Wireless sensor networks (WSN) are networks of distributed autonomous sensors that monitor environmental or physical conditions. A WSN consists of sensor nodes that collect data and transmit it wirelessly to gateways or base stations. Key components of sensor nodes include processors, transceivers, memory, power sources, and sensors. The design of WSNs aims to minimize node size, power consumption, and maximize diversity, robustness, security, connectivity, and scalability. Common routing protocols for WSNs include flat, hierarchical, location-based, and QoS-based protocols. Security challenges in WSNs include physical tampering, jamming, spoofing, and Sybil attacks. Defenses utilize techniques like encryption, authentication,
This document discusses security challenges in wireless sensor networks. It covers several topics: why security is needed in WSNs given their mission-critical applications; why security is more complicated in WSNs due to resource constraints of sensor nodes; common security requirements like confidentiality, integrity, and availability; guiding principles for securing WSNs like decentralized management and adaptive security; common attacks against WSNs at different layers of the protocol stack; and open research issues regarding cryptography, key management, secure data aggregation, and other high-level security mechanisms for WSNs.
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
Security and privacy in Wireless Sensor NetworksImran Khan
This document discusses security and privacy issues in emerging wireless networks such as wireless sensor networks and vehicular ad hoc networks. It identifies several factors that make wireless networks more vulnerable than wired networks, such as broadcast communication enabling eavesdropping, mobility revealing user location, and resource constraints opening doors to denial of service attacks. The document examines challenges for unattended wireless sensor networks that operate without a continuous sink presence, and discusses potential solutions like data protection through encryption and authentication. It concludes that new security challenges arise from features like intermittent connectivity, and that infrastructure-independent and new cryptographic techniques are needed to address issues in emerging wireless networks.
This document discusses security issues in wireless sensor networks. It begins with an introduction to wireless sensor networks and then explores the feasibility of basic security schemes like cryptography, steganography, and physical layer access. It outlines several common security threats to wireless sensor networks such as denial of service attacks, information interception, Sybil attacks, and wormhole attacks. Finally, it reviews some proposed security schemes and approaches to wireless sensor network security, including holistic security methods and energy-efficient designs.
1) The document discusses security attacks in wireless sensor networks (WSNs). It provides an overview of the types of WSNs and their components.
2) It describes the main security challenges in WSNs like remote locations, lack of central control, and resource constraints.
3) The document outlines different security attacks in WSNs including denial of service attacks, traffic analysis, wormhole attacks, and jamming.
4) Defensive measures to secure WSNs like key establishment and intrusion detection are also discussed.
Wireless sensor networks consist of distributed autonomous devices that can monitor various environmental conditions. Securing these networks is challenging due to constraints on sensors' processing, memory, and battery power. Attacks on wireless sensor networks can target security mechanisms or routing mechanisms. Common attacks include denial of service through jamming, spoofing and altering information in transit, replication attacks, and physical node destruction. Effective security schemes must provide data confidentiality, integrity, and freshness given sensors' limitations. Developing efficient detection of compromised nodes reporting false data while ensuring holistic security in wireless sensor networks remains an important research challenge.
1) The document discusses security issues in wireless sensor networks, specifically focusing on attacks against routing protocols and potential countermeasures. It outlines common attacks like spoofing, selective forwarding, sinkhole attacks, Sybil attacks, wormholes, and HELLO flood attacks.
2) The document then provides an overview of potential countermeasures like link layer security, identity verification protocols, verification of link bidirectionality, and multipath routing.
3) Finally, the document emphasizes the importance of secure routing protocol design and highlights the need for protocols to incorporate security features to defend against insider and outsider attacks.
This document summarizes key aspects of wireless sensor networks (WSNs) including common threats, operational paradigms, and key distribution techniques. It discusses the main operational paradigms of WSNs: simple collection and transmittal, forwarding, receive and process commands, self-organization, and data aggregation. For each, it outlines vulnerabilities and potential solutions. It also summarizes three common key distribution schemes: using a single network-wide key, asymmetric cryptography, and pairwise keys. For each it discusses properties and drawbacks regarding resilience, scalability, and memory requirements.
This document discusses security challenges in wireless sensor networks. It covers several topics: why security is needed in WSNs given their mission-critical applications; why security is more complicated in WSNs due to resource constraints of sensor nodes; common security requirements like confidentiality, integrity, and availability; guiding principles for securing WSNs like decentralized management and adaptive security; common attacks against WSNs at different layers of the protocol stack; and open research issues regarding cryptography, key management, secure data aggregation, and other high-level security mechanisms for WSNs.
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
Security and privacy in Wireless Sensor NetworksImran Khan
This document discusses security and privacy issues in emerging wireless networks such as wireless sensor networks and vehicular ad hoc networks. It identifies several factors that make wireless networks more vulnerable than wired networks, such as broadcast communication enabling eavesdropping, mobility revealing user location, and resource constraints opening doors to denial of service attacks. The document examines challenges for unattended wireless sensor networks that operate without a continuous sink presence, and discusses potential solutions like data protection through encryption and authentication. It concludes that new security challenges arise from features like intermittent connectivity, and that infrastructure-independent and new cryptographic techniques are needed to address issues in emerging wireless networks.
This document discusses security issues in wireless sensor networks. It begins with an introduction to wireless sensor networks and then explores the feasibility of basic security schemes like cryptography, steganography, and physical layer access. It outlines several common security threats to wireless sensor networks such as denial of service attacks, information interception, Sybil attacks, and wormhole attacks. Finally, it reviews some proposed security schemes and approaches to wireless sensor network security, including holistic security methods and energy-efficient designs.
1) The document discusses security attacks in wireless sensor networks (WSNs). It provides an overview of the types of WSNs and their components.
2) It describes the main security challenges in WSNs like remote locations, lack of central control, and resource constraints.
3) The document outlines different security attacks in WSNs including denial of service attacks, traffic analysis, wormhole attacks, and jamming.
4) Defensive measures to secure WSNs like key establishment and intrusion detection are also discussed.
