SlideShare une entreprise Scribd logo
1  sur  19
SECURITY ISSUES AND ATTACKS
IN WIRELESS SENSOR
NETWORKS
MD.WARESUL ISLAM,
OVERVIEW
 What is WSN?
 Applications
 Wireless sensor network characteristics
 DoS attacks and defenses
 Physical layer
 Link layer
 Network layer
 Transport layer
 Application layer
 Conclusion
 Questions
WHAT IS WIRELESS SENSOR NETWORK ?
 Is a collection of sensor nodes with
limited processor and limited
memory unit embedded in it.
 Sensor nodes are small, low-cost,
low-power devices that have
following functionality:
 communicate on short distances
 sense environmental data
 perform limited data processing
WSN APPLICATIONS
 Military Applications
 Battlefield surveillance, Targeting
 Nuclear, biological, and chemical attack detection
 Environmental Applications
 Forest fire & flood detection
 Air & water pollution
 Health Applications
 Tracking and monitoring doctors and patients inside a hospital
 Drug administration in hospitals
 Other Commercial Applications
 Interactive museums
 Home and office automation
 Detecting and monitoring car thefts
WSN CHARACTERISTICS
 Weaknesses of WSNs
 Limited processing capability and memory
 Inability to secure wireless medium
 Sensors are vulnerable to physical tampering
 Face attackers who aren’t limited by resources
 Limited and often non-replenishable power supplies
DENIAL OF SERVICE (DOS)
 DoS attacks target service availability
 Problematic for many network types
 Prevents communication between devices
 Disables a targeted device
ATTACKS AND DEFENSES
 We restrict the Open System Interconnect model down to 4
layers from 7
 Physical layer
 Link layer
 Network layer
 Transport layer
 Analyze each for attacks and potential defenses
PHYSICAL LAYER ATTACKS
 Jamming - primary physical attack
 Constant: high power, random noise
 Deceptive: high power, sends byte traffic
 Random: low power, sleeps to save energy
 Reactive: low power, jams in response to traffic
 Problem: simple radios have limited spectrum
 Cannot use classic spread-spectrum technique
 Defense: detect and sleep
 Secondary defense: detect and reroute
PHYSICAL LAYER ATTACKS CONT.
 Tampering
 Physical attack on the node itself
 Problem: nodes often deployed in unsecured areas
 No way to prevent for sure, defenses include:
 Camouflage
 Tamper-proof packaging
 Redundant nodes
 Tamper reaction (fire safe)
LINK LAYER ATTACKS
 Attack MAC protocols operating the link layer
 Collision: identical to jamming
 Interrogation: constantly request-to-send
 Packet replay: record legitimate traffic and replay
 Problem:
 Very susceptible to DoS because MAC controls power-hungry
radio HW
 Reduces battery life by orders of magnitude
LINK LAYER DEFENSES
 Link-layer authentication
 Ensure communication with trusted parties
 Problem: replaying trusted communication
 Antireplay support
 Ensure packets are only sent and received once
 Problem: checking for replays still uses energy
NETWORK LAYER ATTACKS
 Hello flood attack
 Nodes send “hello” to one-hop network
 Attacker replays “hello” with high power
antenna, creates false one-hop network
 Doesn’t require encryption breaking
 Defense: Pairwise authentication, geographic
routing (both very expensive)
NETWORK LAYER ATTACKS CONT.
 Selective forwarding
 Multi hop paradigm is prevalent in WSN
 It is assumed that nodes faithfully forward received
messages
 Compromised node might refuse to forward packets,
however neighbors might start using another route
 More dangerous: compromised node forwards selected
packets
 Defense: detection of malicious node , another route is chosen
for transmission , data is transmitted on multiple paths .
NETWORK LAYER ATTACKS CONT.
 Sinkhole attack
 Become part of many routes, drop all
packets
 Enable other attacks, e.g., selective
forwarding or wormhole attack
 Defense: authentication, antireplay.
NETWORK LAYER ATTACKS CONT.
 Wormhole attack
 Two colluding nodes
 A node at one end of the wormhole
advertises high quality link to the
base station
 Another node at the other end
receives the attracted packets
 Defense :using geographic based routing
malicious node will be detected
NETWORK LAYER ATTACKS CONT.
 Sybil attack:
 Idea: a single node pretends to be present in different parts
of the network.
 Mostly affects geographical routing protocols
 Defense: Verification of nodes , using hash function each node is
assigned with unique key.
TRANSPORT LAYER
 Flooding attack
 Open many connections to overflow state buffer
 Defense: SYN cookies (client maintains state)
 Desynchronization attack
 Sends bogus sequence numbers or controls flags
 Defense: authentication
CONCLUSIONS
 WSN is used in different types of applications due to
tremendous growth .
 WSN security is challenging, new area of research.
 #Problems >> #Solutions
Security issues and attacks in wireless sensor networks

Contenu connexe

Tendances

Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Piyush Mittal
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
Tarek Gaber
 

Tendances (20)

Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 

Similaire à Security issues and attacks in wireless sensor networks

Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02
busireddy harish
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSN
IJERA Editor
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
elango30
 
Mobile ad hoc networking: imperatives and challenges
Mobile ad hoc networking: imperatives and challengesMobile ad hoc networking: imperatives and challenges
Mobile ad hoc networking: imperatives and challenges
guest1b5f71
 

