Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

Wireless sensor network security issues

11 402 vues

Publié le

Publié dans : Technologie
  • I’ve personally never heard of companies who can produce a paper for you until word got around among my college groupmates. My professor asked me to write a research paper based on a field I have no idea about. My research skills are also very poor. So, I thought I’d give it a try. I chose a writer who matched my writing style and fulfilled every requirement I proposed. I turned my paper in and I actually got a good grade. I highly recommend ⇒ www.HelpWriting.net ⇐
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Get the best essay, research papers or dissertations. from ⇒ www.WritePaper.info ⇐ A team of professional authors with huge experience will give u a result that will overcome your expectations.
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • How To Pick Out The Best Battery For a Solar Panel System, Battery Bank, or Off-Grid System ➤➤ http://t.cn/AiFAbuQp
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Sex in your area is here: ❤❤❤ http://bit.ly/36cXjBY ❤❤❤
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Dating direct: ♥♥♥ http://bit.ly/36cXjBY ♥♥♥
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici

Wireless sensor network security issues

  1. 1. WSN security issues Presented by: Maha Saad Mohamed
  2. 2. Introduction High level of security is needed in WSN. This leads to need of extra resources.   BUT WSN resources are very limited. Current researches haven’t treat this conflict yet.   SO Special security requirements are needed. WSN security faces a lot of challenges. A lot of research points in this area is open.    2 Sensor network
  3. 3. Agenda Why high security level is needed? Security AND survivability requirements. Taxonomy of attacks. WSN security challenges. Conclusion. 3 Sensor network
  4. 4. Why high security level is needed?  Have many applications in military and homeland.  Could be deployed in hostile environments.  Could be deployed in uncontrolled environment.  Wireless communication facilitates eavesdropping.  Often monitor their surroundings, so it is easy to deduce extra unwanted information results in privacy violation. 4 Sensor network
  5. 5. WSN security AND survivability requirements. run Security in a WSN is extremely important. Moreover, it should be reliably without interruption. Security requirements:        Confidentiality. Authentication. Non-repudiation . Integrity. Freshness Forward and Backward secrecy Survivability requirements:     5 Reliability Availability. Energy efficiency. Sensor network
  6. 6. Taxonomy of attacks. BASED ON Capability of the attacker 6 Attacks on information in transit Sensor network Protocol stack
  7. 7. 1. Based on capability of the attacker  Outsider versus insider attacks.  Passive versus active attacks.  Mote-class versus laptop-class attacks. 7 Sensor network
  8. 8. 2. Based on attacks on information in transit.  Interruption.  Interception.  Modification.  Fabrication. 8 Sensor network
  9. 9. 3. Based on protocol stack. This protocol stack combines power and routing awareness. WSN protocol stack 9 Sensor network
  10. 10. 3.1. Physical layer attacks.  Attacks:     Device Tampering. Eavesdropping. Jamming. Solutions:   10 Access Restriction Encryption. Sensor network
  11. 11. 3.2. Data link layer attacks.  Attacks:   Traffic Manipulation. Identity Spoofing. ex. Sybil attack  Solutions:   11 Misbehavior Detection. Identity Protection Sensor network
  12. 12. 3.3. Network layer attacks.  Attacks:    False Routing. Black Hole.  Sinkhole Solutions:   12 Routing Access Restriction. False Routing Information Detection. Sensor network
  13. 13. 3.3. Transport layer attacks.  Attacks:    Flooding. De-synchronization Attacks. Solutions:   13 Limit number of connections from a particular node. Header or full packet authentication. Sensor network
  14. 14. 3.3. Application layer attacks.  Attacks:    Selective Message Forwarding. Data Aggregation Distortion Solutions:   14 Data Integrity Protection. Data Confidentiality Protection. Sensor network
  15. 15. WSN security challenges (1/3).  Conflicting between minimization of resource consumption and maximization of security level.  Advanced anti-jamming techniques are impossible due to its complex design and high energy consumption. .  Ad-hoc topology facilitates attackers of different types and from different directions.  Most current standard security protocols do not scale to a large number of participants. 15 Sensor network
  16. 16. WSN security challenges (2/3).  Encryption requires extra processing, memory and battery power.  Secure asymmetric key needs more computations.  Although sensors location information are important most of current proposal are suitable for static WSNs. 16 Sensor network
  17. 17. WSN security challenges (3/3).  Most existing time synchronization schemes are vulnerable to several attacks.  Their low costs impedes use of expensive tamperresistant hardware.  Little research has been done in code attestation. 17 Sensor network
  18. 18. Conclusion.  WSN needs high level of security due to its harsh environment.  This leads to intense security and survival requirements.  WSN face attacks of different types.  Limited resources of sensors make WSN faces a huge security challenges.  Some challenges are resolved and many haven’t resolved yet or under studying. 18 Sensor network
  19. 19. References.  T.Kavitha and D.Sridharan, “Security Vulnerabilities In Wireless Sensor Networks: A Survey”, Journal of Information Assurance and SecurityVol. 5, No. 1 pp. 31– 44, 2010.  Yi Qian and Kejie Lu and David Tipper, “A Design For Secure And Survivable Wireless Sensor Networks”, IEEE Wireless Communications , pp. 30 - 37, October 2007.  K. Xing, S. Srinivasan, M. Rivera, J. Li, and X. Cheng, Attacks and Countermeasures in Sensor Networks: A Survey, The George Washington University Technical Report GWU-CSTR-010-05, 2005. 19 Sensor network
  20. 20. Questions 20 Sensor network
  21. 21. 21 Sensor network

×