SlideShare une entreprise Scribd logo
1  sur  33
Wireless Sensor
Network
Security
WSN Course Seminar
Dr.Saadat
by
Ahmadreza Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
2

Outline
 WSN

Specification Review
 WSN Security Concerns
 WSN Constraints
 WSN Security Requirements
 WSN Security Threats
 WSN Security Countermeasure

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
3

WSN Specification Review
 High

number of nodes
 High-density deployment of nodes
 Vast and various applications
 Energy, memory and processing limit
 No communication Infrastructure
 Remote area deployment
 Being Unattended after deployment
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
4

WSN Security Concerns
 How

to secure against physical attacks in
unattended deployments?
 How to secure in accordance with WSN
constraints?
 How to adapt security mechanisms in
other networks to WSN?
 How to design secure routing, clustering,
MAC, data aggregation and locationing
protocols?
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
5

WSN Constraints Review
 Energy

constraint
 Memory constraint
 Unreliable communication
 High latency
 Remote intermittent support

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
6

Energy Constraint
 Energy




Transducer unit
Communication unit
Processing unit

 To


need :

communicate 1 bit

800 to 1000 instructions

 Communication

consumes the most.
 Security mechanisms impose
communication overhead and more cost.
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
7

Memory Constraint
 Memory



Type :

Flash : Program code
RAM: Running application, Processing and
aggregated data

 Not

enough space to support security
mechanisms


SMART DUST: 4KB for Tiny OS, Just 4.5KB to…

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
8

Unreliable Communication
 Channel


destroying nature

Noise, Interference, fading

 Congestion


in nodes

Collision

 More

overhead to assure communication
 Less space remained to security

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
9

High Latency
 Multi

hop connection-less routing
 Congestion and need to retransmission
 But in Security synchronization is important





Security log Review
Security log correlation and analysis
Key management

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
10

Remote Intermittent Support
 Remote

deployment
 Not management and maintenance for
long periods



They are exposed to physical attacks
They need to be secured against that

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
11

WSN Security Entities
 What



Data
Resources

 From




what to protect ?

Attacks
Anomalies

 How


to Protect ?

to protect ?

Mechanisms and protocols
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
12

WSN Security requirements











Confidentiality
Integrity
Availability
Freshness
Self-organization
Self-healing
Secure Localization
Synchronization
Authentication
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
13

Security Requirements(Cont..)







Confidentiality: Data understood just at
authorized node.
Integrity : No change or modification at
intermediate nodes.
Availability : WSN service Availability in spite
of security breaches like DoS attack.
Freshness : Data is not replayed or replicated.
Self organization and healing: Protocols
dynamicity not only in … but also in security
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
14

Security Requirements(Cont..)
 Secure

Localization : where that is critical
the protocols must be robust enough like
Verifiable Multilateration.
 Authentication : Ensures integrity

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
15

WSN Security Threats
 Against

Availability: They are generally
DoS Attacks.
 Against Secrecy and Authentication:
Attacks like eavesdropping, IP spoofing
and Packet Replay.
 Against Service Integrity : Make the
network accept false data values.

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
16

Threats Against Availability
 DoS



An event to reduce a network’s capacity
to perform an expected function.
Common defense mechanisms need large
overhead and not suitable for WSN.

 DoS



attacks in general:

attack in WSN:

They are considered in different layers
Defense mechanisms are developed
specially
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
17

DoS Attack in WSN
 Physical



Jamming : continuous, intermittent, distributed
Tampering : the node or its function change

 Data





Layer:

Link Layer:

Intentional Collision: Back-off time increase
Resource Exhaustion: impose retransmission
Unfairness: degradation of real-time
applications/ weak form of DoS attack

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
18

DoS Attack in WSN


Network Layer:











Spoofing Routing Info
Selective Packet Forwarding
Sinkhole
Sybil
Wormhole
Hello Flooding
Acknowledge Spoofing

Transport Layer:



Flooding:
De-synchronization:
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
19

