SlideShare a Scribd company logo
Security
in
Wireless Sensor Networks
Shruti Pathak
CS 685
Fall 2009
Introduction (Wireless sensor Networks)
 Current applications include ocean and
wildlife monitoring, manufacturing machinery
performance monitoring, building safety and
earthquake monitoring, military applications
etc.
 Future applications might involve highway
traffic, building security, water quality and
people’s heart rates.
Challenges posed by WSN
 To make the sensor networks economically
viable they have limited energy consumption
and communication capabilities.
 Often deployed in accessible areas; implies
added risk to physical attacks.
 Interaction with their physical environments
and people result in new security problems.
A Secure System
 Usually a standalone component of the
system where a separate module provides
security.
 This is a flawed approach.
 Ideally, security should be a part of every
component. (the components designed
without security can become a point of
attack)
Key Establishment and Trust Setup
 Cryptographic keys need to be established during
the setting up of a sensor network for later use.
 Various traditional protocols cannot be used in case
of sensor devices due to limited computational
capabilities.
 The key establishment techniques need to scale to
networks with hundreds and thousands of nodes.
 Sensor nodes differ in communication patterns with
the traditional networks; sensor nodes may need to
set up keys with their neighbors and with data
aggregation nodes.
Simplest solution for key establishment
 Network-wide shared key.
Disadvantage: Compromise of any single node result
in decryption of complete network traffic.
 Variant to the above approach use a single shared
key to establish a set of link keys, one per pair of
communicating nodes, then erase the network-wide
key after setting up the session keys.
Disadvantage: This process does not allow addition
of new nodes after initial deployment.
Public Key Cryptography
(Diffie-Hellman key Establishment)
 D-H Key Establishment: Allows two parties
that have no prior knowledge of each other to
jointly establish a shared secret key over an
insecure communications channel.
 Advantage: A node can set up a secure key
with any other node in the network.
 But is beyond the scope of the capabilities of
the sensor networks.
Bootstrapping
 Bootstrapping keys with a trusted base
station is an option.
 Each node shares a single key with the base
station and set up keys with the other nodes
through the base stations.
 Disadvantage: Single point of failure.
 Advantage: If the network incorporates
tamper-resistant packaging for the base
station, it would help in the mitigation of
threats of physical attacks.
Random Key Distribution Protocols
 Large pool of symmetric key is chosen and a random
subset of pool is distributed to each sensor node.
 Two nodes that want to communicate search their pools
to determine whether they share a common key.
 Not every pair of nodes share a common key.
 A fully connected network can be established if the key
establishment probability is sufficiently great.
 Advantage: Avoids having to include a central base
station.
 Disadvantage: Attackers who are able to compromise
sufficiently large number of nodes could reconstruct the
complete key pool and break the entire scheme.
Security and Authentication
 Need for protection against eavesdropping, injection
and modification of packets.
 Cryptography is the standard defense mechanism
but has its own tradeoffs.
 It entails performance cost for extra computation
that increases packet size.
 Hardware support of it increases efficiency but also
increase financial cost of implementing a network.
 Software-only cryptography is practical with today’s
sensor technology. Hardware support is not needed.
Privacy Concerns
 Secret surveillance:
- Employers can spy on their employees
- Shop owners on customers
- Neighbors on each other
- Law enforcement agencies on public places
 Surveillance technology has become cheaper
and more effective and hence affordable.
 Devices have become smaller hence easy to
conceal.
Threats
 New type of threats introduced by the sensor
networks.
 Enables routine tracking of people and vehicles over
long period of time.
 In order to be able to solve the problems related to
privacy; not only the technology but a mix of societal
norms, new laws and technological responses are
necessary.
 The existence of sensor technology and surveillance
should be made known to people for a better
acceptance of the technology.
Robustness to communication
denial of service
 Denial of services attacks are one of the greatest
concerns.
 An adversary can severely disrupt the network’s
operation by broadcasting a high energy signal,
entire system could be jammed.
 Solution: When jamming effects only the portion of
the network, a jamming-resistant network could
defeat the attack by detection of the jammed area
and mapping the affected region and the routing
around the jammed area.
Secure Routing
 Routing and data forwarding is an essential service
for enabling communication in sensor networks.
 Simplest attack: Injection of malicious routing
information into the network can result in routing
inconsistencies.
Solution: Simple authentication might guard against
these attacks; still susceptible to replay attacks by
attackers with legitimate routing messages.
 Node-capture attacks: In almost all the routing
protocols, compromise of single nodes suffices to
take over the entire network or prevent
communication within it.
Resilience to node capture
 Generally, sensor nodes are present in locations that are readily
accessible to attackers.
 It becomes easy for an attacker to capture these nodes, extract
cryptographic secrets, modify their programming or replace them
with malicious nodes.
 Defense: Tamper-resistant packaging but is expensive hence not
preferable instead algorithmic solutions are preferred over it.
 Challenge is to build a network that would operate correctly even
if several nodes are compromised without our knowledge.
 Sending every packet across multiple, independent paths and
checking at the destination for consistency among the packets
that are received, resilience against node-capture can be
achieved.
Network Security Services:
Secure Group Management
 High level security mechanisms.
 Each node in the sensor network is limited in computing and
communication capabilities.
 However, data aggregation and analysis can be performed by
group of nodes.
 Example: A group of nodes might be responsible for tracking the
vehicle through the network.
 Secure protocols are required for group management that would
ensure secure admission of new group members and secure
communication among that group.
 The outcome of the group’s computation is normally transmitted
to the base station which should be authenticated to ensure that
it comes from a valid group.
 Any solution must be efficient in time and energy.
Network Security Services:
Intrusion Detection
 Wireless sensor networks are susceptible to many
forms of intrusion.
 In wired networks, traffic and computation are
typically monitored and analyzed for anomalies at
various concentration points, which is often
expensive.
 For a lesser expensive solution, applications and
typical threat models must be understood,
particularly how cooperating adversaries might
attack the system.
 Use of secure groups may be a promising approach
for decentralized intrusion detection.
Network Security Services:
Secure data aggregation
 One benefit of wireless sensor networks is
the fine-grain sensing that large and dense
set of nodes can provide.
 To avoid overwhelming traffic back to the
base station; data should be aggregated.
 Aggregation may take place at many places
in the network, depending upon the
architecture of the wireless sensor networks.
 All such locations should be secured.
Research Challenges
 Severe constraints and demanding
deployment environments of wireless sensor
networks make computer security for these
systems challenging.
 How to secure wireless communication links?
 Understanding the environment-related
constraints.

