SlideShare a Scribd company logo
Wireless Sensor
Network
Security
WSN Course Seminar
Dr.Saadat
by
Ahmadreza Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
2

Outline
 WSN

Specification Review
 WSN Security Concerns
 WSN Constraints
 WSN Security Requirements
 WSN Security Threats
 WSN Security Countermeasure

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
3

WSN Specification Review
 High

number of nodes
 High-density deployment of nodes
 Vast and various applications
 Energy, memory and processing limit
 No communication Infrastructure
 Remote area deployment
 Being Unattended after deployment
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
4

WSN Security Concerns
 How

to secure against physical attacks in
unattended deployments?
 How to secure in accordance with WSN
constraints?
 How to adapt security mechanisms in
other networks to WSN?
 How to design secure routing, clustering,
MAC, data aggregation and locationing
protocols?
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
5

WSN Constraints Review
 Energy

constraint
 Memory constraint
 Unreliable communication
 High latency
 Remote intermittent support

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
6

Energy Constraint
 Energy




Transducer unit
Communication unit
Processing unit

 To


need :

communicate 1 bit

800 to 1000 instructions

 Communication

consumes the most.
 Security mechanisms impose
communication overhead and more cost.
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
7

Memory Constraint
 Memory



Type :

Flash : Program code
RAM: Running application, Processing and
aggregated data

 Not

enough space to support security
mechanisms


SMART DUST: 4KB for Tiny OS, Just 4.5KB to…

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
8

Unreliable Communication
 Channel


destroying nature

Noise, Interference, fading

 Congestion


in nodes

Collision

 More

overhead to assure communication
 Less space remained to security

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
9

High Latency
 Multi

hop connection-less routing
 Congestion and need to retransmission
 But in Security synchronization is important





Security log Review
Security log correlation and analysis
Key management

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
10

Remote Intermittent Support
 Remote

deployment
 Not management and maintenance for
long periods



They are exposed to physical attacks
They need to be secured against that

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
11

WSN Security Entities
 What



Data
Resources

 From




what to protect ?

Attacks
Anomalies

 How


to Protect ?

to protect ?

Mechanisms and protocols
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
12

WSN Security requirements











Confidentiality
Integrity
Availability
Freshness
Self-organization
Self-healing
Secure Localization
Synchronization
Authentication
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
13

Security Requirements(Cont..)







Confidentiality: Data understood just at
authorized node.
Integrity : No change or modification at
intermediate nodes.
Availability : WSN service Availability in spite
of security breaches like DoS attack.
Freshness : Data is not replayed or replicated.
Self organization and healing: Protocols
dynamicity not only in … but also in security
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
14

Security Requirements(Cont..)
 Secure

Localization : where that is critical
the protocols must be robust enough like
Verifiable Multilateration.
 Authentication : Ensures integrity

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
15

WSN Security Threats
 Against

Availability: They are generally
DoS Attacks.
 Against Secrecy and Authentication:
Attacks like eavesdropping, IP spoofing
and Packet Replay.
 Against Service Integrity : Make the
network accept false data values.

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
16

Threats Against Availability
 DoS



An event to reduce a network’s capacity
to perform an expected function.
Common defense mechanisms need large
overhead and not suitable for WSN.

 DoS



attacks in general:

attack in WSN:

They are considered in different layers
Defense mechanisms are developed
specially
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
17

DoS Attack in WSN
 Physical



Jamming : continuous, intermittent, distributed
Tampering : the node or its function change

 Data





Layer:

Link Layer:

Intentional Collision: Back-off time increase
Resource Exhaustion: impose retransmission
Unfairness: degradation of real-time
applications/ weak form of DoS attack

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
18

DoS Attack in WSN


Network Layer:











Spoofing Routing Info
Selective Packet Forwarding
Sinkhole
Sybil
Wormhole
Hello Flooding
Acknowledge Spoofing

Transport Layer:



Flooding:
De-synchronization:
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
19

Network Layer DoS


Spoofing Routing Information:




An attacker may spoof, alter, or replay
routing information to disrupt traffic in the
network.
These disruptions include :
creation of routing loops
 attracting or repelling network traffic from
selected nodes
 extending or shortening source routes
 generating fake error messages
 causing network partitioning
 increasing end-to-end latency


WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
20

Network Layer DoS
 Selective Packet Forwarding:
 Multihop Nets like WSN require accurate forwarding
 An attacker may compromise a node in such a way
that it selectively forwards some messages and drops
others.
 Sinkhole:
 an attacker makes a compromised node look more
attractive to its neighbors by forging the routing
information
 Facilitates the selective forwarding
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
21

Network Layer DoS
 Sybil:





One node presents more that one identity in a network
To defeat objective of redundancy mechanisms in
distributed data storage systems in peer to peer Nets.
effective against routing algorithms, data aggregation,
voting, fair resource allocation, and foiling misbehavior
detection.

 Wormhole:


Creating low latency link between two portions of a network
over which an attacker replays network messages via :



Single node connecting two adjacent non-neighboring nodes.
Pairs of nodes in two portion of the network (Facilitates Sinkhole).
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
22

Network Layer DoS
 Hello




Flooding:

the attacker node falsely broadcasts a shorter route to the
base station through high power hello packet transmission.
All nodes in spite that of being out of the radio range of the
attacker, attempt to send packets to it.
It facilitates Sinkhole attack.

 Acknowledge



Spoofing:

attacking node may overhear packet transmissions from its
neighboring nodes and spoof the acknowledgments
The attacker is able to disseminate wrong information about
the status of the nodes
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
23

Transport Layer DoS


Flooding:







Any protocol with status keeping at connection end is
vulnerable to this.
An attacker may repeatedly make new connection
request.
The resources required by each connection are
exhausted or reach a maximum limit.
Further legitimate requests will be ignored

De-synchronization:



Disruption of an existing connection .
Accurately timed, repeatedly spoof messages to an end
host causing the host to request the retransmission of
missed frames.
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
24

DoS Attack Countermeasures

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
25

Threats Against Secrecy
 Node





Replication :

An attacker attempts to add a node to an
existing WSN by replication (i. e. copying) the
node identifier of an already existing node in
the network.
Leads to network partitioning, communication
of false sensor readings.
Accessing Crypto keys, attacker can easily
manipulate a specific segment of the network
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
26

Threats Against Secrecy


Unauthorized Data aggregation:


Eavesdropping and Passive Monitoring:





Traffic Analysis:







Possible if communication is not protected by
cryptographic mechanisms
Example: Location information gathering
identify some sensor nodes with special roles and
activities in a WSN.
It usually precedes the eavesdropping.
2 Mechanism : Rate Monitoring and Time Correlation

Camouflage:


An adversary may compromise a sensor node in a WSN
and later on use it to masquerade a normal node
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
27

Defense Against Attacks on
Sensor Privacy


Defense against Node Replication:


Randomized multicast:






Location Info is multicast to random witnesses.
Birthday Paradox is used to detect replicated
In a network of n nodes, if each location produces √n
witnesses, then, the birthday paradox predicts at least
one collision with high probability.

Line-selected multicast:







It uses network topology to detect replicated
It is based on the rumor routing protocol
If a conflicting location claim ever crosses the line
segment of location claim route to random witness,
replication is detected.
Communication overhead reduces from O(n2) to O(n√n)
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
28

Defense Against Attacks on
Unauthorized Data Aggregation


Defense against Traffic Analysis:



It prevents both rate monitoring and time
correlation.
It includes four mechanisms:
Forwarding to multiple parents
 Controlled Random Walk in multi hop path
selection to distribute packet traffic
 Random fake paths are introduced
 Random areas of high communication
activities are created to deceive the attacker


WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
29

Defense Against Attacks on Sensor
Privacy


Anonymity mechanisms:




An anonymity mechanism depersonalizes the data
before it is released from the source.
privacy and disclosure trade-off in location-based
services.
Four proposed approaches:









decentralization of storage of sensitive data
establishment of secure channel for communication
changing the pattern of data traffic
exploiting mobility of the nodes

Policy-Based approaches
Information Flooding:


Four mechanisms are proposed as follows.
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
30

Information Flooding mechanisms
to protect privacy


Baseline flooding:




Probabilistic flooding:





only a subset of nodes in the entire network participates in data
forwarding
There is packet loss possibility.