Network Layer DoS


Spoofing Routing Information:




An attacker may spoof, alter, or replay
routing information to disrupt traffic in the
network.
These disruptions include :
creation of routing loops
 attracting or repelling network traffic from
selected nodes
 extending or shortening source routes
 generating fake error messages
 causing network partitioning
 increasing end-to-end latency


WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
20

Network Layer DoS
 Selective Packet Forwarding:
 Multihop Nets like WSN require accurate forwarding
 An attacker may compromise a node in such a way
that it selectively forwards some messages and drops
others.
 Sinkhole:
 an attacker makes a compromised node look more
attractive to its neighbors by forging the routing
information
 Facilitates the selective forwarding
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
21

Network Layer DoS
 Sybil:





One node presents more that one identity in a network
To defeat objective of redundancy mechanisms in
distributed data storage systems in peer to peer Nets.
effective against routing algorithms, data aggregation,
voting, fair resource allocation, and foiling misbehavior
detection.

 Wormhole:


Creating low latency link between two portions of a network
over which an attacker replays network messages via :



Single node connecting two adjacent non-neighboring nodes.
Pairs of nodes in two portion of the network (Facilitates Sinkhole).
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
22

Network Layer DoS
 Hello




Flooding:

the attacker node falsely broadcasts a shorter route to the
base station through high power hello packet transmission.
All nodes in spite that of being out of the radio range of the
attacker, attempt to send packets to it.
It facilitates Sinkhole attack.

 Acknowledge



Spoofing:

attacking node may overhear packet transmissions from its
neighboring nodes and spoof the acknowledgments
The attacker is able to disseminate wrong information about
the status of the nodes
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
23

Transport Layer DoS


Flooding:







Any protocol with status keeping at connection end is
vulnerable to this.
An attacker may repeatedly make new connection
request.
The resources required by each connection are
exhausted or reach a maximum limit.
Further legitimate requests will be ignored

De-synchronization:



Disruption of an existing connection .
Accurately timed, repeatedly spoof messages to an end
host causing the host to request the retransmission of
missed frames.
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
24

DoS Attack Countermeasures

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
25

Threats Against Secrecy
 Node





Replication :

An attacker attempts to add a node to an
existing WSN by replication (i. e. copying) the
node identifier of an already existing node in
the network.
Leads to network partitioning, communication
of false sensor readings.
Accessing Crypto keys, attacker can easily
manipulate a specific segment of the network
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
26

Threats Against Secrecy


Unauthorized Data aggregation:


Eavesdropping and Passive Monitoring:





Traffic Analysis:







Possible if communication is not protected by
cryptographic mechanisms
Example: Location information gathering
identify some sensor nodes with special roles and
activities in a WSN.
It usually precedes the eavesdropping.
2 Mechanism : Rate Monitoring and Time Correlation

Camouflage:


An adversary may compromise a sensor node in a WSN
and later on use it to masquerade a normal node
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
27

Defense Against Attacks on
Sensor Privacy


Defense against Node Replication:


Randomized multicast:






Location Info is multicast to random witnesses.
Birthday Paradox is used to detect replicated
In a network of n nodes, if each location produces √n
witnesses, then, the birthday paradox predicts at least
one collision with high probability.

Line-selected multicast:







It uses network topology to detect replicated
It is based on the rumor routing protocol
If a conflicting location claim ever crosses the line
segment of location claim route to random witness,
replication is detected.
Communication overhead reduces from O(n2) to O(n√n)
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
28

Defense Against Attacks on
Unauthorized Data Aggregation


Defense against Traffic Analysis:



It prevents both rate monitoring and time
correlation.
It includes four mechanisms:
Forwarding to multiple parents
 Controlled Random Walk in multi hop path
selection to distribute packet traffic
 Random fake paths are introduced
 Random areas of high communication
activities are created to deceive the attacker


WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
29

Defense Against Attacks on Sensor
Privacy


Anonymity mechanisms:




An anonymity mechanism depersonalizes the data
before it is released from the source.
privacy and disclosure trade-off in location-based
services.
Four proposed approaches:









decentralization of storage of sensitive data
establishment of secure channel for communication
changing the pattern of data traffic
exploiting mobility of the nodes

Policy-Based approaches
Information Flooding:


Four mechanisms are proposed as follows.
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
30

Information Flooding mechanisms
to protect privacy


Baseline flooding:




Probabilistic flooding:





only a subset of nodes in the entire network participates in data
forwarding
There is packet loss possibility.