More Related Content

What's hot

Network Security
Network  SecurityNetwork  Security
Network Security
VIKAS SINGH BHADOURIA
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
IJCSIS Research Publications
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy
 
Intercept product
Intercept productIntercept product
Intercept product
David Pereira
 
RSA Anatomy of an Attack
RSA Anatomy of an AttackRSA Anatomy of an Attack
RSA Anatomy of an Attack
integritysolutions
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security ins
Astha Parihar
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
Eng. Mohammed Ahmed Siddiqui
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
ijp2p
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
REVULN
 
Network security
Network securityNetwork security
Network security using data mining concepts
Network security using data mining conceptsNetwork security using data mining concepts
Network security using data mining concepts
Jaideep Ghosh
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressVallie Joseph
 
Ids 001 ids vs ips
Ids 001 ids vs ipsIds 001 ids vs ips
Ids 001 ids vs ips
jyoti_lakhani
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
Eng. Mohammed Ahmed Siddiqui
 

What's hot (20)

Network Security
Network  SecurityNetwork  Security
Network Security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Intercept product
Intercept productIntercept product
Intercept product
 
RSA Anatomy of an Attack
RSA Anatomy of an AttackRSA Anatomy of an Attack
RSA Anatomy of an Attack
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security ins
 
Another proposal
Another proposalAnother proposal
Another proposal
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Network security
Network securityNetwork security
Network security
 
Network security using data mining concepts
Network security using data mining conceptsNetwork security using data mining concepts
Network security using data mining concepts
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Ids 001 ids vs ips
Ids 001 ids vs ipsIds 001 ids vs ips
Ids 001 ids vs ips
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 

Similar to Paper1

Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
IJET - International Journal of Engineering and Techniques
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
Zac Darcy
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
Adit Pathak
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
Editor IJCATR
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
IJERA Editor
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET Journal
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaperMumbai Academisc
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
AM Publications,India
 
S04404116120
S04404116120S04404116120
S04404116120
IJERA Editor
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
IJCI JOURNAL
 
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKSAN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
csandit
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
ijsrd.com
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
pijans
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
BRNSSPublicationHubI
 

Similar to Paper1 (20)

Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
S04404116120
S04404116120S04404116120
S04404116120
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKSAN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
D0961927
D0961927D0961927
D0961927
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 

Recently uploaded

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 

Recently uploaded (20)

