Secure Routing in Wireless Sensor Networks
|
|
|
- Percival Fisher
- 10 years ago
- Views:
Transcription
1 Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 1 / 34
2 Outline 1 Motivation 2 Wireless Sensor Networks Routing Directed Diffusion 3 Security in Wireless Sensor Networks Security Requirements Security Threats 4 Countermeasures Outsider attacks and link layer security The Sybil attack HELLO flood attacks Wormhole and sinkhole attacks Leveraging global knowledge Selective forwarding Authenticated broadcast 5 Example of Secure Sensor Network Routing Protocol Attacked Directed Diffusion Proposed Solution for Directed Diffusion Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 2 / 34
3 Motivation Current routing protocols optimize for the limited capabilities of nodes and the application-specific nature of networks, But do not consider security Security is a basic requirement of most applications Industry Surveillance Health Systems Military Applications in-network processing makes end-to-end security mechanisms harder to deploy because intermediate nodes need direct access to the contents of the messages Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 3 / 34
4 Wireless Sensor Networks Routing WSN s are resource constrained Multihop vs single hop topologies Routing is usually data-centric rather than address-centric Example: Directed Diffusion Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 4 / 34
5 Directed Diffusion Source Sink Figure: A simple scenario Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 5 / 34
6 Directed Diffusion Source Sink Figure: Interest propagation Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 6 / 34
7 Directed Diffusion Source Sink Figure: Interest propagation Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 7 / 34
8 Directed Diffusion Source Sink Figure: Low Rate Messages: At this point the sink needs to decide which incoming path to reinforce. The directed diffusion description does not specify how this choice should be done, leaving it as a design choice. One simple possibility could be to include in the low rate messages a Hop Count value, so that the sink can choose the shortest path. Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 8 / 34
9 Directed Diffusion Source Sink Figure: Reinforcement Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 9 / 34
10 Directed Diffusion Source Sink Figure: Data Delivery Along Reinforced Path Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 10 / 34
11 Directed Diffusion Source Sink Figure: Data Delivery Along Reinforced Path Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 11 / 34
12 Security Requirements Authentication Verifying that principals are who they claim to be can be achieved through appropriate proof of identity (i.e. encrypted signature) Integrity Ensure that information is not changed in transit, either due to malicious intent or by accident Data Confidentiality In most applications nodes communicate very sensitive data such as surveillance information and industrial secrets. Such applications need to rely on confidentiality. The standard approach for keeping confidentiality is through the use of encryption Data Freshness To ensure the freshness of each message such that the data is recent, and to ensure that no old messages can be replayed Availability We can loose the availability of a sensor due to the lost of energy because of computation and communication Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 12 / 34
13 Self-Organization Distributed sensor networks must self-organize to support multihop routing. Such self organization is very hard to be done in a secure way Secure Localization The utility of a sensor network often relies on its ability to accurately and automatically locate each sensor in the network. However, an attacker can easily manipulate non secured location information by reporting false signal strengths, replaying signals, etc Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 13 / 34
14 Security Threats Spoofed, altered, or replayed routing information Attacks targeted at the routing information exchanged between nodes so that adversaries may be able to create routing loops, attract or repel network traffic, extend or shorten source routes, generate false error messages, partition the network, and increase end-to-end latency. Selective forwarding Malicious nodes in multi-hop networks may refuse to forward certain messages and simply drop them, ensuring that they are not propagated any further. Sinkhole attacks The adversary collects nearly all the traffic from a particular area through a compromised node, creating a sinkhole with the malicious node at the center. Sybil attacks A single adversary node presents multiple identities to other nodes in the network [2]. Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 14 / 34