Flooding with fake messages:




every node in the network forwards a message only once
(Broadcast to all neighbors)

More sources can be introduced that inject fake messages into
the network to prevent back tracing.

Phantom flooding:


Probabilistic flooding same concept but changing the shortest
path in each packet transmission.



First phase takes hops through random walk (unicast)
Second phase floods the message through baseline flooding

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
31

Other security Mechanisms…
 Intrusion

Detection
 Secure Data Aggregation and Clustering
 Secure Routing
 Cryptography and key management
 Trust Management

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
32

Important WSN Security
Protocols
 SPIN


:

SNEP(secure network encryption protocol)
 Provides

data confidentiality, two-party data
authentication, and data freshness for peer
to peer communication.



uTELSA (timed efficient streaming loss-tolerant
authentication protocol)


provides authenticated broadcast

WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir
Thanks for
your attention
Questions?
The End
WSN Security - Ar.Ghaznavi
ar.ghaznavi@stu.yazd.ac.ir

Contenu connexe

Tendances

Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksVarsha Anandani
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 

Tendances (19)

Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Security issues
Security issuesSecurity issues
Security issues
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
Ids presentation
Ids presentationIds presentation
Ids presentation
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 

En vedette

Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Расширение Visual studio для ASP.NET Identity
Расширение Visual studio для ASP.NET IdentityРасширение Visual studio для ASP.NET Identity
Расширение Visual studio для ASP.NET IdentityDataArt
 
Zed innovation intro
Zed innovation introZed innovation intro
Zed innovation introZiv Kohav
 
180 blue dining room training
180 blue dining room training180 blue dining room training
180 blue dining room trainingBill Buffalo
 
A Journey to Power Intelligent IT - Big Data Employed
A Journey to Power Intelligent IT - Big Data EmployedA Journey to Power Intelligent IT - Big Data Employed
A Journey to Power Intelligent IT - Big Data EmployedMohamed Sohail
 
Visiting unpleasent places
Visiting unpleasent placesVisiting unpleasent places
Visiting unpleasent placesArpanasa
 
Bit trade labs sovereign identity fintech summit 2016
Bit trade labs sovereign identity   fintech summit 2016Bit trade labs sovereign identity   fintech summit 2016
Bit trade labs sovereign identity fintech summit 2016Glen Frost
 
Макс Волошин «Микросервисы на практике»
Макс Волошин «Микросервисы на практике»Макс Волошин «Микросервисы на практике»
Макс Волошин «Микросервисы на практике»DataArt
 
Presentation portfolio assessment
Presentation portfolio assessmentPresentation portfolio assessment
Presentation portfolio assessmentSandy Koh
 
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...DataArt
 
Contratación electrónica y contratación informática
Contratación electrónica y contratación informáticaContratación electrónica y contratación informática
Contratación electrónica y contratación informáticaJoel Quintana
 
A New Lump Sum for a New Generation
A New Lump Sum for a New GenerationA New Lump Sum for a New Generation
A New Lump Sum for a New GenerationUrbanBound
 
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»DataArt
 
"Проблемы в IoT и их решение.", Артем Сорокин, DataArt
"Проблемы в IoT и их решение.", Артем Сорокин, DataArt"Проблемы в IoT и их решение.", Артем Сорокин, DataArt
"Проблемы в IoT и их решение.", Артем Сорокин, DataArtDataArt
 
Teletrabajo en la administración pública
Teletrabajo en la administración públicaTeletrabajo en la administración pública
Teletrabajo en la administración públicaJoel Quintana
 

