Security & Trust in Wireless Sensor Networks



Similar documents
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Introduction to Wireless Sensor Network Security

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Security Sensor Network. Biswajit panja

SPINS: Security Protocols for Sensor Networks

CSC 774 Advanced Network Security. Outline. Related Work

How To Write A Transport Layer Protocol For Wireless Networks

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Data Management in Sensor Networks

Wireless Sensor Network: Challenges, Issues and Research

Secure Routing in Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks

Demystifying Wireless for Real-World Measurement Applications

Some Security Trends over Wireless Sensor Networks

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Security Solutions for Wireless Sensor Networks

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy

SECURITY VULNERABILITY ISSUES IN WIRELESS

The 5G Infrastructure Public-Private Partnership

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Security of MICA*-based / ZigBee Wireless Sensor Networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Wireless Sensor Networks: Security, Attacks and Challenges

Chapter 17 Wireless Sensor Network Security: A Survey

USE CASES BROADBAND EXPERIENCE EVERYWHERE, ANYTIME SMART VEHICLES, TRANSPORT & INFRASTRUCTURE MEDIA EVERYWHERE CRITICAL CONTROL OF REMOTE DEVICES

Security in Ad Hoc Network

An Overview of ZigBee Networks

Wireless Sensor Networks: Security Issues and Challenges

Wireless Sensor Networks Chapter 14: Security in WSNs

Chapter 17 Wireless Sensor Network Security: A Survey

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY

DAG based In-Network Aggregation for Sensor Network Monitoring

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Problems of Security in Ad Hoc Sensor Network

Testing Overview [Document subtitle]

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Efficient Data Transmission For Wireless Sensor Networks

A REMOTE HOME SECURITY SYSTEM BASED ON WIRELESS SENSOR NETWORK AND GSM TECHNOLOGY

About the Authors Preface Acknowledgements List of Acronyms

Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks

International Journal of Advanced Research in Computer Science and Software Engineering

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

Enhancing Base Station Security in Wireless Sensor Networks

Wireless Temperature

Effective Communication in Schools of Submersibles

Image Transmission over IEEE and ZigBee Networks

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

DEVELOPMENT OF INDIVIDUAL HOME SECURITY SYSTEM USING CAN AND ZIGBEE PROTOCOL

Scalable Video Streaming in Wireless Mesh Networks for Education

Securing MANET Using Diffie Hellman Digital Signature Scheme

Information Security

Chapter 3 Safeguarding Your Network

Provide Practical Security Mechanism to Wireless Sensor Networks Using Modified Motesec Protocol

8 Conclusion and Future Work

Secure Data Aggregation in Wireless Sensor Networks

Providing End-to-end Secure Communications in Wireless Sensor Networks

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.

Internet of Things 2015/2016

Frequently Asked Questions For Investors

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

SmartMesh Embedded Wireless Sensor Networking

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

6LoWPAN Technical Overview

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Security for 802 Access Networks: A Problem Statement

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

SECURITY ISSUES: THE BIG CHALLENGE IN MANET

Single Sign-On Secure Authentication Password Mechanism

Fundamentals of Mobile and Pervasive Computing

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Protocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig

A Security Architecture for. Wireless Sensor Networks Environmental

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

A survey on Wireless Mesh Networks

Application Intrusion Detection

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

Getting the Most Out of Your WirelessHART System

Transcription:

Security & Trust in Wireless Sensor Networks Theodore Zahariadis

Ultra-wide-band Sensor Node Ultra small sensor node The smallest UW sensor node in the world: 10mm 10mm 10mm On board temperature sensor Ultra low power Low power communication: 3nW/bps More than 9 years battery life using button cell (CR-2032) (Communication every five minutes) High speed communication From 250kbps to10mbps Power supply board Antenna Main board

Chips will be invisible Newly developed ultra small µ-chip, size of 50 µm x 50 µm Thickness 7.5 µm For sensors directly embedding into paper Compared with crystal of granulated sugar

Wireless Sensor Networks Are expected to: form an integral part of the foreseen Future Internet (of Things) play a key role in the vision of offering mobile, personalised services, whenever and wherever needed Support applications with broadband, wireless connectivity anytime and anywhere. Applications: environmental surveillance, asset management, physical phenomenon monitoring, creation of smart, interactive and immerse spaces However, they face essential security and resilience limitations, especially across insecure, heterogeneous and multiadministration domains