15 Wormholes An adversary tunnels messages received in one part of the network over a low latency link and replays them in a different part [6]. HELLO Flood attacks Many protocols require nodes to broadcast HELLO packets to announce themselves to their neighbors, and a node receiving such a packet may assume that it is within (normal) radio range of the sender. This assumption may be false: a laptop-class attacker with large transmission power could convince every node in the network that the adversary is its neighbor. Acknowledgment spoofing Several sensor network routing algorithms rely on implicit or explicit link layer acknowledgements. Due to the inherent broadcast medium, an adversary can spoof link layer acknowledgments for overheard packets addressed to neighboring nodes. Goals include convincing the sender that a weak link is strong or that a dead or disabled node is alive. Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 15 / 34
16 Threat model - Characteristics - Security model Threat models: sensor-class (mote-class) attackers vs laptop-class attacker outsider attacks vs insider attacks Characteristics of sensor networks: power is a scarce resource very little computational power public-key cryptography is so expensive as to be unusable communication bandwidth is extremely limited and multihop routing is used as a way of saving energy Security model: insecure wireless communication limited node capabilities possible insider threats the adversaries can use laptops with high energy and long range communication to attack the network Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 16 / 34
17 Outsider attacks and link layer security Link layer encryption and authentication using a globally shared key. The Sybil attack is not relevant (nodes are unwilling to accept even a single identity of the adversary). The majority of selective forwarding and sinkhole attacks are not possible (the adversary is prevented from joining the topology). Attacks not countered are wormhole attacks and HELLO flood attacks: nothing prevents adversary from using a wormhole to tunnel packets sent by legitimate nodes in one part of the network to legitimate nodes in another part to convince them they are neighbors by amplifying an overheard broadcast packet with sufficient power to be received by every node in the network Ineffective in presence of insider attacks or compromised nodes. Insiders can attack the network by spoofing or injecting bogus routing information, creating sinkholes, selectively forwarding packets, using the Sybil attack, and broadcasting HELLO floods. Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 17 / 34
18 The Sybil attack Every node share a unique symmetric key with a trusted base station. Two nodes use a Needham-Schroeder like protocol to verify each other s identity and establish a shared key. A pair of neighboring nodes can use the resulting key to implement an authenticated, encrypted link between them. The base station limits the number of neighbors a node is allowed to have to prevent an insider from wandering around a stationary network and establishing shared keys with every node in the network. Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 18 / 34
19 HELLO flood attacks Verification of the bidirectionality of a link before taking meaningful action based on a message received over that link. Identity verification protocol as for the Sybil attack is sufficient for prevention. Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 19 / 34
20 Wormhole and sinkhole attacks Wormholes are hard to detect because they use a private, out-of-band channel invisible to the underlying sensor network. A technique for detecting wormhole attacks is presented in [5], but it requires extremely tight time synchronization. Sinkholes are difficult to defend against in protocols that use advertised information such as remaining energy or an estimate of end-to-end reliability to construct a routing topology because this information is hard to verify. Protocols that construct a topology initiated by a base station are most susceptible to wormhole and sinkhole attacks. Solution: carefully design routing protocols in which wormholes and sinkholes are meaningless eg. class of geographic routing protocols. Geographic protocols construct a topology on demand using only localized interactions and information and without initiation from the base station. Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 20 / 34
21 Leveraging global knowledge Challenge in securing large sensor networks is their inherent self-organizing, decentralized nature. To account for topology changes due to radio interference or node failure, nodes would periodically update a base station with the appropriate information. Drastic or suspicious changes to the topology might indicate a node compromise. Restricting the structure of the topology can eliminate the requirement for nodes to advertise their locations if all nodes locations are well known, eg. nodes can be arranged in a grid with square, triangular, or hex shaped cells. Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 21 / 34