En vedette (18)

Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Расширение Visual studio для ASP.NET Identity
Расширение Visual studio для ASP.NET IdentityРасширение Visual studio для ASP.NET Identity
Расширение Visual studio для ASP.NET Identity
 
Zed innovation intro
Zed innovation introZed innovation intro
Zed innovation intro
 
180 blue dining room training
180 blue dining room training180 blue dining room training
180 blue dining room training
 
A Journey to Power Intelligent IT - Big Data Employed
A Journey to Power Intelligent IT - Big Data EmployedA Journey to Power Intelligent IT - Big Data Employed
A Journey to Power Intelligent IT - Big Data Employed
 
Visiting unpleasent places
Visiting unpleasent placesVisiting unpleasent places
Visiting unpleasent places
 
Bit trade labs sovereign identity fintech summit 2016
Bit trade labs sovereign identity   fintech summit 2016Bit trade labs sovereign identity   fintech summit 2016
Bit trade labs sovereign identity fintech summit 2016
 
Макс Волошин «Микросервисы на практике»
Макс Волошин «Микросервисы на практике»Макс Волошин «Микросервисы на практике»
Макс Волошин «Микросервисы на практике»
 
Presentation portfolio assessment
Presentation portfolio assessmentPresentation portfolio assessment
Presentation portfolio assessment
 
Matematicas
MatematicasMatematicas
Matematicas
 
Transistores
TransistoresTransistores
Transistores
 
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...
Андраш Густи «Интерфейсы, которые вызывают привыкание, или Как перепрошить по...
 
Contratación electrónica y contratación informática
Contratación electrónica y contratación informáticaContratación electrónica y contratación informática
Contratación electrónica y contratación informática
 
A New Lump Sum for a New Generation
A New Lump Sum for a New GenerationA New Lump Sum for a New Generation
A New Lump Sum for a New Generation
 
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»
"Пикладная эмпатия" Алексей Аболмасов, «Ёрд»
 
"Проблемы в IoT и их решение.", Артем Сорокин, DataArt
"Проблемы в IoT и их решение.", Артем Сорокин, DataArt"Проблемы в IoT и их решение.", Артем Сорокин, DataArt
"Проблемы в IoT и их решение.", Артем Сорокин, DataArt
 
Teletrabajo en la administración pública
Teletrabajo en la administración públicaTeletrabajo en la administración pública
Teletrabajo en la administración pública
 

Similaire à WSN Security Threats and Countermeasures

Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksIOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor NetworksIRJET Journal
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNREPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNIJNSA Journal
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetijctet
 
76201924
7620192476201924
76201924IJRAT
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSIRJET Journal
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
 

Similaire à WSN Security Threats and Countermeasures (20)

Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
D0961927
D0961927D0961927
D0961927
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNREPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
76201924
7620192476201924
76201924
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 

Dernier

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Dernier (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