Wireless sensor networks consist of distributed autonomous devices that can monitor various environmental conditions. Securing these networks is challenging due to constraints on sensors' processing, memory, and battery power. Attacks on wireless sensor networks can target security mechanisms or routing mechanisms. Common attacks include denial of service through jamming, spoofing and altering information in transit, replication attacks, and physical node destruction. Effective security schemes must provide data confidentiality, integrity, and freshness given sensors' limitations. Developing efficient detection of compromised nodes reporting false data while ensuring holistic security in wireless sensor networks remains an important research challenge.
1) The document discusses security issues in wireless sensor networks, specifically focusing on attacks against routing protocols and potential countermeasures. It outlines common attacks like spoofing, selective forwarding, sinkhole attacks, Sybil attacks, wormholes, and HELLO flood attacks.
2) The document then provides an overview of potential countermeasures like link layer security, identity verification protocols, verification of link bidirectionality, and multipath routing.
3) Finally, the document emphasizes the importance of secure routing protocol design and highlights the need for protocols to incorporate security features to defend against insider and outsider attacks.
This document summarizes key aspects of wireless sensor networks (WSNs) including common threats, operational paradigms, and key distribution techniques. It discusses the main operational paradigms of WSNs: simple collection and transmittal, forwarding, receive and process commands, self-organization, and data aggregation. For each, it outlines vulnerabilities and potential solutions. It also summarizes three common key distribution schemes: using a single network-wide key, asymmetric cryptography, and pairwise keys. For each it discusses properties and drawbacks regarding resilience, scalability, and memory requirements.
The document outlines the key topics in wireless sensor network (WSN) security. It begins with an introduction to WSN specifications, constraints, security requirements and threats. It then discusses various denial of service attacks against WSN availability, as well as threats against data secrecy. Potential countermeasures are also reviewed, along with defenses against different privacy attacks. Finally, important WSN security protocols are mentioned. The overall document provides an overview of important WSN security concepts and challenges due to the unique constraints of sensor networks.
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
While wireless sensor networks face security challenges, addressing issues like confidentiality, integrity, and availability is critical for successful deployment. The document discusses these security requirements and explains how attacks can target different network layers. It provides examples of physical layer attacks like jamming and tampering. At higher layers, attacks include collisions and resource exhaustion in the data link layer, and spoofing, selective forwarding, sinkholes, Sybil attacks and wormholes in the network layer. Transport layer attacks involve flooding and desynchronization. Confidentiality, integrity, and cryptography are also discussed as important security concepts for wireless sensor networks.
1) Wireless sensor networks consist of hundreds or thousands of low-cost, low-power sensor nodes deployed to monitor environments. They require security to protect data confidentiality, integrity, and availability given their resource constraints and vulnerability to physical attacks.
2) Standard approaches to achieve security include encrypting data for confidentiality, using protocols like uTESLA for integrity and time synchronization for freshness. However, sensor nodes face obstacles like limited memory, energy constraints, and unreliable communication.
3) Wireless sensor networks are susceptible to various network layer attacks like spoofing, selective forwarding, sinkhole attacks, Sybil attacks, and wormholes. Countermeasures include link layer security, geographic routing, multi-path routing, and authentication.
This document discusses security threats and challenges in wireless sensor networks. It outlines various threats including passive information gathering, node subversion, false nodes, node malfunctions, message corruption and denial of service attacks. It also describes different key distribution techniques for sensor networks such as single network keys, asymmetric cryptography, pairwise keys, and base station based key distribution. Random key predistribution schemes are explained where sensors are loaded with random keys before deployment. The document also discusses watermarking techniques that can be used to authenticate data collected by sensor networks through modulating sensor parameters or embedding signatures during data processing.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
WSN security faces many challenges due to limited sensor resources and operating in hostile environments. It requires high security levels to protect sensitive data while maintaining energy efficiency. However, current research has not fully addressed the conflict between security and limited resources. WSNs are vulnerable to various attacks like jamming, eavesdropping, and false routing. Providing security introduces additional processing and power demands on sensors. Many open research problems remain in developing scalable and dynamic security solutions for wireless sensor networks.
Random key material distribution in wireless sensor networksVarsha Anandani
The document discusses random key material distribution for securing wireless sensor networks. It first provides background on wireless sensor networks and their design challenges. It then discusses security issues like authentication and key agreement. It describes threats like node duplication and wormhole attacks. The document proposes distributing a random subset of keys from a large pool to each sensor node so they can find common keys to securely communicate and form a connected network, without a central trusted authority. However, compromising enough nodes could allow reconstructing the full key pool.
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
This document provides an overview of sensor network security. It begins with objectives to learn about ad hoc and sensor network security aspects, attacks, and transport layer security issues. It then covers topics like security requirements, challenges in provisioning security, network security attacks categorized by layer (physical, data link, network, transport, application), and possible solutions for jamming, tampering, black hole attacks, and flooding attacks. The document also discusses key distribution, management techniques and procedures, and secure routing protocols like SPINS.
Intrusion detection systems in wireless sensor networksBala Lavanya
This document discusses intrusion detection systems in wireless sensor networks. It begins with an introduction to wireless sensor networks and why intrusion detection is needed given security threats due to the wireless nature of these networks. It then discusses different types of security attacks like passive and active attacks. The document describes different intrusion detection system approaches including signature-based, anomaly-based, and specification-based systems. It concludes that intrusion detection aims to detect attacks on sensor nodes and helps secure wireless sensor networks as their usage increases.
The document discusses secure routing protocols for wireless sensor networks. It begins by describing the components and design challenges of wireless sensor networks, including limited resources and security issues. It then discusses various attacks on wireless sensor networks like spoofing, selective forwarding, and sinkhole attacks. The document analyzes several secure routing protocols that aim to prevent such attacks, including Distributed Security Framework, Multipath Data Transfer Protocol, Secure and Energy Efficient Disjoint Route, and Bio-inspired Self-Organized Secure Autonomous Routing Protocol. It concludes by discussing future work to develop a new routing approach with low energy consumption, high delivery ratio, and strong security against possible threats.