22 Selective forwarding Multipath routing: Messages routed over n paths whose nodes are completely disjoint are completely protected against selective forwarding attacks involving at most n compromised nodes and offer probabilistic protection when over n nodes are compromised. Completely disjoint paths are difficult to create. Braided paths [11]: nodes may be in common, but no links in common (i.e., no two consecutive nodes in common). Multiple braided paths may provide probabilistic protection against selective forwarding and use only localized information. Dynamic choice of a packet s next hop probabilistically from a set of possible candidates to reduce the chances of an adversary gaining complete control of a data flow. Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 22 / 34
23 Authenticated broadcast Base stations are trustworthy, adversaries must not be able to spoof broadcast or flooded messages from any base station. µtesla [9] is a protocol for efficient, authenticated broadcast and flooding. Symmetric key cryptography and minimal packet overhead. Asymmetry for authenticated broadcast and flooding by using delayed key disclosure and one-way key chains Preventing replay messages authenticated with previously disclosed keys are ignored. Loose time synchronization. Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 23 / 34
24 Attacked Directed Diffusion Source Sink Figure: Simple Attack Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 24 / 34
25 Directed Diffusion Source Sink Figure: Interest Propagation is Normal Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 25 / 34
26 Directed Diffusion Source Sink Figure: Attacker Alters the Informed Hop Count Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 26 / 34
27 Directed Diffusion Source Sink Figure: Attacker Selected for Reinforcement Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 27 / 34
28 Directed Diffusion Source Sink Figure: Attacker has Access to All Data Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 28 / 34
29 Proposed Solution for Directed Diffusion We ensure data confidentiality (Data chunk) and data integrity (Requirment/Hopcount chunk) SNEP (Secure Network Encryption Protocol): providing data confidentiality, two-party data authentication, and data freshness, with low overhead do not deal completely with compromised sensors, merely ensure that compromising a single sensor does not reveal the keys of all the sensors in the network. E = {D} Kencr,C {to achieve confidentiality, use encrypted data} M = MAC(K mac, C {E}) {to achieve data integrity, use a message authentication code (MAC)} D:data Kencr : encryption key C:counter Kencr and K mac : derived from the master secret key K Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 29 / 34
30 Summary Current routing protocols optimize for the limited capabilities of nodes and the application-specific nature of networks. Secure sensor network routing protocols requirements, threats and countermeasures. Routing security must be included as part of the overall sensor network design. Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 30 / 34
31 For Further Reading I J.N. Al-Karaki and A.E. Kamal. Routing techniques in wireless sensor networks: a survey. IEEE Wireless Communications, 11(6):6 28, J.R. Douceur. The sybil attack. In in 1st International Workshop on Peer-to-Peer Systems (IPTPS02), March D. Ganesan, B. Krishnamachari, A. Woo, D. Culler, D. Estrin, and S. Wicker. An empirical study of epidemic algorithms in large scale multihop wireless networks. Technical report, Z.J. Haas, J.Y. Halpern, and L. Li. Gossip-based ad hoc routing. IEEE/ACM Trans. Netw., 14(3): , Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 31 / 34
32 For Further Reading II Y. Hu, A. Perrig, and D. Johnson. Wormhole detection in wireless ad hoc networks. Technical report, Y.C. Hu, A. Perrig, and D.B. Johnson. Wormhole detection in wireless ad hoc networks. Tech. Rep. TR01-384, Department of Computer Science, Rice University, June C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In First IEEE International Workshop on Sensor Network Protocols and Applications, pages , May J. Kulik, W. Heinzelman, and H. Balakrishnan. Negotiation-based protocols for disseminating information in wireless sensor networks. Wirel. Netw., 8(2/3): , Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 32 / 34
33 For Further Reading III A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler. Spins: security protocols for sensor networks. Wirel. Netw., 8(5): , J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary. Wireless sensor network security: A survey, Y. Yu, R. Govindan, and D. Estrin. Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Technical report, Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks University of Trento 33 / 34