WSN Security Threats and Countermeasures

  • 1. Wireless Sensor Network Security WSN Course Seminar Dr.Saadat by Ahmadreza Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 2. 2 Outline  WSN Specification Review  WSN Security Concerns  WSN Constraints  WSN Security Requirements  WSN Security Threats  WSN Security Countermeasure WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 3. 3 WSN Specification Review  High number of nodes  High-density deployment of nodes  Vast and various applications  Energy, memory and processing limit  No communication Infrastructure  Remote area deployment  Being Unattended after deployment WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 4. 4 WSN Security Concerns  How to secure against physical attacks in unattended deployments?  How to secure in accordance with WSN constraints?  How to adapt security mechanisms in other networks to WSN?  How to design secure routing, clustering, MAC, data aggregation and locationing protocols? WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 5. 5 WSN Constraints Review  Energy constraint  Memory constraint  Unreliable communication  High latency  Remote intermittent support WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 6. 6 Energy Constraint  Energy    Transducer unit Communication unit Processing unit  To  need : communicate 1 bit 800 to 1000 instructions  Communication consumes the most.  Security mechanisms impose communication overhead and more cost. WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 7. 7 Memory Constraint  Memory   Type : Flash : Program code RAM: Running application, Processing and aggregated data  Not enough space to support security mechanisms  SMART DUST: 4KB for Tiny OS, Just 4.5KB to… WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 8. 8 Unreliable Communication  Channel  destroying nature Noise, Interference, fading  Congestion  in nodes Collision  More overhead to assure communication  Less space remained to security WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 9. 9 High Latency  Multi hop connection-less routing  Congestion and need to retransmission  But in Security synchronization is important    Security log Review Security log correlation and analysis Key management WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 10. 10 Remote Intermittent Support  Remote deployment  Not management and maintenance for long periods   They are exposed to physical attacks They need to be secured against that WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 11. 11 WSN Security Entities  What   Data Resources  From   what to protect ? Attacks Anomalies  How  to Protect ? to protect ? Mechanisms and protocols WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 12. 12 WSN Security requirements          Confidentiality Integrity Availability Freshness Self-organization Self-healing Secure Localization Synchronization Authentication WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 13. 13 Security Requirements(Cont..)      Confidentiality: Data understood just at authorized node. Integrity : No change or modification at intermediate nodes. Availability : WSN service Availability in spite of security breaches like DoS attack. Freshness : Data is not replayed or replicated. Self organization and healing: Protocols dynamicity not only in … but also in security WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 14. 14 Security Requirements(Cont..)  Secure Localization : where that is critical the protocols must be robust enough like Verifiable Multilateration.  Authentication : Ensures integrity WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 15. 15 WSN Security Threats  Against Availability: They are generally DoS Attacks.  Against Secrecy and Authentication: Attacks like eavesdropping, IP spoofing and Packet Replay.  Against Service Integrity : Make the network accept false data values. WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 16. 16 Threats Against Availability  DoS   An event to reduce a network’s capacity to perform an expected function. Common defense mechanisms need large overhead and not suitable for WSN.  DoS   attacks in general: attack in WSN: They are considered in different layers Defense mechanisms are developed specially WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 17. 17 DoS Attack in WSN  Physical   Jamming : continuous, intermittent, distributed Tampering : the node or its function change  Data    Layer: Link Layer: Intentional Collision: Back-off time increase Resource Exhaustion: impose retransmission Unfairness: degradation of real-time applications/ weak form of DoS attack WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 18. 18 DoS Attack in WSN  Network Layer:         Spoofing Routing Info Selective Packet Forwarding Sinkhole Sybil Wormhole Hello Flooding Acknowledge Spoofing Transport Layer:   Flooding: De-synchronization: WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 19. 19 Network Layer DoS  Spoofing Routing Information:   An attacker may spoof, alter, or replay routing information to disrupt traffic in the network. These disruptions include : creation of routing loops  attracting or repelling network traffic from selected nodes  extending or shortening source routes  generating fake error messages  causing network partitioning  increasing end-to-end latency  WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 20. 20 Network Layer DoS  Selective Packet Forwarding:  Multihop Nets like WSN require accurate forwarding  An attacker may compromise a node in such a way that it selectively forwards some messages and drops others.  Sinkhole:  an attacker makes a compromised node look more attractive to its neighbors by forging the routing information  Facilitates the selective forwarding WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 21. 