Flooding with fake messages:




every node in the network forwards a message only once
(Broadcast to all neighbors)

More sources can be introduced that inject fake messages into
the network to prevent back tracing.

Phantom flooding:


Probabilistic flooding same concept but changing the shortest
path in each packet transmission.



First phase takes hops through random walk (unicast)
Second phase floods the message through baseline flooding

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
31

Other security Mechanisms…
 Intrusion

Detection
 Secure Data Aggregation and Clustering
 Secure Routing
 Cryptography and key management
 Trust Management

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
32

Important WSN Security
Protocols
 SPIN


:

SNEP(secure network encryption protocol)
 Provides

data confidentiality, two-party data
authentication, and data freshness for peer
to peer communication.



uTELSA (timed efficient streaming loss-tolerant
authentication protocol)


provides authenticated broadcast

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
Thanks for
your attention
Questions?
The End
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir

More Related Content

What's hot

Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
Md Waresul Islam
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
RABIA ASHRAFI
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Editor IJCTER
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
Varsha Anandani
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
sofiakhatoon
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
Bala Lavanya
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
Ids presentation
Ids presentationIds presentation
Ids presentation
Solmaz Salehian
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
IJMTST Journal
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
ijwmn
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
IJERA Editor
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
Harsh Kishore Mishra
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
IJERA Editor
 

What's hot (19)

Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Security issues
Security issuesSecurity issues
Security issues
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
Ids presentation
Ids presentationIds presentation
Ids presentation
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 

Viewers also liked

Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
Tejas Wasule
 
Расширение Visual studio для ASP.NET Identity
Расширение Visual studio для ASP.NET IdentityРасширение Visual studio для ASP.NET Identity
Расширение Visual studio для ASP.NET Identity
DataArt
 
Zed innovation intro
Zed innovation introZed innovation intro
Zed innovation intro
Ziv Kohav
 
180 blue dining room training
180 blue dining room training180 blue dining room training
180 blue dining room trainingBill Buffalo
 
A Journey to Power Intelligent IT - Big Data Employed
A Journey to Power Intelligent IT - Big Data EmployedA Journey to Power Intelligent IT - Big Data Employed
A Journey to Power Intelligent IT - Big Data Employed
Mohamed Sohail
 
Visiting unpleasent places
Visiting unpleasent placesVisiting unpleasent places
Visiting unpleasent placesArpanasa
 
Bit trade labs sovereign identity fintech summit 2016
Bit trade labs sovereign identity   fintech summit 2016Bit trade labs sovereign identity   fintech summit 2016
Bit trade labs sovereign identity fintech summit 2016
Glen Frost
 
Макс Волошин «Микросервисы на практике»
Макс Волошин «Микросервисы на практике»Макс Волошин «Микросервисы на практике»
Макс Волошин «Микросервисы на практике»
DataArt
 
Presentation portfolio assessment
Presentation portfolio assessmentPresentation portfolio assessment
Presentation portfolio assessmentSandy Koh
 
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...
DataArt
 
Contratación electrónica y contratación informática
Contratación electrónica y contratación informáticaContratación electrónica y contratación informática
Contratación electrónica y contratación informática
Joel Quintana
 
A New Lump Sum for a New Generation
A New Lump Sum for a New GenerationA New Lump Sum for a New Generation
A New Lump Sum for a New Generation
UrbanBound
 
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»
DataArt
 
"Проблемы в IoT и их решение.", Артем Сорокин, DataArt
"Проблемы в IoT и их решение.", Артем Сорокин, DataArt"Проблемы в IoT и их решение.", Артем Сорокин, DataArt
"Проблемы в IoT и их решение.", Артем Сорокин, DataArt
DataArt
 