The document discusses defense mechanisms against flooding attacks in mobile ad hoc networks (MANETs). It begins with broad background on networks and network security. It then discusses specific areas including MANETs and flooding attacks. The document reviews several papers from 2008-2011 on related topics. It discusses methodologies, advantages and drawbacks of approaches for detecting and preventing flooding attacks in MANETs, including using period-based mechanisms, trust-based classification of nodes, and probabilistic broadcasting. The comparative study section provides brief summaries of several papers analyzing defenses against flooding attacks in MANETs.
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
This document proposes a security model for wireless sensor networks that addresses cloning attacks, man-in-the-middle attacks, and replay attacks. It divides sensor nodes into base stations, cluster heads, and member nodes. Each node knows its cluster head, and base stations store information on all nodes. The model uses a "social fingerprint" based on neighboring nodes and zero knowledge protocols to detect cloned nodes and verify sender authenticity without transmitting sensitive information. Screenshots demonstrate implementation and the model is analyzed for various attack scenarios, performance, and cryptographic strength.
This document summarizes a wireless sensor network system implemented by the authors. The system uses 4 sensor nodes to sense temperature and a control node interfaced with a base station PC. It implements a modified version of the TOPDISC topology discovery algorithm using DHCP for dynamic addressing. The routing algorithm uses a mixture of spanning tree and N-link state protocols. Future enhancements include implementing fail safes and fully configuring the wireless sensor network system.
Wireless sensor networks require a high level of security even though their resources are limited. They face many types of attacks due to their broadcast transmissions and deployment in hostile environments without physical protection. Attacks can target the information in transit, different layers of the protocol stack, and seek to overwhelm the network. While some challenges have been addressed, research is still needed to resolve conflicts between security and limited resources in wireless sensor networks.
The document discusses security issues in mobile ad hoc networks (MANETs). It begins by introducing MANETs and noting their vulnerability to attacks due to lack of centralized authority. It then covers security goals, types of attacks (passive vs. active; internal vs. external), examples of passive attacks like eavesdropping and active attacks like jamming and wormholes. The document also discusses security schemes like intrusion detection and secure routing techniques. It concludes by identifying research issues around improving MANET security.
This document summarizes a technical seminar report on wireless sensor networks submitted by two students, Kapil Dev Dwivedi and Shusma Sandey, to their professor Ravi Ranjan Mishra. The 5-page report includes an abstract, introduction to wireless sensor networks covering their technology, history and architecture, sensor technology, features of WSNs, applications of WSNs including environmental monitoring and health monitoring, standardization, and references.
free seminar topics for your presentations. A must one helpful guide for all the students. To download useful study and other e-books, visit : http://mitswebworld.blogspot.com
The document outlines the key topics in wireless sensor network (WSN) security. It begins with an introduction to WSN specifications, constraints, security requirements and threats. It then discusses various denial of service attacks against WSN availability, as well as threats against data secrecy. Potential countermeasures are also reviewed, along with defenses against different privacy attacks. Finally, important WSN security protocols are mentioned. The overall document provides an overview of important WSN security concepts and challenges due to the unique constraints of sensor networks.
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
While wireless sensor networks face security challenges, addressing issues like confidentiality, integrity, and availability is critical for successful deployment. The document discusses these security requirements and explains how attacks can target different network layers. It provides examples of physical layer attacks like jamming and tampering. At higher layers, attacks include collisions and resource exhaustion in the data link layer, and spoofing, selective forwarding, sinkholes, Sybil attacks and wormholes in the network layer. Transport layer attacks involve flooding and desynchronization. Confidentiality, integrity, and cryptography are also discussed as important security concepts for wireless sensor networks.
1) Wireless sensor networks consist of hundreds or thousands of low-cost, low-power sensor nodes deployed to monitor environments. They require security to protect data confidentiality, integrity, and availability given their resource constraints and vulnerability to physical attacks.
2) Standard approaches to achieve security include encrypting data for confidentiality, using protocols like uTESLA for integrity and time synchronization for freshness. However, sensor nodes face obstacles like limited memory, energy constraints, and unreliable communication.
3) Wireless sensor networks are susceptible to various network layer attacks like spoofing, selective forwarding, sinkhole attacks, Sybil attacks, and wormholes. Countermeasures include link layer security, geographic routing, multi-path routing, and authentication.
This document discusses security threats and challenges in wireless sensor networks. It outlines various threats including passive information gathering, node subversion, false nodes, node malfunctions, message corruption and denial of service attacks. It also describes different key distribution techniques for sensor networks such as single network keys, asymmetric cryptography, pairwise keys, and base station based key distribution. Random key predistribution schemes are explained where sensors are loaded with random keys before deployment. The document also discusses watermarking techniques that can be used to authenticate data collected by sensor networks through modulating sensor parameters or embedding signatures during data processing.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
WSN security faces many challenges due to limited sensor resources and operating in hostile environments. It requires high security levels to protect sensitive data while maintaining energy efficiency. However, current research has not fully addressed the conflict between security and limited resources. WSNs are vulnerable to various attacks like jamming, eavesdropping, and false routing. Providing security introduces additional processing and power demands on sensors. Many open research problems remain in developing scalable and dynamic security solutions for wireless sensor networks.
Random key material distribution in wireless sensor networksVarsha Anandani
The document discusses random key material distribution for securing wireless sensor networks. It first provides background on wireless sensor networks and their design challenges. It then discusses security issues like authentication and key agreement. It describes threats like node duplication and wormhole attacks. The document proposes distributing a random subset of keys from a large pool to each sensor node so they can find common keys to securely communicate and form a connected network, without a central trusted authority. However, compromising enough nodes could allow reconstructing the full key pool.
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
This document provides an overview of sensor network security. It begins with objectives to learn about ad hoc and sensor network security aspects, attacks, and transport layer security issues. It then covers topics like security requirements, challenges in provisioning security, network security attacks categorized by layer (physical, data link, network, transport, application), and possible solutions for jamming, tampering, black hole attacks, and flooding attacks. The document also discusses key distribution, management techniques and procedures, and secure routing protocols like SPINS.