WIRELESS SENSOR NETWORK SECURITY ANALYSIS
WIRELESS SENSOR NETWORK SECURITY ANALYSIS Hemanta Kumar Kalita 1 and Avijit Kar 2 1 Department of Computer Engineering, Jadavpur University, Kolkata, India [email protected] 2 Department of Computer
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
Security Issues in Wireless Sensor Networks
MAGNT Research Report (ISSN. 1444-8939) Vol.2(4):PP.82-91 Security Issues in Wireless Sensor Networks Anser Ghazaal Ali Alquraishee, Aasim Zafar, Syed Hamid Hasan Information Security Research Group Faculty
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley ckarlof,daw @cs.berkeley.edu Abstract We consider routing security
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
Security Analysis of Routing Protocols in Wireless Sensor Networks
www.ijcsi.org 465 Security Analysis of Routing Protocols in Wireless Sensor Networks Mohammad Sadeghi 1, Farshad Khosravi 2, Kayvan Atefi 3, Mehdi Barati 4 1 Faculty of Computer and Mathematical Sciences,
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California, Berkeley Abstract We consider routing security in wireless sensor networks. Many
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Stochastic
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Hello Flood Attack and its Countermeasures in Wireless Sensor Networks
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 23 Hello Flood Attack and its Countermeasures in Wireless Sensor Networks Virendra Pal Singh 1, Sweta Jain 2 and Jyoti Singhai 3 1 Department of Computer
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
How To Secure A Wireless Sensor Network
Int. J. Advanced Networking and Applications 707 Analysis of Security Protocols in Wireless Sensor Network Ritu Sharma 1 Email: [email protected] Yogesh Chaba 2 Associate Professor Email : [email protected]
A Short Survey on Secure Routing Protocols in Hierarchical Cluster- Based Wireless Sensor Networks
A Short Survey on Secure Routing Protocols in Hierarchical Cluster- Based Wireless Sensor Networks F.MEZRAG 1, M.BENMOHAMMED 2, B.BOUDERAH 3 1,3 Department of Computer Science, University of M Sila, Algeria
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Tema 5.- Seguridad. Problemas Soluciones
Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
Wireless Network Security 14-814 Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
SECURITY VULNERABILITY ISSUES IN WIRELESS
SECURITY VULNERABILITY ISSUES IN WIRELESS SENSOR NETWORKS: A SHORT SURVEY C K Marigowda 1, Manjunath Shingadi 2 Associate Professor, Department of Information Science & Eng, Acharya Institute of Technology,
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos Athens Information Technology, P.O.Box 68, 19.5 km Markopoulo
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
Wireless Sensor Networks: Security, Attacks and Challenges
Wireless Sensor Networks: Security, Attacks and Challenges Chaudhari H.C. and Kadam L.U. Swami Vivekanand Mahavidyalaya, Udgir e-mail: [email protected] Abstract The significant advances of
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL 1 Rajesh C. Ramannavar, 2 Suma K.V 1 Student, 2 Assistant Professor M S Ramaiah Institute of Technology,Bengaluru,India Email: 1 [email protected],
Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
DESIGNING SECURE SENSOR NETWORKS
WIRELESS SENSOR NETWORKS DESIGNING SECURE SENSOR NETWORKS ELAINE SHI AND ADRIAN PERRIG, CARNEGIE MELLON UNIVERSITY Sensor networks are a promising approach for a variety of applications, such as monitoring
Empirical Study on Secure Routing Protocols in Wireless Sensor Networks
Empirical Study on Secure Routing Protocols in Wireless Sensor Networks Ali Modirkhazeni Msc Student, Faculty of Computer Science and Information Systems,University Technology Malaysia [email protected]
Security Issues and Sybil Attack in Wireless Sensor Networks
Security Issues and Sybil Attack in Wireless Sensor Networks Pooja 1, Manisha 2, Dr. Yudhvir Singh 3 1 M.Tech(CS) Student, AIM & ACT Department, Banasthali Vidyapith, Tonk, Rajasthan, India 2 M.Tech(CS)
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
The Network and Security Analysis for Wireless Sensor Network : A Survey
The Network and Security Analysis for Wireless Sensor Network : A Survey Alok Ranjan Prusty Computer Science & Engineering Koustuv Institute Of Technology (KIT) Biju Patnaik University of Technology (B.P.U.T),
Improving Availability of Secure Wireless Sensor Networks
SETIT 2007 4 th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 25-29, 2007 TUNISIA Improving Availability of Secure Wireless Sensor Networks
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Resiliency of Wireless Sensor Networks: Definitions and Analyses
Resiliency of Wireless Sensor Networks: Definitions and Analyses Orange Labs & CITI Labs INSA-Lyon O.Erdene-Ochir, M. Minier, F. Valois, A. Kountouris February 10, 2010, presentation to CITI seminar Thesis
