Security in sensor network1

269 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
269
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
16
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Security in sensor network1

  1. 1. Abstract 1. Introduction(sensor networks) 2. Obstacles of Sensor Security 3. Security Requirements 4. Attacks 5 Defensive Measures 6. Conclusions
  2. 2. Introduction Uses tiny, in expensive sensor nodes very low processing power and radio ranges  permit very low energy consumption perform limited and specific monitoring and sensing functions.
  3. 3. Application Agriculture and livestock Ocean and wildlife monitoring,  Manufacturing machinery performance monitoring,  Building safety and earthquake monitoring,  Many military applications.  Monitoring of highway traffic, pollution, wildfires, building security, water quality , People’s heart rates.
  4. 4. key features scalability, security,  reliability,  self-healing,  robustness
  5. 5. Obstacles of Sensor Security Very Limited Resources Unreliable Communication Unattended Operation
  6. 6. Very Limited Resources Limited Memory and Storage Space one common sensor type (TelosB) has an 16-bit, 8 MHz RISC CPU with only 10K RAM, 48K program memory and 1024K flash storage Power Limitation
  7. 7. Unreliable Communication • Unreliable Transfer - Conflicts - Latency
  8. 8. Unattended Operation • Exposure to Physical Attacks - Managed Remotely - No Central Management Point
  9. 9. Security Requirements A sensor network is a special type of network. It shares some commonalities with a typical computer network, but also poses unique requirements. Therefore, we can think of the requirements of a wireless sensor network as encompassing both the typical network requirements and the unique requirements suited solely to wireless sensor networks.
  10. 10. Attacks Types of Denial of Service attacks The Sybil attack  Traffic Analysis Attacks Node Replication Attacks Attacks Against Privacy  Physical Attacks

×