21 Network Layer DoS  Sybil:    One node presents more that one identity in a network To defeat objective of redundancy mechanisms in distributed data storage systems in peer to peer Nets. effective against routing algorithms, data aggregation, voting, fair resource allocation, and foiling misbehavior detection.  Wormhole:  Creating low latency link between two portions of a network over which an attacker replays network messages via :   Single node connecting two adjacent non-neighboring nodes. Pairs of nodes in two portion of the network (Facilitates Sinkhole). WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 22. 22 Network Layer DoS  Hello    Flooding: the attacker node falsely broadcasts a shorter route to the base station through high power hello packet transmission. All nodes in spite that of being out of the radio range of the attacker, attempt to send packets to it. It facilitates Sinkhole attack.  Acknowledge   Spoofing: attacking node may overhear packet transmissions from its neighboring nodes and spoof the acknowledgments The attacker is able to disseminate wrong information about the status of the nodes WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 23. 23 Transport Layer DoS  Flooding:      Any protocol with status keeping at connection end is vulnerable to this. An attacker may repeatedly make new connection request. The resources required by each connection are exhausted or reach a maximum limit. Further legitimate requests will be ignored De-synchronization:   Disruption of an existing connection . Accurately timed, repeatedly spoof messages to an end host causing the host to request the retransmission of missed frames. WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 24. 24 DoS Attack Countermeasures WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 25. 25 Threats Against Secrecy  Node    Replication : An attacker attempts to add a node to an existing WSN by replication (i. e. copying) the node identifier of an already existing node in the network. Leads to network partitioning, communication of false sensor readings. Accessing Crypto keys, attacker can easily manipulate a specific segment of the network WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 26. 26 Threats Against Secrecy  Unauthorized Data aggregation:  Eavesdropping and Passive Monitoring:    Traffic Analysis:     Possible if communication is not protected by cryptographic mechanisms Example: Location information gathering identify some sensor nodes with special roles and activities in a WSN. It usually precedes the eavesdropping. 2 Mechanism : Rate Monitoring and Time Correlation Camouflage:  An adversary may compromise a sensor node in a WSN and later on use it to masquerade a normal node WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 27. 27 Defense Against Attacks on Sensor Privacy  Defense against Node Replication:  Randomized multicast:     Location Info is multicast to random witnesses. Birthday Paradox is used to detect replicated In a network of n nodes, if each location produces √n witnesses, then, the birthday paradox predicts at least one collision with high probability. Line-selected multicast:     It uses network topology to detect replicated It is based on the rumor routing protocol If a conflicting location claim ever crosses the line segment of location claim route to random witness, replication is detected. Communication overhead reduces from O(n2) to O(n√n) WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 28. 28 Defense Against Attacks on Unauthorized Data Aggregation  Defense against Traffic Analysis:   It prevents both rate monitoring and time correlation. It includes four mechanisms: Forwarding to multiple parents  Controlled Random Walk in multi hop path selection to distribute packet traffic  Random fake paths are introduced  Random areas of high communication activities are created to deceive the attacker  WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 29. 29 Defense Against Attacks on Sensor Privacy  Anonymity mechanisms:    An anonymity mechanism depersonalizes the data before it is released from the source. privacy and disclosure trade-off in location-based services. Four proposed approaches:       decentralization of storage of sensitive data establishment of secure channel for communication changing the pattern of data traffic exploiting mobility of the nodes Policy-Based approaches Information Flooding:  Four mechanisms are proposed as follows. WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 30. 30 Information Flooding mechanisms to protect privacy  Baseline flooding:   Probabilistic flooding:    only a subset of nodes in the entire network participates in data forwarding There is packet loss possibility. Flooding with fake messages:   every node in the network forwards a message only once (Broadcast to all neighbors) More sources can be introduced that inject fake messages into the network to prevent back tracing. Phantom flooding:  Probabilistic flooding same concept but changing the shortest path in each packet transmission.   First phase takes hops through random walk (unicast) Second phase floods the message through baseline flooding WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 31. 31 Other security Mechanisms…  Intrusion Detection  Secure Data Aggregation and Clustering  Secure Routing  Cryptography and key management  Trust Management WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 32. 32 Important WSN Security Protocols  SPIN  : SNEP(secure network encryption protocol)  Provides data confidentiality, two-party data authentication, and data freshness for peer to peer communication.  uTELSA (timed efficient streaming loss-tolerant authentication protocol)  provides authenticated broadcast WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir
  • 33. Thanks for your attention Questions? The End WSN Security - Ar.Ghaznavi ar.ghaznavi@stu.yazd.ac.ir