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 

Paper1

  • 2. Introduction (Wireless sensor Networks)  Current applications include ocean and wildlife monitoring, manufacturing machinery performance monitoring, building safety and earthquake monitoring, military applications etc.  Future applications might involve highway traffic, building security, water quality and people’s heart rates.
  • 3. Challenges posed by WSN  To make the sensor networks economically viable they have limited energy consumption and communication capabilities.  Often deployed in accessible areas; implies added risk to physical attacks.  Interaction with their physical environments and people result in new security problems.
  • 4. A Secure System  Usually a standalone component of the system where a separate module provides security.  This is a flawed approach.  Ideally, security should be a part of every component. (the components designed without security can become a point of attack)
  • 5. Key Establishment and Trust Setup  Cryptographic keys need to be established during the setting up of a sensor network for later use.  Various traditional protocols cannot be used in case of sensor devices due to limited computational capabilities.  The key establishment techniques need to scale to networks with hundreds and thousands of nodes.  Sensor nodes differ in communication patterns with the traditional networks; sensor nodes may need to set up keys with their neighbors and with data aggregation nodes.
  • 6. Simplest solution for key establishment  Network-wide shared key. Disadvantage: Compromise of any single node result in decryption of complete network traffic.  Variant to the above approach use a single shared key to establish a set of link keys, one per pair of communicating nodes, then erase the network-wide key after setting up the session keys. Disadvantage: This process does not allow addition of new nodes after initial deployment.
  • 7. Public Key Cryptography (Diffie-Hellman key Establishment)  D-H Key Establishment: Allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel.  Advantage: A node can set up a secure key with any other node in the network.  But is beyond the scope of the capabilities of the sensor networks.
  • 8. Bootstrapping  Bootstrapping keys with a trusted base station is an option.  Each node shares a single key with the base station and set up keys with the other nodes through the base stations.  Disadvantage: Single point of failure.  Advantage: If the network incorporates tamper-resistant packaging for the base station, it would help in the mitigation of threats of physical attacks.
  • 9. Random Key Distribution Protocols  Large pool of symmetric key is chosen and a random subset of pool is distributed to each sensor node.  Two nodes that want to communicate search their pools to determine whether they share a common key.  Not every pair of nodes share a common key.  A fully connected network can be established if the key establishment probability is sufficiently great.  Advantage: Avoids having to include a central base station.  Disadvantage: Attackers who are able to compromise sufficiently large number of nodes could reconstruct the complete key pool and break the entire scheme.
  • 10. Security and Authentication  Need for protection against eavesdropping, injection and modification of packets.  Cryptography is the standard defense mechanism but has its own tradeoffs.  It entails performance cost for extra computation that increases packet size.  Hardware support of it increases efficiency but also increase financial cost of implementing a network.  Software-only cryptography is practical with today’s sensor technology. Hardware support is not needed.
  • 11. Privacy Concerns  Secret surveillance: - Employers can spy on their employees - Shop owners on customers - Neighbors on each other - Law enforcement agencies on public places  Surveillance technology has become cheaper and more effective and hence affordable.  Devices have become smaller hence easy to conceal.
  • 12. Threats  New type of threats introduced by the sensor networks.  Enables routine tracking of people and vehicles over long period of time.  In order to be able to solve the problems related to privacy; not only the technology but a mix of societal norms, new laws and technological responses are necessary.  The existence of sensor technology and surveillance should be made known to people for a better acceptance of the technology.
  • 13. Robustness to communication denial of service  Denial of services attacks are one of the greatest concerns.  An adversary can severely disrupt the network’s operation by broadcasting a high energy signal, entire system could be jammed.  Solution: When jamming effects only the portion of the network, a jamming-resistant network could defeat the attack by detection of the jammed area and mapping the affected region and the routing around the jammed area.
  • 14. Secure Routing  Routing and data forwarding is an essential service for enabling communication in sensor networks.  Simplest attack: Injection of malicious routing information into the network can result in routing inconsistencies. Solution: Simple authentication might guard against these attacks; still susceptible to replay attacks by attackers with legitimate routing messages.  Node-capture attacks: In almost all the routing protocols, compromise of single nodes suffices to take over the entire network or prevent communication within it.
  • 15. Resilience to node capture  Generally, sensor nodes are present in locations that are readily accessible to attackers.  It becomes easy for an attacker to capture these nodes, extract cryptographic secrets, modify their programming or replace them with malicious nodes.  Defense: Tamper-resistant packaging but is expensive hence not preferable instead algorithmic solutions are preferred over it.  Challenge is to build a network that would operate correctly even if several nodes are compromised without our knowledge.  Sending every packet across multiple, independent paths and checking at the destination for consistency among the packets that are received, resilience against node-capture can be achieved.
  • 16. Network Security Services: Secure Group Management  High level security mechanisms.  Each node in the sensor network is limited in computing and communication capabilities.  However, data aggregation and analysis can be performed by group of nodes.  Example: A group of nodes might be responsible for tracking the vehicle through the network.  Secure protocols are required for group management that would ensure secure admission of new group members and secure communication among that group.  The outcome of the group’s computation is normally transmitted to the base station which should be authenticated to ensure that it comes from a valid group.  Any solution must be efficient in time and energy.
  • 17. Network Security Services: Intrusion Detection  Wireless sensor networks are susceptible to many forms of intrusion.  In wired networks, traffic and computation are typically monitored and analyzed for anomalies at various concentration points, which is often expensive.  For a lesser expensive solution, applications and typical threat models must be understood, particularly how cooperating adversaries might attack the system.  Use of secure groups may be a promising approach for decentralized intrusion detection.
  • 18. Network Security Services: Secure data aggregation  One benefit of wireless sensor networks is the fine-grain sensing that large and dense set of nodes can provide.  To avoid overwhelming traffic back to the base station; data should be aggregated.  Aggregation may take place at many places in the network, depending upon the architecture of the wireless sensor networks.  All such locations should be secured.
  • 19. Research Challenges  Severe constraints and demanding deployment environments of wireless sensor networks make computer security for these systems challenging.  How to secure wireless communication links?  Understanding the environment-related constraints.