SlideShare a Scribd company logo
1 of 29
Download to read offline
This project is funded by Structural Funds of the European Union (ESF) and state budget of the Czech Republic 
Overview on Security and Privacy Issues in Wireless Sensor Networks 
Dr. Tarek Gaber 
Computer Science Department, 
VSB-Technical University of Ostrava, Czech 
Faculty of Computers & Informatics 
Suez Canal University, Ismailia, Egypt
Lecture Outlines Why security is important in WSN Algorithms to achieve security services Why security is complex in WSN Some Attacks to WSN Trust and Reputation in WSN Security, functionality, and ease of use How to Stay Safe While using WiFi
Why Security is Important for WSN 
•WSNs have many applications e.g.: 
–military, homeland security 
–assessing disaster zones 
–Others. 
•This means that such sensor networks have mission-critical tasks. 
•Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN 
•Moreover, wireless communication employed by WSN facilitates 
–eavesdropping and 
–packet injection by an adversary. 
•These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption 
Example: AES Algorithm
Asymmetric Encryption Example: RSA Algorithm
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN 
•Because of WSNs Characteristics: 
–Anti-jamming and physical temper proofing are impossible 
•greater design complexity and energy consumption 
–Denial-of-service (DoS) attack is difficult 
•Sensor node constraints 
–Sensor nodes are susceptible to physical capture 
•Deploying in hostile environment. 
–eavesdropping and injecting malicious message are easy 
•Using wireless communication
Why Security is Complex in WSN 
•Because of WSNs Characteristics: 
–maximization of security level is challenging 
•Resource consumption 
–asymmetric cryptography is often too expensive 
•Node constraints 
–centralized security solutions are big issue 
• no central control and constraints, e.g. small memory capacity. 
•Cost Issues 
–Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks 
•Environmental 
–Permanently destroy the node, e.g., crashing or stealing a node. 
•Attacks at the Physical Layer 
–Jamming: transmission of a radio signal to interfere with WSN radio frequencies. 
–Constant jamming: No message are able to be sent or received. 
–Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure 
•Most common defense against jamming attacks is to use spread-spectrum communication techniques 
•there are different channels to deliver the signal
Physical Attacks 
•Node Capture Attacks 
–routing functionalities 
•Countermeasure 
–tamper-proof features 
•Expensive solution 
–Self-Protection 
–disable device when attack detected
Attacks on Routing 
•Sinkhole attack 
–attacker tries to attract the traffic from a particular region through it 
•Solution: 
–Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing 
•Sybil attack (Identity Spoofing) 
–attacker claims to have multiple identities or locations 
–provide wrong information for routing to launch false routing attacks 
•Solutions: 
–Misbehavior Detection. 
–Identity Protection
Privacy Attacks 
•Attempts to obtain sensitive information collected and communicated in WSNs 
–Eavesdropping 
•made easy by broadcast nature of wireless networks 
–Traffic analysis 
•used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques 
• Cryptographic primitives and authentication mechanisms are not suitable for WSNs 
–Asymmetric cryptography is often too expensive 
–Node constraints 
–power consumption 
–centralized security administration 
–Once the keys are leaked, security mechanisms may become ineffective
Trust and Reputation 
•Examples of reputation systems: 
– eBay reputation system, … 
•Relationship between reputation and trust: 
–Reputation can be used as an output in order to derive trust
•These systems can: 
– identify malicious nodes, 
–computes a trust rating of the node and 
–exclude the nodes from the network 
– offer a prediction of one's future behavior, 
Trust Systems
Example of Trust in WSN 
• In order to find a secure route, 
–Trust values will be evaluated 
–the trust results will help to select the trustworthy next-hop node 
–through the trusted nodes, the source node will forward data to the sink node
The Security, Functionality, and Ease of Use Triangle
How to Stay Safe While using WiFi 
•Treat all public WiFi links with suspicion: It’s virtually impossible to tell the difference between a safe and an unsafe network. 
•When using public WiFi, avoid doing anything sensitive: Don’t buy anything, login to your financial accounts, or even send email when accessing public WiFi networks. Wait until you get back home to your secure network to do those kinds of things. Better to be safe than sorry. 
•Make sure you are using antivirus software: It’s not a foolproof solution, but antivirus software can help repel most known attacks. 
•Think about using identity protection and monitoring services: This is a great way to protect yourself and your family from identity theft. 
•Use a VPN: A VPN like PRIVATE WiFi allows you to use public WiFi networks as if they were private and secure. A VPN is a good solution to possible man-in-the-middle attacks if you must use public WiFi.
References 
•Dargie, Waltenegus, and Christian Poellabauer. Fundamentals of wireless sensor networks: theory and practice. John Wiley & Sons, 2010. 
•http://techathon.mytechlabs.com/web-application-security- testing/ 
•Kumar, Pardeep, and Hoon-Jae Lee. "Security issues in healthcare applications using wireless medical sensor networks: A survey." Sensors 12.1 (2011): 55-91. 
•http://www.privatewifi.com/csid-recommends-using-a-vpn- to-stop-man-in-the-middle-attacks/ 
•http://techathon.mytechlabs.com/web-application-security- testing/ 
•http://en.kryptotel.net/encryption.html
Thank you 
Dr. Tarek Gaber 
Ostrava, ….. (04 December 2014) 
This project is funded by Structural Funds of the European Union and state budget of the Czech Republic