Intrusion detection systems in wireless sensor networksBala Lavanya
This document discusses intrusion detection systems in wireless sensor networks. It begins with an introduction to wireless sensor networks and why intrusion detection is needed given security threats due to the wireless nature of these networks. It then discusses different types of security attacks like passive and active attacks. The document describes different intrusion detection system approaches including signature-based, anomaly-based, and specification-based systems. It concludes that intrusion detection aims to detect attacks on sensor nodes and helps secure wireless sensor networks as their usage increases.
The document discusses secure routing protocols for wireless sensor networks. It begins by describing the components and design challenges of wireless sensor networks, including limited resources and security issues. It then discusses various attacks on wireless sensor networks like spoofing, selective forwarding, and sinkhole attacks. The document analyzes several secure routing protocols that aim to prevent such attacks, including Distributed Security Framework, Multipath Data Transfer Protocol, Secure and Energy Efficient Disjoint Route, and Bio-inspired Self-Organized Secure Autonomous Routing Protocol. It concludes by discussing future work to develop a new routing approach with low energy consumption, high delivery ratio, and strong security against possible threats.
The document discusses defense mechanisms against flooding attacks in mobile ad hoc networks (MANETs). It begins with broad background on networks and network security. It then discusses specific areas including MANETs and flooding attacks. The document reviews several papers from 2008-2011 on related topics. It discusses methodologies, advantages and drawbacks of approaches for detecting and preventing flooding attacks in MANETs, including using period-based mechanisms, trust-based classification of nodes, and probabilistic broadcasting. The comparative study section provides brief summaries of several papers analyzing defenses against flooding attacks in MANETs.
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
This document proposes a security model for wireless sensor networks that addresses cloning attacks, man-in-the-middle attacks, and replay attacks. It divides sensor nodes into base stations, cluster heads, and member nodes. Each node knows its cluster head, and base stations store information on all nodes. The model uses a "social fingerprint" based on neighboring nodes and zero knowledge protocols to detect cloned nodes and verify sender authenticity without transmitting sensitive information. Screenshots demonstrate implementation and the model is analyzed for various attack scenarios, performance, and cryptographic strength.
This document summarizes a wireless sensor network system implemented by the authors. The system uses 4 sensor nodes to sense temperature and a control node interfaced with a base station PC. It implements a modified version of the TOPDISC topology discovery algorithm using DHCP for dynamic addressing. The routing algorithm uses a mixture of spanning tree and N-link state protocols. Future enhancements include implementing fail safes and fully configuring the wireless sensor network system.
Wireless sensor networks require a high level of security even though their resources are limited. They face many types of attacks due to their broadcast transmissions and deployment in hostile environments without physical protection. Attacks can target the information in transit, different layers of the protocol stack, and seek to overwhelm the network. While some challenges have been addressed, research is still needed to resolve conflicts between security and limited resources in wireless sensor networks.
The document discusses security issues in mobile ad hoc networks (MANETs). It begins by introducing MANETs and noting their vulnerability to attacks due to lack of centralized authority. It then covers security goals, types of attacks (passive vs. active; internal vs. external), examples of passive attacks like eavesdropping and active attacks like jamming and wormholes. The document also discusses security schemes like intrusion detection and secure routing techniques. It concludes by identifying research issues around improving MANET security.
This document summarizes a technical seminar report on wireless sensor networks submitted by two students, Kapil Dev Dwivedi and Shusma Sandey, to their professor Ravi Ranjan Mishra. The 5-page report includes an abstract, introduction to wireless sensor networks covering their technology, history and architecture, sensor technology, features of WSNs, applications of WSNs including environmental monitoring and health monitoring, standardization, and references.
free seminar topics for your presentations. A must one helpful guide for all the students. To download useful study and other e-books, visit : http://mitswebworld.blogspot.com
1) The document discusses shortest path algorithms and their application to traffic assignment problems, comparing the performance of CPU vs GPU implementations.
2) It finds that GPU implementations can be 45x faster than CPU for problems with massive parallelizable data like traffic simulations.
3) However, GPU programming requires more specialized knowledge and hardware restrictions limit accessibility, while CPU remains more flexible but less optimized for large datasets.
A Stratellite is a type of satellite that is stationed in the stratosphere at an altitude of about 13 miles, rather than in orbit. It can provide clear communications coverage to an entire metropolitan area as well as rural areas. Stratellites are airships that carry payloads and communication equipment. They can remain stationary in the stratosphere for long periods of time, providing services like broadband internet, cell phone, and television coverage to millions of users simultaneously. Stratellites have advantages over traditional satellites in that they are cheaper to launch and maintain, and can provide continuous coverage from the stratosphere for up to a year at a time.
The document discusses wireless power transmission through solar power satellites (SPS). It describes how Nicola Tesla first proposed wireless power transmission and the three main systems used: microwaves, resonance, and solar cells. SPS would collect solar energy using large solar panels in space and transmit it to large receiving stations on Earth via microwave beams. The key components of SPS are the solar panels on the satellite, a large transmitting antenna (spacetenna), and rectifying antennas (rectennas) on Earth. SPS could provide a reliable, efficient, and renewable source of energy without pollution but establishing a full-scale SPS network would be extremely complex and costly with current technology.
A GPU is a specialized microprocessor that accelerates 3D and 2D graphics. It was defined in 1999 by Nvidia who marketed the first GPU chip. GPUs are efficient at manipulating and displaying computer graphics compared to CPUs. The GPU pipeline receives geometry from the CPU and provides pictures as output. It processes through stages of vertex processing, triangle setup, pixel processing, and writing to memory interfaces like frame buffers and textures. GPUs are used widely in applications like gaming, CAD tools, and computer graphics due to their powerful graphics processing capabilities.
The document discusses GPU architecture and computing. It describes how GPUs have evolved from specialized graphics processors into general parallel computing devices. The document outlines GPU architecture including the graphics pipeline, use of shader programs, and SPMD programming model. It also discusses virtualizing GPUs through front-end and back-end approaches to enable sharing of physical GPUs across VMs.
