SlideShare a Scribd company logo
1 of 29
SECURITY IN WIRELESS
SENSOR NETWORKS
BY
RABIA ASHRAFI
M.TECH(CSE)
Wireless Sensor Networks
• A wireless network consisting of spatially
distributed autonomous devices.
• Basic idea is to wide spread the tiny sensing devices
which are capable of sensing some.
• Can monitor temperature, pressure, humidity, soil
makeup, vehicular movement, noise levels, lighting
conditions, the presence or absence of certain kinds
of objects or substances, mechanical stress levels on
attached objects, and other properties .
Issues to concentrate on
• The routing strategies get more preference, the
security issues are yet to receive extensive focus.
• Explore the security issues and challenges, discuss
crucial parameters that require extensive
investigations.
• Talk about cryptography, steganography and other
basics of network security
• Discuss various types of threats and attacks against
wireless sensor network .
• Discuss related work and proposed schemes
concerning security in WSN and introduce the view
of holistic security in WSN.
Cont’d
Security Schemes in Wireless Sensor
Networks
• Authentication, integrity, privacy, no repudiation, and
anti-playback.
• For secure transmission of various types of
information over networks, several cryptographic,
steganography and other techniques are used.
Cryptography
• Encryption-decryption techniques meant for the
traditional wired networks are not capable in WSN.
• Wireless sensor networks consist of tiny sensors
which really suffer from the lack of processing,
memory and battery power.
• Applying any encryption scheme requires
transmission of extra bits.
Steganography
• Cryptography aims at hiding the main content of a
message, steganography aims at hiding the present
existence of the message.
• Steganography is the art of covert communication by
embedding a message into the multimedia data
(image, sound, video, etc.).
• Objective of steganography is to modify the carrier in
a way that is not perceptible and hence, it looks just
like ordinary message.
Securing wireless sensor networks is not directly related to
steganography and processing multimedia data (like audio,
video) with the inadequate resources of the sensors is difficult.
Security Threats and Issues in Wireless
Sensor Networks
• Wireless networks are usually more open to various
security threats as unguided transmission medium is
more open to security attacks than those of the
guided transmission medium.
Attacks in Wireless Sensor Networks
Attacks against wireless sensor networks could be
broadly considered from two different levels of
views.
1. The attack against the security mechanisms
2. Against the basic mechanisms (like routing
mechanisms).
Denial of Service
• A standard attack on wireless sensor networks is to
jam a node or set of nodes.
• Jamming, the transmission of a radio signal that
interferes with the radio frequencies being used by
the sensor network.
• Two forms: constant jamming, and intermittent
jamming.
• Constant jamming involves the complete jamming of
the entire network. No messages are able to be sent or
received.
• If the jamming is only intermittent, then nodes are
able to exchange messages periodically, but not
consistently.
• Can have a detrimental impact as the messages may
be time sensitive.
Cont’d
Transport Layer
Attacks :
• Transport layer susceptible to flooding.
• Flooding can be as simple as sending many
connection requests to a susceptible node.
Prevention :
• Resources must be allocated to handle the connection
request.
• Eventually a node’s resources will be exhausted, thus
rendering the node useless.
Attacks on Information in transit
• In a sensor network, sensors monitor the changes of
specific parameters or values and report to the sink
according to the requirement.
• While sending the report, the information in transit
may be altered, spoofed, replayed again or vanished.
Sybil Attack
• In such a situation, a node can pretend to be
more than one node using the identities of
other legitimate nodes .
• This type of attack where a node forges the
identities of more than one node is the Sybil
attack.
• Degrades integrity of data, security and
resource utilization that the distributed
algorithm attempts to achieve.
Black hole/Sinkhole Attack
• Malicious node acts as a black hole to attract all the
traffic in the sensor network.
• Attacker listens to requests for routes then replies to
the target nodes that it contains the high quality or
shortest path to the base station.
Hello Flood Attack
• Uses HELLO packets as a weapon to convince the
sensors in WSN.
• Attacker with a high radio transmission range and
processing power sends HELLO packets to a number
of sensor nodes.
• Sensors are thus persuaded that the adversary is their
neighbor.
• Victim nodes try to go through the attacker.
Wormhole Attack
• Attacker records the packets (or bits) at one location
in the network and tunnels those to another location.
• The tunneling or retransmitting of bits could be done
selectively.
• Attack does not require compromising a sensor in the
network rather, it could be performed even at the
initial.
Time correlation attack
• Adversary generates events and monitors to whom a
node sends its packets.
• To generate an event, the adversary could simply
generate a physical event that would be monitored by
the sensor(s) in the area (turning on a light, for
instance).
Node Replication Attacks
• Attacker seeks to add a node to an existing sensor
network by copying (replicating) the node ID of an
existing sensor node .
• Packets can be corrupted or even misrouted.
Physical Attacks
• Sensor networks typically operate in hostile outdoor
environments.
• The small form factor of the sensors, both of these
together with the unattended and distributed nature
of their deployment make them highly susceptible to
physical attacks, i.e., threats due to physical node
destructions.
Security Schemes for Wireless Sensor
Networks
• Gives an analysis of secure routing in wireless sensor
networks and studies how to design secure distributed
sensor networks
• It studies Denial of service attacks against different
layers of sensor protocol stack.
• JAM presents a mapping protocol which detects a
jammed region in the sensor network and helps to
avoid the faulty region to continue routing within the
network.
Data Confidentiality
• A sensor network should not leak sensor readings to its
neighbors.
• In many applications nodes communicate highly sensitive
data, e.g., key distribution, is extremely important to build a
secure channel in a wireless sensor network.
• Public sensor information, such as sensor identities and
public keys, should also be encrypted to some extent to
protect against traffic analysis attacks.
• The standard approach for keeping sensitive data secret is to
encrypt the data with a secret key that only intended
receivers possess, thus achieving confidentiality.
Data Integrity
• With the implementation of confidentiality, an
adversary may be unable to steal information.
• This doesn’t mean the data is safe. The adversary can
change the data, so as to send the sensor network into
disarray.
• Thus, data integrity ensures that any received data has
not been altered in transit.
Data Freshness
• Need to ensure the freshness of each message.
• Informally, data freshness suggests that the data is
very much recent, and it ensures that no old messages
have been replayed.
• This requirement is especially important when there
are shared-key strategies.
Conclusion
• Most of the attacks against security in wireless sensor
networks are caused by the insertion of wrong
information by the nodes which are agreed or
compromised within the network.
• For defending the inclusion of these false reports by
compromised nodes, a mean is required for detecting
these false reports.
• However, developing such a detection mechanism and
making it efficient represents a great research
challenge.
• Again, ensuring the holistic security in wireless sensor
network is one of the major research issue.
THANK YOU

More Related Content

What's hot

Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networksPriya Kaushal
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHJimit Rupani
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile CommunicationNoushad Hasan
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network pptPramod Kuruvatti
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 

What's hot (20)

Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 

Similar to security in wireless sensor network

eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
Unit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfUnit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfMathavan N
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksJahan Zeb Xebi
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptDEEPAK948083
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to security in wireless sensor network (20)

eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Unit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfUnit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdf
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Security issues
Security issuesSecurity issues
Security issues
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networks
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Sensor.ppt
Sensor.pptSensor.ppt
Sensor.ppt
 
Sensor
SensorSensor
Sensor
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.ppt
 
D0961927
D0961927D0961927
D0961927
 
Paper1
Paper1Paper1
Paper1
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

security in wireless sensor network

  • 1. SECURITY IN WIRELESS SENSOR NETWORKS BY RABIA ASHRAFI M.TECH(CSE)
  • 2. Wireless Sensor Networks • A wireless network consisting of spatially distributed autonomous devices. • Basic idea is to wide spread the tiny sensing devices which are capable of sensing some. • Can monitor temperature, pressure, humidity, soil makeup, vehicular movement, noise levels, lighting conditions, the presence or absence of certain kinds of objects or substances, mechanical stress levels on attached objects, and other properties .
  • 3. Issues to concentrate on • The routing strategies get more preference, the security issues are yet to receive extensive focus. • Explore the security issues and challenges, discuss crucial parameters that require extensive investigations. • Talk about cryptography, steganography and other basics of network security
  • 4. • Discuss various types of threats and attacks against wireless sensor network . • Discuss related work and proposed schemes concerning security in WSN and introduce the view of holistic security in WSN. Cont’d
  • 5. Security Schemes in Wireless Sensor Networks • Authentication, integrity, privacy, no repudiation, and anti-playback. • For secure transmission of various types of information over networks, several cryptographic, steganography and other techniques are used.
  • 6. Cryptography • Encryption-decryption techniques meant for the traditional wired networks are not capable in WSN. • Wireless sensor networks consist of tiny sensors which really suffer from the lack of processing, memory and battery power. • Applying any encryption scheme requires transmission of extra bits.
  • 7. Steganography • Cryptography aims at hiding the main content of a message, steganography aims at hiding the present existence of the message. • Steganography is the art of covert communication by embedding a message into the multimedia data (image, sound, video, etc.). • Objective of steganography is to modify the carrier in a way that is not perceptible and hence, it looks just like ordinary message.
  • 8. Securing wireless sensor networks is not directly related to steganography and processing multimedia data (like audio, video) with the inadequate resources of the sensors is difficult.
  • 9. Security Threats and Issues in Wireless Sensor Networks • Wireless networks are usually more open to various security threats as unguided transmission medium is more open to security attacks than those of the guided transmission medium.
  • 10. Attacks in Wireless Sensor Networks Attacks against wireless sensor networks could be broadly considered from two different levels of views. 1. The attack against the security mechanisms 2. Against the basic mechanisms (like routing mechanisms).
  • 11. Denial of Service • A standard attack on wireless sensor networks is to jam a node or set of nodes. • Jamming, the transmission of a radio signal that interferes with the radio frequencies being used by the sensor network. • Two forms: constant jamming, and intermittent jamming.
  • 12. • Constant jamming involves the complete jamming of the entire network. No messages are able to be sent or received. • If the jamming is only intermittent, then nodes are able to exchange messages periodically, but not consistently. • Can have a detrimental impact as the messages may be time sensitive. Cont’d
  • 13. Transport Layer Attacks : • Transport layer susceptible to flooding. • Flooding can be as simple as sending many connection requests to a susceptible node. Prevention : • Resources must be allocated to handle the connection request. • Eventually a node’s resources will be exhausted, thus rendering the node useless.
  • 14. Attacks on Information in transit • In a sensor network, sensors monitor the changes of specific parameters or values and report to the sink according to the requirement. • While sending the report, the information in transit may be altered, spoofed, replayed again or vanished.
  • 15.
  • 16. Sybil Attack • In such a situation, a node can pretend to be more than one node using the identities of other legitimate nodes . • This type of attack where a node forges the identities of more than one node is the Sybil attack. • Degrades integrity of data, security and resource utilization that the distributed algorithm attempts to achieve.
  • 17. Black hole/Sinkhole Attack • Malicious node acts as a black hole to attract all the traffic in the sensor network. • Attacker listens to requests for routes then replies to the target nodes that it contains the high quality or shortest path to the base station.
  • 18. Hello Flood Attack • Uses HELLO packets as a weapon to convince the sensors in WSN. • Attacker with a high radio transmission range and processing power sends HELLO packets to a number of sensor nodes. • Sensors are thus persuaded that the adversary is their neighbor. • Victim nodes try to go through the attacker.
  • 19. Wormhole Attack • Attacker records the packets (or bits) at one location in the network and tunnels those to another location. • The tunneling or retransmitting of bits could be done selectively. • Attack does not require compromising a sensor in the network rather, it could be performed even at the initial.
  • 20. Time correlation attack • Adversary generates events and monitors to whom a node sends its packets. • To generate an event, the adversary could simply generate a physical event that would be monitored by the sensor(s) in the area (turning on a light, for instance).
  • 21. Node Replication Attacks • Attacker seeks to add a node to an existing sensor network by copying (replicating) the node ID of an existing sensor node . • Packets can be corrupted or even misrouted.
  • 22. Physical Attacks • Sensor networks typically operate in hostile outdoor environments. • The small form factor of the sensors, both of these together with the unattended and distributed nature of their deployment make them highly susceptible to physical attacks, i.e., threats due to physical node destructions.
  • 23. Security Schemes for Wireless Sensor Networks • Gives an analysis of secure routing in wireless sensor networks and studies how to design secure distributed sensor networks • It studies Denial of service attacks against different layers of sensor protocol stack. • JAM presents a mapping protocol which detects a jammed region in the sensor network and helps to avoid the faulty region to continue routing within the network.
  • 24. Data Confidentiality • A sensor network should not leak sensor readings to its neighbors. • In many applications nodes communicate highly sensitive data, e.g., key distribution, is extremely important to build a secure channel in a wireless sensor network. • Public sensor information, such as sensor identities and public keys, should also be encrypted to some extent to protect against traffic analysis attacks. • The standard approach for keeping sensitive data secret is to encrypt the data with a secret key that only intended receivers possess, thus achieving confidentiality.
  • 25. Data Integrity • With the implementation of confidentiality, an adversary may be unable to steal information. • This doesn’t mean the data is safe. The adversary can change the data, so as to send the sensor network into disarray. • Thus, data integrity ensures that any received data has not been altered in transit.
  • 26. Data Freshness • Need to ensure the freshness of each message. • Informally, data freshness suggests that the data is very much recent, and it ensures that no old messages have been replayed. • This requirement is especially important when there are shared-key strategies.
  • 27.
  • 28. Conclusion • Most of the attacks against security in wireless sensor networks are caused by the insertion of wrong information by the nodes which are agreed or compromised within the network. • For defending the inclusion of these false reports by compromised nodes, a mean is required for detecting these false reports. • However, developing such a detection mechanism and making it efficient represents a great research challenge. • Again, ensuring the holistic security in wireless sensor network is one of the major research issue.