More Related Content

What's hot

Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisonsITM Universe - Vadodara
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networksPriya Kaushal
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7Ramesh Babu
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile ComputingKABILESH RAMAR
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 

What's hot (20)

Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 

Viewers also liked

Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Ddos attack definitivo
Ddos attack definitivoDdos attack definitivo
Ddos attack definitivolilith333
 
Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Jubayer Al Mahmud
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceAvirot Mitamura
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNChao Chen
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkVinayak Raja
 
AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...
AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...
AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...anugulashivani
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksZaahir Salam
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkdeawoo Kim
 

Viewers also liked (20)

Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Ddos attack definitivo
Ddos attack definitivoDdos attack definitivo
Ddos attack definitivo
 
Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking)
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDN
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor network
 
AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...
AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...
AUTOMATIC VOTING MACHINE-AN ADVANCED MODEL FOR SECURED BIOMETRICS BASED VOTIN...
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Satellite
SatelliteSatellite
Satellite
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 

Similar to Overview on security and privacy issues in wireless sensor networks-2014

eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network securityaibad ahmed
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Unit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfUnit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfMathavan N
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Key management techniques in wireless sensor networks
Key management techniques in wireless sensor networksKey management techniques in wireless sensor networks
Key management techniques in wireless sensor networksIJNSA Journal
 

Similar to Overview on security and privacy issues in wireless sensor networks-2014 (20)

Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network security
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 
Unit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfUnit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdf
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Key management techniques in wireless sensor networks
Key management techniques in wireless sensor networksKey management techniques in wireless sensor networks
Key management techniques in wireless sensor networks
 

More from Tarek Gaber

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Tarek Gaber
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Tarek Gaber
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionTarek Gaber
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectTarek Gaber
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisTarek Gaber
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberTarek Gaber
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberTarek Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationTarek Gaber
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareTarek Gaber
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarekTarek Gaber
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Tarek Gaber
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Tarek Gaber
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberTarek Gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...Tarek Gaber
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014Tarek Gaber
 

More from Tarek Gaber (15)

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation project
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project Thesis
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_Gaber
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image Authentication
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid share
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarek
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Overview on security and privacy issues in wireless sensor networks-2014