F.A.S.T. provides engineering solutions such as coaching, projects, training, placements, and publications. It lists 380 seminar topics in various fields of engineering and technology, such as renewable energy, biomedical devices, aerospace, robotics, and more. The phone number is provided for queries regarding seminars or other engineering services.
The document discusses the evolution of GPU architecture and capabilities over time. It describes how GPUs have become massively parallel processors with programmable capabilities beyond just graphics. The document outlines the core components of a GPU including the graphics pipeline and programming model. It also discusses how GPUs are well suited for parallel, data-intensive applications and how their capabilities have expanded into general purpose computing through technologies like CUDA.
This document discusses stratellites, which are high-altitude airships that can be used for wireless communication networks instead of satellites or cell towers. Stratellites are unmanned balloons filled with helium that hover in the stratosphere at around 20 km altitude using solar-powered propellers. Each stratellite can service an area of 300,000 square miles. They have advantages over satellites such as lower latency, lower launch costs, and the ability to provide high-speed broadband access to remote areas. Some potential applications include providing national wireless broadband networks for voice, video, and internet access.
Wireless power transmission from solar power satelliteReena Sunil Kumar
This document discusses wireless power transmission from solar power satellites. It provides a history of wireless power transmission dating back to Maxwell and Tesla. It describes how wireless power transmission works by converting electrical energy to microwave energy, transmitting it via antennas, and converting it back to electrical energy via rectennas. It discusses technologies used for different components like transmitters, antennas, rectennas. It also summarizes models for solar power satellites from NASA and JAXA and compares their parameters and estimated efficiencies.
Stratellites are proposed as an alternative to satellites for wireless communication. A stratellite would be a solar-powered airship stationed in the stratosphere at an altitude of around 13 miles, allowing it to provide satellite-like communication services to a large area without the latency issues of satellites in geostationary orbit. Stratellites could provide two-way broadband access across hundreds of thousands of square miles with lower costs than launching and maintaining thousands of cell towers. However, stratellites have not been fully commercialized and would need to overcome challenges of air traffic control and weather stability in the stratosphere.
Topic on Underwater Communication which includes both underwater wireless and wired communication . A full detailed overview about the topic has been given. Pictures are given to visualize the topic in better way. Covers a major potion like Hydrophones and SONAR. Can be presented as a seminar topic as well .
Édouard Estaunié coined the term "télécommunication" in 1904 from the Greek prefix "tele-" meaning "far off" and the Latin word "communicare" meaning "to share". The first commercial electrical telegraph was constructed in 1839 and the first commercial telephone services began in the late 1870s. Today, Bharti Airtel is India's largest telecommunications company with over 300 million subscribers across its mobile, fixed line, high speed broadband and DTH services. Airtel continues to invest heavily in expanding its network across India with a goal of covering 95% of the population by 2010.
Wireless sensor networks combine sensing, computation and communication capabilities into small sensor nodes. A wireless sensor network consists of multiple sensor nodes that communicate wirelessly to perform distributed sensing tasks. Each sensor node contains components for power, computation, sensing and communication. Security is important for wireless sensor networks due to their widespread applications and vulnerabilities like traffic analysis attacks and Sybil attacks. Common security techniques for wireless sensor networks include encryption, cryptography and access control protocols.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document discusses wireless sensor networks and describes their key characteristics. It notes that wireless sensor networks consist of low-power smart sensor nodes distributed over a large field to enable wireless sensing and data networking. The sensor nodes contain sensors, processors, memory, and radios. Wireless sensor networks can be either unstructured with dense node distribution or structured with few scattered nodes.
This document provides an analysis of security issues and solutions for routing protocols in wireless sensor networks and wireless mesh networks. It discusses various threats and attacks at different layers of the OSI model, including jamming, man-in-the-middle attacks, and denial-of-service attacks at the physical layer. At higher layers, threats include selective forwarding, sinkhole attacks, and wormhole attacks. The document then outlines some solutions, such as intrusion prevention, intrusion detection systems, and key management techniques. It concludes by discussing prospects for improved security through techniques like elliptic curve cryptography and quantum cryptography.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
This document discusses security challenges in wireless sensor networks. It outlines key challenges like limited energy and communication capabilities as sensors are often deployed in accessible areas. It discusses approaches for secure key establishment, privacy concerns around surveillance, threats like denial of service attacks, and the need for secure routing, intrusion detection, and data aggregation given the resource constraints of sensor networks. Research is still needed to address security challenges posed by the unique aspects of sensor network environments and applications.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
This document summarizes security issues and challenges in wireless sensor networks (WSNs). WSNs are vulnerable to various security threats due to their wireless nature and constrained resources. The document outlines key requirements for WSN security like confidentiality, integrity, authentication, and availability. It discusses obstacles to security in WSNs like limited resources, unreliable communication, and unattended operation. Common attacks on WSNs are categorized as insider vs outsider, passive vs active, and mote-class vs laptop-class. The document provides a brief overview of security issues and threats at different layers of a WSN.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
Key management techniques in wireless sensor networksIJNSA Journal
The way that is used to achieve most important security requirements is the cryptography. Cryptography mainly depends on what is called cryptography keys; the cryptographic keys required to be managed by using a robustness technique that guarantees the needed security requirements. So first of all, the necessary keys need to be distributed to the nodes before they are disseminated in the target area, and then let the sensors that need to communicate establish its secure communication by having a deal on what is called pair-wise key, and allow the refreshment process for those keys to be occurred successfully when it is needed, and finally, having the ability to revoke the keys that related to compromised nodes. These phases are performing the process that is called Key Management. In this paper we will explain different key management schemes, critique them theoretically, and propose an idea as a way out for the expectedproblems in one of these schemes.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
This document summarizes an initial survey on fault tolerance and implementation in wireless sensor networks. It discusses wireless sensor networks and their applications. It covers sources of faults like node, network, and sink faults. It also discusses different fault tolerance techniques like preventive and curative. Fault tolerance can be implemented at different layers like hardware, software, and network communication layers. The document surveys existing literature on fault tolerance classification and mechanisms to improve reliability, survivability and performance in wireless sensor networks.