Security and Operational Requirements Privacy/Confidentiality: ensures that the data is well protected and remains secret from unauthorized parties Data Integrity: ensures that any received data has not been altered or modified Data Freshness: data is recent and old messages are not replayed. Non-repudiation: ensure that a node cannot deny sending of a message that it originated. Availability of services and information: services and information can be accessed at the time they are required, despite of the presence of attacks. Network reliability: is the capability to keep the functionality even if some nodes fail and is tightly coupled to resilience. Authentication-survivability: is the capability to verify that the data received was really sent by a trusted sender and not by an adversary that injected data in the network. Self-Organization and self-healing: is the ability to mitigate adverse situations as well as frequent nodes movement. Secure Localization: is the ability to accurately locate each sensor. Scalability: is the ability to support a large number of wireless sensor nodes.

Sensor Node Constraints Energy Limitation. Every security measure taken in order to mitigate attacks has an impact on energy consumption (encryption, hashing, overhead bits). Transmission Range. The transmission range of wireless ad-hoc/sensor nodes is limited in order to conserve energy thus allowing the nodes to restrict their transmission range. Limited memory and storage capacities. Telos: 16-bit, 8 MHz RISC CPU, 10K RAM, 48K Program Memory, 1024K FLASH Mica mote2: 4 MHz 8-bit CPU, 4 K of RAM, 128K Program memory, 512KFLASH. Unattended Operation. The nodes may be deployed in an environment open to adversaries, interference, harsh environmental conditions, etc. The likelihood that a node suffers a physical attack is much higher than in another typical network which is located in a secure place and mainly faces attacks from a network.

Network Constraints Mobility and Hierarchy. During the network mission, the composition of the network and its routing topology may change. Data Rate and Packet Size. oth data rate and packet size affect the overall sensor node energy consumption. Packet sizes are relatively small, while data rates are relatively low. Unreliable Communications. Normally the packet-based routing is connectionless and thus inherently unreliable. Furthermore, the unreliable wireless communication channel also results in damaged packets. Conflicts. Even if the channel is reliable, the communication may still be unreliable. This is due to the broadcast nature of the wireless sensor network. Latency. The multi-hop routing, network congestion and node processing can lead to greater latency in the network, thus making it difficult to achieve synchronization among nodes.

Summary optimisations focus on four key principles: Discovery, evaluation and selection of trusted routes based on multiple security metrics and trust measuring methods. Secure Service Discovery, providing network-level security framework, which will protect service discovery messages inside the sensor network, when crossing unknown domains or when interacting with public service providers. Intrusion detection and intruder identification based on distributed trust to provide security against malicious attacks. Highly Secure sensor nodes against attacks from malicious users having actual access to the sensor nodes. The results will be packed in a security toolbox, which will be prototyped and validated in a large trial of more than 100 sensor nodes.

Thank you Theodore Zahariadis Synelixis Ltd zahariad@synelixis.com

TRUST MODELING Direct Trust Forwarding (E1) Network-ACK (E2) Packet precision- Integrity (E3) Authentication (E4) Cryptography-Confidentiality (E5) Reputation RES (E6) Reputation Validation (E7) Remaining Energy (E8) Network ACK History Log (E9) Number of Interactions (E10) Distance to the sink node (E11) # of Success # of Failures # of Success # of Failures # of Success # of Failures # of Success # of Failures # of Success # of Failures # of Response # of no Response 1 0 1 1 0 1 0 0 1 1 0 1 0 1 1 1 a S b F i i i i T i = aisi + bi Fi T 8 = a8v a V 8 now now b8v + b V 8 initial initial, 1 C A = 1 noi + a 10 DT = C ( k i= 1 W i * T i )

TRUST MODELING: Indirect & Total Trust Direct Trust of responding node DT Nj Reputation RES Reputation value of responding node DT Nj, Reputation Correctness History Log # of Response # of no Response 1 0 1 1 0 1 0 0 1 1 0 1 0 1 IT = n j= 1 W ( DT N j ) DT N, j Total Trust TT = W ( DT ) DT + W ( IT ) IT