Teletrabajo en la administración pública
Teletrabajo en la administración públicaTeletrabajo en la administración pública
Teletrabajo en la administración pública
Joel Quintana
 

Viewers also liked (18)

Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Расширение Visual studio для ASP.NET Identity
Расширение Visual studio для ASP.NET IdentityРасширение Visual studio для ASP.NET Identity
Расширение Visual studio для ASP.NET Identity
 
Zed innovation intro
Zed innovation introZed innovation intro
Zed innovation intro
 
180 blue dining room training
180 blue dining room training180 blue dining room training
180 blue dining room training
 
A Journey to Power Intelligent IT - Big Data Employed
A Journey to Power Intelligent IT - Big Data EmployedA Journey to Power Intelligent IT - Big Data Employed
A Journey to Power Intelligent IT - Big Data Employed
 
Visiting unpleasent places
Visiting unpleasent placesVisiting unpleasent places
Visiting unpleasent places
 
Bit trade labs sovereign identity fintech summit 2016
Bit trade labs sovereign identity   fintech summit 2016Bit trade labs sovereign identity   fintech summit 2016
Bit trade labs sovereign identity fintech summit 2016
 
Макс Волошин «Микросервисы на практике»
Макс Волошин «Микросервисы на практике»Макс Волошин «Микросервисы на практике»
Макс Волошин «Микросервисы на практике»
 
Presentation portfolio assessment
Presentation portfolio assessmentPresentation portfolio assessment
Presentation portfolio assessment
 
Matematicas
MatematicasMatematicas
Matematicas
 
Transistores
TransistoresTransistores
Transistores
 
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...
 
Contratación electrónica y contratación informática
Contratación electrónica y contratación informáticaContratación electrónica y contratación informática
Contratación electrónica y contratación informática
 
A New Lump Sum for a New Generation
A New Lump Sum for a New GenerationA New Lump Sum for a New Generation
A New Lump Sum for a New Generation
 
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»
 
"Проблемы в IoT и их решение.", Артем Сорокин, DataArt
"Проблемы в IoT и их решение.", Артем Сорокин, DataArt"Проблемы в IoT и их решение.", Артем Сорокин, DataArt
"Проблемы в IoT и их решение.", Артем Сорокин, DataArt
 
Teletrabajo en la administración pública
Teletrabajo en la administración públicaTeletrabajo en la administración pública
Teletrabajo en la administración pública
 

Similar to Wireless sensor network security

Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
IOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
BRNSSPublicationHubI
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
IJCNC
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET Journal
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
ijcncs
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
IJAEMSJORNAL
 
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNREPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
IJNSA Journal
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
ijctet
 
76201924
7620192476201924
76201924
IJRAT
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
IRJET Journal
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
IJERA Editor
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
IOSR Journals
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
eSAT Publishing House
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
Editor IJCATR
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
IJCNCJournal
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
ahmad abdelhafeez
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
ahmad abdelhafeez
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
Abdullah Mukhtar
 

Similar to Wireless sensor network security (20)

Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
D0961927
D0961927D0961927
D0961927
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNREPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
76201924
7620192476201924
76201924
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Wireless sensor network security