Routing and Transport in Wireless Sensor Networks
Routing and Transport in Wireless Sensor Networks Ibrahim Matta ([email protected]) Niky Riga ([email protected]) Georgios Smaragdakis ([email protected]) Wei Li ([email protected]) Vijay Erramilli ([email protected]) References
Fast and Scalable Key Establishment in. Sensor Networks
Fast and Scalable Key Establishment in 1 Sensor Networks Tassos Dimitriou, Ioannis Krontiris and Fotios Nikakis Athens Information Technology [tdim, ikro, fnik]@ait.gr Abstract We present a protocol for
Secure Data Collection and Critical Data Transmission Technique in Mobile Sink Wireless Sensor Networks. Master of Technology
Secure Data Collection and Critical Data Transmission Technique in Mobile Sink Wireless Sensor Networks Thesis submitted in partial fulfillment of the requirements for the degree of Master of Technology
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Analysis of Typical Secure Routing Protocols in WSN
, pp.41-50 http://dx.doi.org/10.14257/ijsia.2014.8.6.04 Analysis of Typical Secure Routing Protocols in WSN Jingsha He 1,2,a, Bo Zhou 1,b and Ruohong Liu 2,c 1 School of Software Engineering, Beijing University
Efficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
WIRELESS SENSOR NETWORKS ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES
WIRELESS SENSOR NETWORKS ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES Ranjit Panigrahi 1, Kalpana Sharma 2, M.K. Ghose 1 Department of Computer Sc. & Engineering, SMIT,
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 1, January 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
ijesm Security Threats in Wireless Sensor Networks: A Comprehensive Overview (General article) www.ijesm.com
ijesm www.ijesm.com International Journal of Engineering, Science and Metallurgy (General article) Security Threats in Wireless Sensor Networks: A Comprehensive Overview Mukesh Chawla a*, Kamlesh Dutta
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks
Acta Polytechnica Hungarica Vol. 8, No. 6, 2011 Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks Liana Khamis Qabajeh, Miss Laiha Mat Kiah Faculty of Computer Science and Information
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
About the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 3호 2012년 6월 A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks Ju young Kim 1), Ronnie D. Caytiles 2), Kyung Jung Kim 3) Abstract
Wireless sensor network
SECURITY IN WIRELESS SENSOR NETWORKS By ADRIAN PERRIG, JOHN STANKOVIC, and DAVID WAGNER They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service,
Foundation University, Islamabad, Pakistan [email protected]
Kerberos Authentication in Wireless Sensor Networks Qasim Siddique Foundation University, Islamabad, Pakistan [email protected] ABSTRACT We proposed an authentication mechanism in the wireless sensor
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access
CSC 774 Advanced Network Security. Outline. Related Work
CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN
SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela, elleithy}
Security & Trust in Wireless Sensor Networks
Security & Trust in Wireless Sensor Networks Theodore Zahariadis Ultra-wide-band Sensor Node Ultra small sensor node The smallest UW sensor node in the world: 10mm 10mm 10mm On board temperature sensor
MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY
MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY Nadher M. A. Al_Safwani, Suhaidi Hassan, and Mohammed M. Kadhum Universiti Utara Malaysia, Malaysia, {suhaidi, khadum}@uum.edu.my, [email protected]
A Detail Survey on Wireless Sensor Networks (WSNs) Security Issues
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.111
A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks
A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks Suraj Sharma and Sanjay Kumar Jena Department of Computer Science and Engineering National Institute of Technology Rourkela,
Provide Practical Security Mechanism to Wireless Sensor Networks Using Modified Motesec Protocol
RESEARCH ARTICLE Provide Practical Security Mechanism to Wireless Sensor Networks Using Modified Motesec Protocol Monali Madne 1, Prof Manjusha Yeola 2 1(Computer Department, University of pune, Pune)
A Review of Secure Ad-hoc Routing
www..org 30 A Review of Secure Ad-hoc Routing Tannu Arora 1, Deepika Arora 2 1 Computer Science, M.D.U/GIET, Sonipat, Haryana, India [email protected] 2 Computer Science, C.D.L.U, Sirsa, Haryana, India
Security and Privacy Issues in Wireless Sensor Networks for Healthcare
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring
Routing Security in Ad Hoc Wireless Networks 1
Network Security Scott Huang, David MacCallum, and Ding Zhu Du(Eds.) pp. - c 2005 Springer Routing Security in Ad Hoc Wireless Networks 1 Mohammad O. Pervaiz, Mihaela Cardei, and Jie Wu Department of Computer