The document provides an overview of sensor networks, which consist of low-cost, low-power sensor devices that can collect, process, analyze, and disseminate data from various environments. Sensor networks enable information gathering and processing through reliable monitoring using small, wireless sensor nodes. Key challenges for sensor networks include extending the lifetime of the network given limited energy resources and adapting to changing topologies as nodes fail or move. Sensor networks operate using self-organizing, multi-hop wireless connections between nodes that coordinate sensing tasks and route data back to central access points.
The document provides an overview of sensor networks, which consist of low-cost, low-power sensor devices that can collect, process, analyze, and disseminate data from various environments. Sensor networks enable information gathering and processing through reliable monitoring using small, wireless sensor nodes. Key challenges for sensor networks include extending the lifetime of the network given limited energy resources and adapting to changing topologies as nodes fail or move. Sensor networks operate using self-organizing, multi-hop wireless connections between nodes that coordinate sensing tasks and route data back to central access points.
The document provides an overview of sensor networks, which consist of low-cost, low-power sensor devices that can collect, process, analyze, and disseminate data from various environments. Sensor networks enable information gathering and processing through reliable monitoring using small, wireless sensor nodes. Key challenges for sensor networks include extending the lifetime of the network given limited energy resources and adapting to changing topologies as nodes fail or move. Sensor networks operate using self-organizing, multi-hop wireless connections between nodes that coordinate sensing tasks and route data back to central access points.
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
1) The document discusses security issues in wireless sensor networks, specifically focusing on attacks against routing protocols and potential countermeasures. It outlines common attacks like spoofing, selective forwarding, sinkhole attacks, Sybil attacks, wormholes, and HELLO flood attacks.
2) The document then discusses countermeasures against each type of attack, such as link layer security, identity verification, verification of link bidirectionality, multipath routing, and better protocol design.
3) Finally, the document emphasizes that routing protocols for wireless sensor networks must be designed with security in mind to effectively defend against both insider and outsider adversaries.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
This document discusses security issues related to wireless sensor networks. It begins with an introduction to wireless sensor networks and an overview of security challenges due to limited sensor node capabilities. It then summarizes common attacks on different layers of wireless sensor networks and discusses security objectives. The document outlines key areas of research on sensor network security including key management, secure time synchronization, and secure routing. It provides details on different key management schemes, time synchronization protocols, and discusses vulnerabilities of existing synchronization schemes to various attacks.
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKSIJNSA Journal
The document summarizes key phases of key management techniques in wireless sensor networks. It discusses three techniques that focus on pre-distribution, pair-wise key establishment, and key renovation phases. The first technique discussed uses key-chains, where base station pre-loads sensors with key identifiers and initial keys, and cluster heads with functions to generate pair-wise and cluster keys for authentication and communication. It allows detecting compromised nodes by re-keying pairs or clusters.
Wireless sensor networks are composed of densely deployed sensor nodes that can cooperatively monitor phenomena. The document outlines applications of sensor networks like environmental monitoring and health monitoring. It discusses factors influencing sensor network design such as fault tolerance, scalability, hardware constraints, and power consumption. It also describes the communication architecture of sensor networks including the physical, data link, network, transport, and application layers and open research issues at each layer.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
2. What are Wireless Sensor
Networks(WSN)?
●A network of spatially distributed autonomous
sensor nodes to monitor certain physical or
environmental conditions or application specific
events.
●Components of the network are connected
through wireless connections.
3. WSN Architecture
●Wireless sensor networks are widespread and
are used in diverse application areas such as
military, education, monitoring, retail, science
etc.
●In order to design such a network many issues
such as network design, data compression,
security parameters etc. need to be considered
and analyzed.
●The design requirements of a wireless sensor
network are dependent on the application for
which these networks are established.
5. Components of WSN
Processors/Controllers:
The processor is the central unit of the system,
which performs tasks; processes the data
presented to it and also control the functions of
the other components of the network system.
Transceiver:
Transceivers are nothing but the combination of
both the transmitters and receiver involved in
sensor networks to facilitate communication.
6. Components of WSN (Cont.)
Storage devices:
Depending on the overall sensor network
structure or application requirement, the
requirements for storage like whether it should be
fast or nonvolatile memory can be sharply
different. Most of the sensor networks prefer flash
memory because of their advantages in terms of
cost and storage capacity.
7. Components of WSN (Cont.)
Power source:
●Equip each sensor node with a (rechargeable)
source of energy.
●Harvest energy from the environment.
Sensors:
Sensors are hardware devices that are
responsible to respond to any change in a
physical condition or occurrence of any
predefined event. Sensors capture and measure
the event needs to be monitored. The data
captured is then sent to controllers for further
processing.
8. Goals of WSN Design
●Small physical size: physical size reduction
has always been challenging and favorable. All
the components of a sensor network are
reduced as possible in size suitable to the
application.
●Lower power consumption: The capability
and performance of the sensors are dependent
on energy supply. Since maintenance of
sensor nodes are expensive, sensor must be
made active for a reasonable time without
recharging.
9. Goals of WSN Design (cont.)
●Diversity in design and usage: design of
sensor network is application dependent. All
the features like small size, low power
consumption and efficiency etc cannot be
implemented together. There is always a
tradeoff between reuse, cost and efficiency.
●Robust operation: sensors are expected to be
fault and error tolerant and so the sensors
should be able to self-test, self-calibrate and
self-repair.
10. Goals of WSN Design (Cont.)
●Security and Privacy: Each sensor should be
equipped with security mechanism to protect
from unauthorized access, security attacks and
modification of system’s critical information.
●Compatibility: The components developed for
the wireless sensor networks must be
compatible with each other.
●Flexibility and scalability: The network must
accommodate functional and timing changes.
The system can be made flexible by making
11. Goals of WSN Design (cont.)
●Network connectivity and QoS : Connectivity
of the network is very important in Wireless
sensor networks. Few isolated sensor nodes in
the network can cause missing or delay of
mission critical information. Some self-
organized algorithms should be implemented
to guarantee network connectivity.
