
149
Views on SlideShare
149
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Security in sensor network1 Security in sensor network1 Presentation Transcript

  • Abstract 1. Introduction(sensor networks) 2. Obstacles of Sensor Security 3. Security Requirements 4. Attacks 5 Defensive Measures 6. Conclusions
  • Introduction Uses tiny, in expensive sensor nodes very low processing power and radio ranges  permit very low energy consumption perform limited and specific monitoring and sensing functions.
  • Application Agriculture and livestock Ocean and wildlife monitoring,  Manufacturing machinery performance monitoring,  Building safety and earthquake monitoring,  Many military applications.  Monitoring of highway traffic, pollution, wildfires, building security, water quality , People’s heart rates.
  • key features scalability, security,  reliability,  self-healing,  robustness
  • Obstacles of Sensor Security Very Limited Resources Unreliable Communication Unattended Operation
  • Very Limited Resources Limited Memory and Storage Space one common sensor type (TelosB) has an 16-bit, 8 MHz RISC CPU with only 10K RAM, 48K program memory and 1024K flash storage Power Limitation
  • Unreliable Communication • Unreliable Transfer - Conflicts - Latency
  • Unattended Operation • Exposure to Physical Attacks - Managed Remotely - No Central Management Point
  • Security Requirements A sensor network is a special type of network. It shares some commonalities with a typical computer network, but also poses unique requirements. Therefore, we can think of the requirements of a wireless sensor network as encompassing both the typical network requirements and the unique requirements suited solely to wireless sensor networks.
  • Attacks Types of Denial of Service attacks The Sybil attack  Traffic Analysis Attacks Node Replication Attacks Attacks Against Privacy  Physical Attacks