  • 1. Wireless Sensor Network Security WSN Course Seminar Dr.Saadat by Ahmadreza Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 2. 2 Outline  WSN Specification Review  WSN Security Concerns  WSN Constraints  WSN Security Requirements  WSN Security Threats  WSN Security Countermeasure WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 3. 3 WSN Specification Review  High number of nodes  High-density deployment of nodes  Vast and various applications  Energy, memory and processing limit  No communication Infrastructure  Remote area deployment  Being Unattended after deployment WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 4. 4 WSN Security Concerns  How to secure against physical attacks in unattended deployments?  How to secure in accordance with WSN constraints?  How to adapt security mechanisms in other networks to WSN?  How to design secure routing, clustering, MAC, data aggregation and locationing protocols? WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 5. 5 WSN Constraints Review  Energy constraint  Memory constraint  Unreliable communication  High latency  Remote intermittent support WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 6. 6 Energy Constraint  Energy    Transducer unit Communication unit Processing unit  To  need : communicate 1 bit 800 to 1000 instructions  Communication consumes the most.  Security mechanisms impose communication overhead and more cost. WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 7. 7 Memory Constraint  Memory   Type : Flash : Program code RAM: Running application, Processing and aggregated data  Not enough space to support security mechanisms  SMART DUST: 4KB for Tiny OS, Just 4.5KB to… WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 8. 8 Unreliable Communication  Channel  destroying nature Noise, Interference, fading  Congestion  in nodes Collision  More overhead to assure communication  Less space remained to security WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 9. 9 High Latency  Multi hop connection-less routing  Congestion and need to retransmission  But in Security synchronization is important    Security log Review Security log correlation and analysis Key management WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 10. 10 Remote Intermittent Support  Remote deployment  Not management and maintenance for long periods   They are exposed to physical attacks They need to be secured against that WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 11. 11 WSN Security Entities  What   Data Resources  From   what to protect ? Attacks Anomalies  How  to Protect ? to protect ? Mechanisms and protocols WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 12. 12 WSN Security requirements          Confidentiality Integrity Availability Freshness Self-organization Self-healing Secure Localization Synchronization Authentication WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 13. 13 Security Requirements(Cont..)      Confidentiality: Data understood just at authorized node. Integrity : No change or modification at intermediate nodes. Availability : WSN service Availability in spite of security breaches like DoS attack. Freshness : Data is not replayed or replicated. Self organization and healing: Protocols dynamicity not only in … but also in security WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 14. 14 Security Requirements(Cont..)  Secure Localization : where that is critical the protocols must be robust enough like Verifiable Multilateration.  Authentication : Ensures integrity WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 15. 15 WSN Security Threats  Against Availability: They are generally DoS Attacks.  Against Secrecy and Authentication: Attacks like eavesdropping, IP spoofing and Packet Replay.  Against Service Integrity : Make the network accept false data values. WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 16. 16 Threats Against Availability  DoS   An event to reduce a network’s capacity to perform an expected function. Common defense mechanisms need large overhead and not suitable for WSN.  DoS   attacks in general: attack in WSN: They are considered in different layers Defense mechanisms are developed specially WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 17. 17 DoS Attack in WSN  Physical   Jamming : continuous, intermittent, distributed Tampering : the node or its function change  Data    Layer: Link Layer: Intentional Collision: Back-off time increase Resource Exhaustion: impose retransmission Unfairness: degradation of real-time applications/ weak form of DoS attack WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 18. 18 DoS Attack in WSN  Network Layer:         Spoofing Routing Info Selective Packet Forwarding Sinkhole Sybil Wormhole Hello Flooding Acknowledge Spoofing Transport Layer:   Flooding: De-synchronization: WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 19. 19 Network Layer DoS  Spoofing Routing Information:   An attacker may spoof, alter, or replay routing information to disrupt traffic in the network. These disruptions include : creation of routing loops  attracting or repelling network traffic from selected nodes  extending or shortening source routes  generating fake error messages  causing network partitioning  increasing end-to-end latency  WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 20. 20 Network Layer DoS  Selective Packet Forwarding:  Multihop Nets like WSN require accurate forwarding  An attacker may compromise a node in such a way that it selectively forwards some messages and drops others.  Sinkhole:  an attacker makes a compromised node look more attractive to its neighbors by forging the routing information  Facilitates the selective forwarding WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 21. 