12. Features in WSN Design
Network design:
●single-tier networks architecture of
homogeneous sensor
●single-tiered clustered architecture of
heterogeneous sensors
●multi-tiered network architecture of
heterogeneous sensors
14. Information flow:
There are 3 types of information flow in WSNs.
The first type is one-way communication from
sensors to the sink or the gateway. The second
type is two-way information flow which can
manage sensor nodes by sending control
message from the sink to sensor nodes. The last
type is multi-way information flow which can be
applied to multi-media applications.
Data compression:
Bandwidth for wireless sensor network is very
scarce and expensive. Every application or
methodology tries to effectively utilize the
available bandwidth. Data compression is one of
15. Communication Patterns of WSN
●Many to one: Multiple sensor sends
data to base station.
●One to Many: Single sensor node
multicasts message to several
sensor node.
●Local communication: Sensor
communicates between each
16. Security Requirements
●Data Authenticity
●Data Confidentiality: Encryption
●Data Integrity: Harsh environment
conditions
●Data Freshness: No old message have
been sent over the network
●Robustness: Compromise of a single node
should not break the security of entire network
●Availability
17. Key Management
●Dynamically establish and maintain
secure channels among
communicating nodes
●Primary challenge:
Managing the trade-off between providing
acceptable levels of security and
conserving scare resources
●Desired features of Key
management in WSN:
Energy awareness
18. Key Management Schemes
●Diffie – Hellman and public key
based schemes are not suitable for
WSN
●Pre- distribution of secret keys for
all the pairs of nodes is not viable
due to large amount of memory
used when the network size is
large.
●Random key predistribution
20. ●Key Analysis:
Key requirements of the network nodes
are analyzed
Determine whether keys needs to be
updated using input from a detection
system
●Key Assignment:
Mapping of keys to different parties
Communication keys are simply assigned
by agreement of parties wanting to
establish secure communication channel
It can be static and dynamic
Mapping decision significantly impact the
21. ●Key Generation:
Generation of administrative keys may
take place once or multiple times over the
lifespan of the network.
Communicating parties are generating the
communication keys
Key generating nodes must be trusted by
all key –receiving nodes.
Keys might be as simple as a bit string or
as complex as a symmetrical bivariate
polynomial
22. ●Key distribution (and redistribution)
Delivery of keys to their designated nodes
after they have been generated and
assigned to the nodes.
Distribution of communication keys
usually takes place after the network has
been deployed
Communication keys are used for a short
period of time and should be regularly
updated.
23. Security in a Wireless Sensor
Network vs.
Ad-hoc Networks
●Hardware Limitations
oProcessing Limitations
oMemory Limitations
oEnergy Constraints
oCommunication Constraints
●Dense Deployment
oDifficult to service
24. Vulnerabilities in a WSN
●Physical Tampering
●Physical Layer Attacks
●Link Layer Attacks
●Network and Routing Layer Attacks
●Transport Layer Attacks
●Traffic Analysis Attacks
●Key Management Attacks
●Attacks on Reputation-Assignment
Schemes
25. Threat Models
●Mote-Class vs Laptop-Class
Adversaries
●Insider vs Outsider Adversaries
●Passive vs Active Adversaries
27. Physical Tampering
●Non-Invasive Attacks
oTiming Attack
Monitoring Execution Speed can reveal
confidential data
●Invasive Attacks
oBlock Cipher Attack
Obtain bit values through power analysis
techniques. Since most WSN protocols use
symmetric key encryption, crypto-analysis
techniques can be used on authentication codes to
decipher messages.
28. Resistance for Physical Mote
Attack
●Cryptoprocessors are physically secure
processors that have been used extensively to
provide some level of physical tamper
resistance.
●A secure cryptoprocessor is a dedicated
computer on a chip or microprocessor for
carrying out cryptographic operations,
embedded in a packaging with multiple
physical security measures, which give it a
degree of tamper resistance.
29. Defense for Block
Cipher/Timing Attacks
●Randomization based blinding function –
basically adding random number to be exponential with
encryption exponent before cipher text decryption.
●Equalizations based blinding function-
dummy operations are added to make same operation
from cipher text data or related information parameter.
●Quantization based blinding function –
The computation take exponent time of the quantum
decided.
30. Link Layer Attacks
●Jamming Attacks
oMore powerful transmitter purposely causes
interference.
●Exhaustion Attacks
oRepeatedly sending transmissions with the
intention of exhausting a victim node’s
resources.
●Unfairness Attacks
oUsing a more powerful transmitter to send
messages over a particular wireless channel
shared by other nodes. Therefore preventing
other nodes from communicating to the
31. Jamming attack solution
Repeated inability to access wireless channel
• Bad framing
• Checksum failures
• Illegal values for addresses or other fields
• Protocol violations (e.g., missing ACKs)
• Excessive received signal level
• Low signal-to-noise ratio
• Repeated collisions
• Duration of condition
32. ●Check or keep track of packets
from same source and same data
also frequency
●And in future step we might have
denial of service for specifically that
kind of message or message from
same source.
Exhaustion Attack Solution
33. Unfairness Attack Solution
●Solution is not prioritizing any one
of the channel.
oRandom channel selection to listen on
from all available connection.
oAs defense assigning variable counter
attached to the wireless nodes that
keep track of same connection
established.
●Threshold is just a matter of choice as
per the application, but this method also
34. Network and Routing Layer
Attacks
●Sinkhole or Black Hole Attacks
oRoute all nearby traffic through a
compromised or malicious node.
oAdversary can gather transmission data or
prevent data from reaching the base station
36. Sinkhole Defense and
Countermeasure
●Dynamic Trust Management
System (DTMS), which measures
that the packets arrive safely at the
base station and distributes trust to
all nodes.
37. Network and Routing Layer
Attacks
●Wormhole Attacks
oImplement a Sinkhole Attack
oTunnel messages from one part of the
network to another
oBreaks localization protocols
oCan monitor a large amount of traffic
39. Wormhole Defense and
Countermeasures
●The goal is to verify the existence
of a direct link to an apparent
neighbor using timing and
authentication and also to get
Geographic routing protocols
40. Network and Routing Layer
Attacks
●Spoofing Attacks
oMasquerade as a node or base station by
modifying Routing information in replayed
packets
oCan cause misdirection, attract/repel traffic,
generate false messages, partition networks,
increase latency.