  • 1. This project is funded by Structural Funds of the European Union (ESF) and state budget of the Czech Republic Overview on Security and Privacy Issues in Wireless Sensor Networks Dr. Tarek Gaber Computer Science Department, VSB-Technical University of Ostrava, Czech Faculty of Computers & Informatics Suez Canal University, Ismailia, Egypt
  • 2. Lecture Outlines Why security is important in WSN Algorithms to achieve security services Why security is complex in WSN Some Attacks to WSN Trust and Reputation in WSN Security, functionality, and ease of use How to Stay Safe While using WiFi
  • 3. Why Security is Important for WSN •WSNs have many applications e.g.: –military, homeland security –assessing disaster zones –Others. •This means that such sensor networks have mission-critical tasks. •Security is crucial for such WSNs deployed in these hostile environments.
  • 4. Why Security is Important for WSN •Moreover, wireless communication employed by WSN facilitates –eavesdropping and –packet injection by an adversary. •These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
  • 5. Algorithms to achieve security services
  • 10. Why Security is Complex in WSN •Because of WSNs Characteristics: –Anti-jamming and physical temper proofing are impossible •greater design complexity and energy consumption –Denial-of-service (DoS) attack is difficult •Sensor node constraints –Sensor nodes are susceptible to physical capture •Deploying in hostile environment. –eavesdropping and injecting malicious message are easy •Using wireless communication
  • 11. Why Security is Complex in WSN •Because of WSNs Characteristics: –maximization of security level is challenging •Resource consumption –asymmetric cryptography is often too expensive •Node constraints –centralized security solutions are big issue • no central control and constraints, e.g. small memory capacity. •Cost Issues –Overall cost of WSN should be as low as possible.
  • 13. Physical Attacks •Environmental –Permanently destroy the node, e.g., crashing or stealing a node. •Attacks at the Physical Layer –Jamming: transmission of a radio signal to interfere with WSN radio frequencies. –Constant jamming: No message are able to be sent or received. –Intermittent jamming: Nodes are able to exchange messages periodically
  • 14. Jamming Attack Countermeasure •Most common defense against jamming attacks is to use spread-spectrum communication techniques •there are different channels to deliver the signal
  • 15. Physical Attacks •Node Capture Attacks –routing functionalities •Countermeasure –tamper-proof features •Expensive solution –Self-Protection –disable device when attack detected
  • 16. Attacks on Routing •Sinkhole attack –attacker tries to attract the traffic from a particular region through it •Solution: –Watchdog Nodes can start to trace the source of false routing information
  • 17. Attacks on Routing •Sybil attack (Identity Spoofing) –attacker claims to have multiple identities or locations –provide wrong information for routing to launch false routing attacks •Solutions: –Misbehavior Detection. –Identity Protection
  • 18. Privacy Attacks •Attempts to obtain sensitive information collected and communicated in WSNs –Eavesdropping •made easy by broadcast nature of wireless networks –Traffic analysis •used to identify sensor nodes of interest (data of interest),
  • 22. WSN Traditional Security Techniques • Cryptographic primitives and authentication mechanisms are not suitable for WSNs –Asymmetric cryptography is often too expensive –Node constraints –power consumption –centralized security administration –Once the keys are leaked, security mechanisms may become ineffective
  • 23. Trust and Reputation •Examples of reputation systems: – eBay reputation system, … •Relationship between reputation and trust: –Reputation can be used as an output in order to derive trust
  • 24. •These systems can: – identify malicious nodes, –computes a trust rating of the node and –exclude the nodes from the network – offer a prediction of one's future behavior, Trust Systems
  • 25. Example of Trust in WSN • In order to find a secure route, –Trust values will be evaluated –the trust results will help to select the trustworthy next-hop node –through the trusted nodes, the source node will forward data to the sink node
  • 26. The Security, Functionality, and Ease of Use Triangle
  • 27. How to Stay Safe While using WiFi •Treat all public WiFi links with suspicion: It’s virtually impossible to tell the difference between a safe and an unsafe network. •When using public WiFi, avoid doing anything sensitive: Don’t buy anything, login to your financial accounts, or even send email when accessing public WiFi networks. Wait until you get back home to your secure network to do those kinds of things. Better to be safe than sorry. •Make sure you are using antivirus software: It’s not a foolproof solution, but antivirus software can help repel most known attacks. •Think about using identity protection and monitoring services: This is a great way to protect yourself and your family from identity theft. •Use a VPN: A VPN like PRIVATE WiFi allows you to use public WiFi networks as if they were private and secure. A VPN is a good solution to possible man-in-the-middle attacks if you must use public WiFi.
  • 28. References •Dargie, Waltenegus, and Christian Poellabauer. Fundamentals of wireless sensor networks: theory and practice. John Wiley & Sons, 2010. •http://techathon.mytechlabs.com/web-application-security- testing/ •Kumar, Pardeep, and Hoon-Jae Lee. "Security issues in healthcare applications using wireless medical sensor networks: A survey." Sensors 12.1 (2011): 55-91. •http://www.privatewifi.com/csid-recommends-using-a-vpn- to-stop-man-in-the-middle-attacks/ •http://techathon.mytechlabs.com/web-application-security- testing/ •http://en.kryptotel.net/encryption.html
  • 29. Thank you Dr. Tarek Gaber Ostrava, ….. (04 December 2014) This project is funded by Structural Funds of the European Union and state budget of the Czech Republic