Similaire à Security issues and attacks in wireless sensor networks (20)

Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless Communication
 
Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02
 
Vampire attacks
Vampire attacksVampire attacks
Vampire attacks
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSN
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Mobile ad hoc networking: imperatives and challenges
Mobile ad hoc networking: imperatives and challengesMobile ad hoc networking: imperatives and challenges
Mobile ad hoc networking: imperatives and challenges
 
D0961927
D0961927D0961927
D0961927
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 

Dernier

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 

Dernier (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Security issues and attacks in wireless sensor networks

  • 1. SECURITY ISSUES AND ATTACKS IN WIRELESS SENSOR NETWORKS MD.WARESUL ISLAM,
  • 2. OVERVIEW  What is WSN?  Applications  Wireless sensor network characteristics  DoS attacks and defenses  Physical layer  Link layer  Network layer  Transport layer  Application layer  Conclusion  Questions
  • 3. WHAT IS WIRELESS SENSOR NETWORK ?  Is a collection of sensor nodes with limited processor and limited memory unit embedded in it.  Sensor nodes are small, low-cost, low-power devices that have following functionality:  communicate on short distances  sense environmental data  perform limited data processing
  • 4. WSN APPLICATIONS  Military Applications  Battlefield surveillance, Targeting  Nuclear, biological, and chemical attack detection  Environmental Applications  Forest fire & flood detection  Air & water pollution  Health Applications  Tracking and monitoring doctors and patients inside a hospital  Drug administration in hospitals  Other Commercial Applications  Interactive museums  Home and office automation  Detecting and monitoring car thefts
  • 5. WSN CHARACTERISTICS  Weaknesses of WSNs  Limited processing capability and memory  Inability to secure wireless medium  Sensors are vulnerable to physical tampering  Face attackers who aren’t limited by resources  Limited and often non-replenishable power supplies
  • 6. DENIAL OF SERVICE (DOS)  DoS attacks target service availability  Problematic for many network types  Prevents communication between devices  Disables a targeted device
  • 7. ATTACKS AND DEFENSES  We restrict the Open System Interconnect model down to 4 layers from 7  Physical layer  Link layer  Network layer  Transport layer  Analyze each for attacks and potential defenses
  • 8. PHYSICAL LAYER ATTACKS  Jamming - primary physical attack  Constant: high power, random noise  Deceptive: high power, sends byte traffic  Random: low power, sleeps to save energy  Reactive: low power, jams in response to traffic  Problem: simple radios have limited spectrum  Cannot use classic spread-spectrum technique  Defense: detect and sleep  Secondary defense: detect and reroute
  • 9. PHYSICAL LAYER ATTACKS CONT.  Tampering  Physical attack on the node itself  Problem: nodes often deployed in unsecured areas  No way to prevent for sure, defenses include:  Camouflage  Tamper-proof packaging  Redundant nodes  Tamper reaction (fire safe)
  • 10. LINK LAYER ATTACKS  Attack MAC protocols operating the link layer  Collision: identical to jamming  Interrogation: constantly request-to-send  Packet replay: record legitimate traffic and replay  Problem:  Very susceptible to DoS because MAC controls power-hungry radio HW  Reduces battery life by orders of magnitude
  • 11. LINK LAYER DEFENSES  Link-layer authentication  Ensure communication with trusted parties  Problem: replaying trusted communication  Antireplay support  Ensure packets are only sent and received once  Problem: checking for replays still uses energy
  • 12. NETWORK LAYER ATTACKS  Hello flood attack  Nodes send “hello” to one-hop network  Attacker replays “hello” with high power antenna, creates false one-hop network  Doesn’t require encryption breaking  Defense: Pairwise authentication, geographic routing (both very expensive)
  • 13. NETWORK LAYER ATTACKS CONT.  Selective forwarding  Multi hop paradigm is prevalent in WSN  It is assumed that nodes faithfully forward received messages  Compromised node might refuse to forward packets, however neighbors might start using another route  More dangerous: compromised node forwards selected packets  Defense: detection of malicious node , another route is chosen for transmission , data is transmitted on multiple paths .
  • 14. NETWORK LAYER ATTACKS CONT.  Sinkhole attack  Become part of many routes, drop all packets  Enable other attacks, e.g., selective forwarding or wormhole attack  Defense: authentication, antireplay.
  • 15. NETWORK LAYER ATTACKS CONT.  Wormhole attack  Two colluding nodes  A node at one end of the wormhole advertises high quality link to the base station  Another node at the other end receives the attracted packets  Defense :using geographic based routing malicious node will be detected
  • 16. NETWORK LAYER ATTACKS CONT.  Sybil attack:  Idea: a single node pretends to be present in different parts of the network.  Mostly affects geographical routing protocols  Defense: Verification of nodes , using hash function each node is assigned with unique key.
  • 17. TRANSPORT LAYER  Flooding attack  Open many connections to overflow state buffer  Defense: SYN cookies (client maintains state)  Desynchronization attack  Sends bogus sequence numbers or controls flags  Defense: authentication
  • 18. CONCLUSIONS  WSN is used in different types of applications due to tremendous growth .  WSN security is challenging, new area of research.  #Problems >> #Solutions