42. Spoofing Defense and
Countermeasure
●Filter incoming packets that appear
to come from an internal IP
address at your perimeter.
●Filter outgoing packets that appear
to originate from an invalid local IP
address.
43. Network and Routing Layer
Attacks
●Hello Flooding Attacks
oAn adversary with a more power transmitter
(such as a laptop class attacker) , sends a
Hello packet to all nodes within range
advertising a high quality route. Nodes that
attempt to reply may not be in range.
oAffects protocols that assume Hello packets
are sent only between nodes within
transmitter range.
45. HELLO Flood Defense and
Countermeasure
●Certify the bi-directionality of link.
●Attach identity verification for
authentication.
●Though it has overhead for
verifying and authenticity checking
but it is worth overhead in
comparison of attack.
46. Transport Layer Attacks
●Flooding Attacks
oAn adversary floods a victim node with
connection requests, thereby exhausting the
node’s memory.
●Desynchronization Attacks
oAn adversary modifies the sequence number
in an intercepted transmission. The receiver
finds that the sequence number is
inconsistent and requests that the packet be
resent.
oCan be used to cause an infinite loop.
47. Reputation Assignment
Scheme Attacks
●Ballot Stuffing Attacks
oAn adversary manipulates the outcome of a
vote by creating a large number of falsified
entries.
●Bad Mouthing Attacks
oMalicious nodes accuse a legitimate node of
malicious behavior, therefore causing the
legitimate node to be taken offline.
48. Attacks on In-Network
Processing
●What is an aggregation node and why is
it used?
oAggregation nodes collect information from
nearby nodes and use this information to
calculate an aggregate.
oThis protocol requires much fewer
transmissions therefore significantly
reducing energy consumption.
49. Attacks on In-Network
Processing
●Aggregation Attacks
oAn aggregation node is captured or spoofed.
oThe aggregate is manipulated therefore
causing a much more significant impact on
the total result.
51. Sybil Attacks
●A single piece of hardware masquerades
as many nodes.
●Can be used to distribute blame or dilute
suspicion in reputation-assignment
schemes.
●Can have a greater impact on routing by
appearing at more than 1 location.
●Can be used to corrupt or gather data
from distributed storage systems.
●Can have a greater impact on data
aggregation
53. Defense against node
Replication Attacks
●Localized Multicast.
oIt randomly selects witnesses for
nodes containing its ID and location
within a geographically limited region
(referred to as cell).
54. Countermeasures for Sybil
Attacks
●Key to counter is to validate that each
node identity is the only identity
presented by the corresponding physical
node.
●Direct validation - Node directly tests
whether another node identity is valid.
●Indirect validation - Nodesthathave already
been verified are allowed to vouch for or refute
other nodes. With the exception of the key pool
defense, the mechanisms that we present here
are for direct validation.
55. Previous Measures
●Resource testing is a strong candidate
for direct validation
●Physical entities are to be tested proving
that each tested resource as physical
device. But this kind of testing requires
lot of computation and storage, which is
highly unsuitable for wireless networks.
The propose method communication is
to broadcast a request for identities and
then only accept replies that occur within
59. Routing in WSNs
●What is routing?
Process of sending desired packets from source to
destination
●Inherent Characteristics of WSNs
1.High over head maintenance of ID.
2.Sensor nodes are tightly constrained in terms of energy,
processing hence requires careful resource
management.
3.In some cases nodes are free to move which results in
unpredictable and frequent topological changes.
4.Data Redundancy.
60. Cont.…
●Routing challenges and Design Issues
1.Node Deployment
2.Energy consumption with out losing accuracy
3.Quality of service
●Common attacks on Routing Protocols
4.Routing table over flow
5.Routing table poisoning
6.Routing cache poisoning
7.Packet Replication
61. Routing Protocols
Network based protocols
●Flat routing protocols
1.Sensor protocols for information via
negotiation(SPIN)
They are family of adaptive protocols that disseminate the
information at each node to every node in the network assuming
that nodes in the network are potential base stations. These nodes
make use of the property that nodes in close proximity have
similar data which enables the need to only distribute the data that
other nodes don’t possess.
1.Directed Diffusion
Main objective of directed diffusion is to combine data coming from
different sources enroute by eliminating redundancy ,minimizing
the number of transmissions thus saving energy and prolonging
62. Cont.…
Hierarchical Routing Protocols
1.Low Energy Adaptive Clustering
Hierarchy(LEACH)
Leach is a cluster based protocol which selects few sensor nodes
as cluster heads and rotates this role to evenly distribute the
energy load among the sensors in the network.
1.Sensor aggregates routing
Main objective of this protocol is to collectively monitor target
activity in a certain environment. A sensor aggregates those nodes
in a network that satisfies a grouping predicate for a collaborative
processing task.
63. Cont.…
Location Based Routing Protocols
1.Geographic adaptive fidelity (GEF)
Network area is first divided into fixed zones and forms a virtual
grid. Inside each zone nodes collaborate with each other to play
different roles.
1.Geographic and Energy aware routing (GEAR)
GEAR basically uses energy aware and geographically informed
neighbor selection heuristics to route the packets towards the
destination region. The key idea is to restrict the number of
interests by considering to a certain region rather than sending it
to whole Network.
64. Cont.…
Routing protocols based on protocol
operation
1.Negotiation based routing protocol
These protocols use high level data descriptors in order to
eliminated redundant data transmission through negotiation.
Communication decisions are taken based on the resources
available to them. E.g. SPIN.
1.QoS-based routing
In QoS-based routing protocols, the network has to balance
between between energy consumption and data quality. In
particular, the network has to satisfy certain QoS metrics, e.g.
delay, energy, bandwidth when delivering to BS.
65. Conclusion
●Wireless Sensor networks today can be utilized across
many different areas in the society. Hence with this
versatility and capability come various threats and
vulnerabilities.
●One of the most pivotal yet a difficult challenge would be
creating a balance between security and optimality.