21 Network Layer DoS  Sybil:    One node presents more that one identity in a network To defeat objective of redundancy mechanisms in distributed data storage systems in peer to peer Nets. effective against routing algorithms, data aggregation, voting, fair resource allocation, and foiling misbehavior detection.  Wormhole:  Creating low latency link between two portions of a network over which an attacker replays network messages via :   Single node connecting two adjacent non-neighboring nodes. Pairs of nodes in two portion of the network (Facilitates Sinkhole). WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 22. 22 Network Layer DoS  Hello    Flooding: the attacker node falsely broadcasts a shorter route to the base station through high power hello packet transmission. All nodes in spite that of being out of the radio range of the attacker, attempt to send packets to it. It facilitates Sinkhole attack.  Acknowledge   Spoofing: attacking node may overhear packet transmissions from its neighboring nodes and spoof the acknowledgments The attacker is able to disseminate wrong information about the status of the nodes WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 23. 23 Transport Layer DoS  Flooding:      Any protocol with status keeping at connection end is vulnerable to this. An attacker may repeatedly make new connection request. The resources required by each connection are exhausted or reach a maximum limit. Further legitimate requests will be ignored De-synchronization:   Disruption of an existing connection . Accurately timed, repeatedly spoof messages to an end host causing the host to request the retransmission of missed frames. WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 24. 24 DoS Attack Countermeasures WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 25. 25 Threats Against Secrecy  Node    Replication : An attacker attempts to add a node to an existing WSN by replication (i. e. copying) the node identifier of an already existing node in the network. Leads to network partitioning, communication of false sensor readings. Accessing Crypto keys, attacker can easily manipulate a specific segment of the network WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 26. 26 Threats Against Secrecy  Unauthorized Data aggregation:  Eavesdropping and Passive Monitoring:    Traffic Analysis:     Possible if communication is not protected by cryptographic mechanisms Example: Location information gathering identify some sensor nodes with special roles and activities in a WSN. It usually precedes the eavesdropping. 2 Mechanism : Rate Monitoring and Time Correlation Camouflage:  An adversary may compromise a sensor node in a WSN and later on use it to masquerade a normal node WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 27. 27 Defense Against Attacks on Sensor Privacy  Defense against Node Replication:  Randomized multicast:     Location Info is multicast to random witnesses. Birthday Paradox is used to detect replicated In a network of n nodes, if each location produces √n witnesses, then, the birthday paradox predicts at least one collision with high probability. Line-selected multicast:     It uses network topology to detect replicated It is based on the rumor routing protocol If a conflicting location claim ever crosses the line segment of location claim route to random witness, replication is detected. Communication overhead reduces from O(n2) to O(n√n) WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 28. 28 Defense Against Attacks on Unauthorized Data Aggregation  Defense against Traffic Analysis:   It prevents both rate monitoring and time correlation. It includes four mechanisms: Forwarding to multiple parents  Controlled Random Walk in multi hop path selection to distribute packet traffic  Random fake paths are introduced  Random areas of high communication activities are created to deceive the attacker  WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 29. 29 Defense Against Attacks on Sensor Privacy  Anonymity mechanisms:    An anonymity mechanism depersonalizes the data before it is released from the source. privacy and disclosure trade-off in location-based services. Four proposed approaches:       decentralization of storage of sensitive data establishment of secure channel for communication changing the pattern of data traffic exploiting mobility of the nodes Policy-Based approaches Information Flooding:  Four mechanisms are proposed as follows. WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 30. 30 Information Flooding mechanisms to protect privacy  Baseline flooding:   Probabilistic flooding:    only a subset of nodes in the entire network participates in data forwarding There is packet loss possibility. Flooding with fake messages:   every node in the network forwards a message only once (Broadcast to all neighbors) More sources can be introduced that inject fake messages into the network to prevent back tracing. Phantom flooding:  Probabilistic flooding same concept but changing the shortest path in each packet transmission.   First phase takes hops through random walk (unicast) Second phase floods the message through baseline flooding WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 31. 31 Other security Mechanisms…  Intrusion Detection  Secure Data Aggregation and Clustering  Secure Routing  Cryptography and key management  Trust Management WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 32. 32 Important WSN Security Protocols  SPIN  : SNEP(secure network encryption protocol)  Provides data confidentiality, two-party data authentication, and data freshness for peer to peer communication.  uTELSA (timed efficient streaming loss-tolerant authentication protocol)  provides authenticated broadcast WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 33. Thanks for your attention Questions? The End WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir