SlideShare a Scribd company logo
1 of 20
Security in
Wireless sensor network
Disclaimer:
a.
Information included in this slides came from multiple sources. We have
tried our best to cite the sources. Please refer to the Table of References
slide (#2) to learn about the sources, when applicable.
b.
The slides should be used only for academic purposes (e.g., in teaching a
class), and should not be used for commercial purposes.

Security in Wireless sensor network

1
Table of references
Slides

References

5

http://www.sciencedirect.com/

6

www.cis.syr.edu/~wedu/Research/slides/Purdue04.ppt

7-9

Wireless Sensor Network Security: A Survey

11-13,
15-17

Karlof, C., and D. Wagner,” Secure Routing in Wireless
Sensor Networks: Attacks and Countermeasures”

14

Security for Sensor Networks: Cryptography and
Beyond by David Wagner

18-20

www.cs.binghamton.edu/~kang/teaching/cs580s/secwsn.ppt

2
Security in Wireless sensor network
Introduction


What is wireless sensor network?
The wireless network consists of hundreds or thousands of lowpower, low-cost nodes deployed to monitor and affect the
environment
Organization of Wireless sensor network
Ref:-www.cis.syr.edu/~wedu/Research/slides/Purdue04.ppt
Sensors
Deploy

3
Security in Wireless sensor network
Benefits-WSN




Low Cost
Easy to Deploy / Maintain
Access and Measure unreachable events

4
Security in Wireless sensor network
Application of WSN









Military applications
Enemy movement
Environmental applications
Habitat monitoring
Forrest fire monitoring
Health applications
Tracking patients, doctors, drug administrators
Home applications
Other commercial applications

5
Security in Wireless sensor network
Need for Security


Protecting confidentiality, integrity, and availability of the
communications and computations



Sensor networks have certain severe resource
constraints due to their lack of data storage and power



Wireless Sensor networks are vulnerable to security
attacks as medium of transmission of data is
broadcasting
Sensor nodes can be physically captured or destroyed



6
Security in Wireless sensor network
Requirements of security








Data confidentiality
Sensor networks should not leak any sensitive data
to any unauthorized neighboring nodes
Data integrity
The sensitive data should not be erased or changed
by the adversary
Data Freshness
The data received by the nodes should be recent
and should be the old message replayed
Availability
Limitation of data access
7
Security in Wireless sensor network
Standard approach








The standard approach to achieve the data
confidentiality is to encrypt it with the secret key which is
possessed by the intended receivers
uTESLA is a protocol which uses asymmetric key
cryptography and minimal packet overhead to achieve
the data integrity
Typical approach to achieve the data freshness is
shared needs to be exchanged over a period of time
Traditional encryption algorithm can be used to achieve
make the data available

8
Security in Wireless sensor network
Obstacles of Sensor nodes Security







A sensor nodes have a small amount of memory and
storage space for the code
Energy is the biggest constraints in the wireless sensor
network
Unreliable communication
Unattended Operation

9
Security in Wireless sensor network
Network layer attacks on WSN






Spoofed, altered and replayed routing information
Selective Forwarding
Sinkhole attacks
The Sybil attack
Wormholes

10
Security in Wireless sensor network
Description of attacks


Spoof, alter, or replay routing info
- Create loops, attack or repel network traffic, partition
the network, extend or shorten the source routes and
generate false error messages



Selective forwarding
- Malicious node selectively drops incoming packets
- Adversary can also modify packets and forward
these messages

11
Security in Wireless sensor network
Continued..


Sinkhole attacks
- All packets are directed to base station
- A malicious node advertises a high quality link to the
base station to attract a lot of packets
- Enable other attacks, e.g., selective forwarding or
wormhole attack

12
Security in Wireless sensor network
Continued..


Sybil attack
- A single node presents multiple ID’s to other nodes
- Affect distributed storage, multi-path routing , topology
maintenance and geographic routing



Wormhole Attack
- Two colluding nodes
- A node at one end of the wormhole advertises high
quality link to the base station
- Another node at the other end receives the attracted
packets
13
Security in Wireless sensor network
Protocols and relevant attacks
Protocol

Relevant attacks

TinyOS beaconing

Bogus routing information, selective forwarding, sinkholes,
Sybil, wormholes, HELLO floods

Directed diffusion and
multipath variant

Bogus routing information, selective forwarding, sinkholes,
Sybil, wormholes, HELLO floods

Geographic routing
(GPSR,GEAR)

Bogus routing information, selective forwarding, Sybil

Minimum cost forwarding

Bogus routing information, selective forwarding, sinkholes,
wormholes, HELLO floods

Clustering based protocols Selective forwarding, HELLO floods
(LEACH,TEEN,PEGASIS)
Rumor routing

Bogus routing information, selective forwarding, sinkholes,
Sybil, wormholes

Energy conserving
topology maintenance

Bogus routing information, Sybil, HELLO floods

14
Security in Wireless sensor network
Approaches against the attacks


Outsider attacks and link layer security
Precaution against outsider attacks, e.g., Sybil
attacks, selective forwarding, ACK spoofing
- Cannot handle insider attacks



Sybil attack
- Every node shares a unique secret key with the base
station
- Create pair wise shared key for msg authentication
- Limit the number of neighbors for a node

15
Security in Wireless sensor network
Continued..


Wormhole, sinkhole attack
- Cryptography may not help directly
- Good routing protocol design
- Geographic routing

Tunnel packets from one part
of the network and replay them
in a different part.
-

16
Security in Wireless sensor network
Continued..


Selective forwarding
- Multi-path routing
- Route messages over disjoint or Braided paths
- Dynamically pick next hop from a set of candidates

17
Security in Wireless sensor network
Secure routing






To send data safely proper routing and forwarding is
required in sensor network
Injection attacks
Insert malicious information in the network to
produce inconsistencies
Authentication can avoid the injection attacks
Sensor networks are susceptible to node capture
attacks
Single node is compromised to take over the entire
network
18
Security in Wireless sensor network
Secure group management






protocols for group management are required to
- securely admit new group members
- support secure group communication
The outcome of the group computation is normally
transmitted to a base station, therefore the output must
be authenticated to ensure it comes from a valid group.
Any solution must also be efficient in terms of time and
energy (or involve low computation and communication
costs).
- precludes most classical group-management solutions

19
Security in Wireless sensor network
Secure data aggregation







Wireless sensor network sense the large and dense set
of nodes
The sensed values must be aggregated to avoid
overwhelming amounts of traffic back to the base station
Aggregation takes place depending on the architecture
If the application tolerates approximate answers,
powerful techniques are available.
- randomly sampling a small fraction of nodes and
checking that they have behaved properly supports
detection of many different types of attacks

20
Security in Wireless sensor network

More Related Content

What's hot

Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHJimit Rupani
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor networkrasyidi usman
 

What's hot (20)

Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Firewalls
FirewallsFirewalls
Firewalls
 
Iot Security
Iot SecurityIot Security
Iot Security
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
 

Similar to Security in WSN

Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Dharmendrasingh417
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 

Similar to Security in WSN (20)

Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Paper1
Paper1Paper1
Paper1
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
Security issues
Security issuesSecurity issues
Security issues
 
Presentation1
Presentation1Presentation1
Presentation1
 
D0961927
D0961927D0961927
D0961927
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
S04404116120
S04404116120S04404116120
S04404116120
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Security in WSN

  • 1. Security in Wireless sensor network Disclaimer: a. Information included in this slides came from multiple sources. We have tried our best to cite the sources. Please refer to the Table of References slide (#2) to learn about the sources, when applicable. b. The slides should be used only for academic purposes (e.g., in teaching a class), and should not be used for commercial purposes. Security in Wireless sensor network 1
  • 2. Table of references Slides References 5 http://www.sciencedirect.com/ 6 www.cis.syr.edu/~wedu/Research/slides/Purdue04.ppt 7-9 Wireless Sensor Network Security: A Survey 11-13, 15-17 Karlof, C., and D. Wagner,” Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures” 14 Security for Sensor Networks: Cryptography and Beyond by David Wagner 18-20 www.cs.binghamton.edu/~kang/teaching/cs580s/secwsn.ppt 2 Security in Wireless sensor network
  • 3. Introduction  What is wireless sensor network? The wireless network consists of hundreds or thousands of lowpower, low-cost nodes deployed to monitor and affect the environment Organization of Wireless sensor network Ref:-www.cis.syr.edu/~wedu/Research/slides/Purdue04.ppt Sensors Deploy 3 Security in Wireless sensor network
  • 4. Benefits-WSN    Low Cost Easy to Deploy / Maintain Access and Measure unreachable events 4 Security in Wireless sensor network
  • 5. Application of WSN      Military applications Enemy movement Environmental applications Habitat monitoring Forrest fire monitoring Health applications Tracking patients, doctors, drug administrators Home applications Other commercial applications 5 Security in Wireless sensor network
  • 6. Need for Security  Protecting confidentiality, integrity, and availability of the communications and computations  Sensor networks have certain severe resource constraints due to their lack of data storage and power  Wireless Sensor networks are vulnerable to security attacks as medium of transmission of data is broadcasting Sensor nodes can be physically captured or destroyed  6 Security in Wireless sensor network
  • 7. Requirements of security     Data confidentiality Sensor networks should not leak any sensitive data to any unauthorized neighboring nodes Data integrity The sensitive data should not be erased or changed by the adversary Data Freshness The data received by the nodes should be recent and should be the old message replayed Availability Limitation of data access 7 Security in Wireless sensor network
  • 8. Standard approach     The standard approach to achieve the data confidentiality is to encrypt it with the secret key which is possessed by the intended receivers uTESLA is a protocol which uses asymmetric key cryptography and minimal packet overhead to achieve the data integrity Typical approach to achieve the data freshness is shared needs to be exchanged over a period of time Traditional encryption algorithm can be used to achieve make the data available 8 Security in Wireless sensor network
  • 9. Obstacles of Sensor nodes Security     A sensor nodes have a small amount of memory and storage space for the code Energy is the biggest constraints in the wireless sensor network Unreliable communication Unattended Operation 9 Security in Wireless sensor network
  • 10. Network layer attacks on WSN      Spoofed, altered and replayed routing information Selective Forwarding Sinkhole attacks The Sybil attack Wormholes 10 Security in Wireless sensor network
  • 11. Description of attacks  Spoof, alter, or replay routing info - Create loops, attack or repel network traffic, partition the network, extend or shorten the source routes and generate false error messages  Selective forwarding - Malicious node selectively drops incoming packets - Adversary can also modify packets and forward these messages 11 Security in Wireless sensor network
  • 12. Continued..  Sinkhole attacks - All packets are directed to base station - A malicious node advertises a high quality link to the base station to attract a lot of packets - Enable other attacks, e.g., selective forwarding or wormhole attack 12 Security in Wireless sensor network
  • 13. Continued..  Sybil attack - A single node presents multiple ID’s to other nodes - Affect distributed storage, multi-path routing , topology maintenance and geographic routing  Wormhole Attack - Two colluding nodes - A node at one end of the wormhole advertises high quality link to the base station - Another node at the other end receives the attracted packets 13 Security in Wireless sensor network
  • 14. Protocols and relevant attacks Protocol Relevant attacks TinyOS beaconing Bogus routing information, selective forwarding, sinkholes, Sybil, wormholes, HELLO floods Directed diffusion and multipath variant Bogus routing information, selective forwarding, sinkholes, Sybil, wormholes, HELLO floods Geographic routing (GPSR,GEAR) Bogus routing information, selective forwarding, Sybil Minimum cost forwarding Bogus routing information, selective forwarding, sinkholes, wormholes, HELLO floods Clustering based protocols Selective forwarding, HELLO floods (LEACH,TEEN,PEGASIS) Rumor routing Bogus routing information, selective forwarding, sinkholes, Sybil, wormholes Energy conserving topology maintenance Bogus routing information, Sybil, HELLO floods 14 Security in Wireless sensor network
  • 15. Approaches against the attacks  Outsider attacks and link layer security Precaution against outsider attacks, e.g., Sybil attacks, selective forwarding, ACK spoofing - Cannot handle insider attacks  Sybil attack - Every node shares a unique secret key with the base station - Create pair wise shared key for msg authentication - Limit the number of neighbors for a node 15 Security in Wireless sensor network
  • 16. Continued..  Wormhole, sinkhole attack - Cryptography may not help directly - Good routing protocol design - Geographic routing Tunnel packets from one part of the network and replay them in a different part. - 16 Security in Wireless sensor network
  • 17. Continued..  Selective forwarding - Multi-path routing - Route messages over disjoint or Braided paths - Dynamically pick next hop from a set of candidates 17 Security in Wireless sensor network
  • 18. Secure routing    To send data safely proper routing and forwarding is required in sensor network Injection attacks Insert malicious information in the network to produce inconsistencies Authentication can avoid the injection attacks Sensor networks are susceptible to node capture attacks Single node is compromised to take over the entire network 18 Security in Wireless sensor network
  • 19. Secure group management    protocols for group management are required to - securely admit new group members - support secure group communication The outcome of the group computation is normally transmitted to a base station, therefore the output must be authenticated to ensure it comes from a valid group. Any solution must also be efficient in terms of time and energy (or involve low computation and communication costs). - precludes most classical group-management solutions 19 Security in Wireless sensor network
  • 20. Secure data aggregation     Wireless sensor network sense the large and dense set of nodes The sensed values must be aggregated to avoid overwhelming amounts of traffic back to the base station Aggregation takes place depending on the architecture If the application tolerates approximate answers, powerful techniques are available. - randomly sampling a small fraction of nodes and checking that they have behaved properly supports detection of many different types of attacks 20 Security in Wireless sensor network