Denial of Service in Sensor Networks



Similar documents
Wireless Sensor Networks Chapter 14: Security in WSNs

DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES

How To Write A Transport Layer Protocol For Wireless Networks

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Introduction to Wireless Sensor Network Security

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Firewalls and Intrusion Detection

Security in Ad Hoc Network

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Security for Ad Hoc Networks. Hang Zhao

co Characterizing and Tracing Packet Floods Using Cisco R

Dynamic Source Routing in Ad Hoc Wireless Networks

Safeguards Against Denial of Service Attacks for IP Phones

Security Technology White Paper

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Prediction of DDoS Attack Scheme

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Tema 5.- Seguridad. Problemas Soluciones

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Security of IPv6 and DNSSEC for penetration testers

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

CS 356 Lecture 16 Denial of Service. Spring 2013

SECURITY VULNERABILITY ISSUES IN WIRELESS

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CS5008: Internet Computing

COSC 472 Network Security

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Client Server Registration Protocol

CSCE 465 Computer & Network Security

Wireless Sensor Networks: Security, Attacks and Challenges

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

SECURING APACHE : DOS & DDOS ATTACKS - I

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Security and Privacy Issues in Wireless Mesh Networks: A Survey

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Networks: IP and TCP. Internet Protocol

ACHILLES CERTIFICATION. SIS Module SLS 1508

CHAPTER 1 INTRODUCTION

A Transport Protocol for Multimedia Wireless Sensor Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Survey on DDoS Attack Detection and Prevention in Cloud

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Announcements. No question session this week

A Security Architecture for. Wireless Sensor Networks Environmental

Security Requirements for Wireless Networks and their Satisfaction in IEEE b and Bluetooth

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

A Catechistic Method for Traffic Pattern Discovery in MANET

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Content Distribution Networks (CDN)

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

Secure SCTP against DoS Attacks in Wireless Internet

Protocol Rollback and Network Security

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Protecting Mobile Devices From TCP Flooding Attacks

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Survey on DDoS Attack in Cloud Environment

Seminar Computer Security

Acquia Cloud Edge Protect Powered by CloudFlare

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

Secure Software Programming and Vulnerability Analysis

Classification of Firewalls and Proxies

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Chapter 8 Security Pt 2

How Cisco IT Protects Against Distributed Denial of Service Attacks

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

PROFESSIONAL SECURITY SYSTEMS

About Firewall Protection

TCP/IP Security Problems. History that still teaches

Security vulnerabilities in the Internet and possible solutions

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Using SYN Flood Protection in SonicOS Enhanced

Low-rate TCP-targeted Denial of Service Attack Defense

Transcription:

Denial of Service in Sensor Networks Authors : From: Anthony D. Wood John A. Stankovic University of Virginia Presented by: Luba Sakharuk

Agenda for the DOS in Sensor Networks Abstract Theory and Application The Denial of Service Threat Physical Layer Link Layer Network and Routing Layer Transport Layer Protocol Vulnerabilities CONCLUSION 1

Abstract Unless their developers take security into account at design time, sensor networks and the protocols they depend on will remain vulnerable to denial-of-service attacks DoS attacks again sensor networks may permit real-world damage to the health and safety of people The limited ability of individual sensor nodes to thwart failure or attack makes ensuring network availability more difficult 2

Theory and Application Developers build sensor networks to collect and analyze low-level data from an environment of interest Sensor networks maybe deployed in a host of different environments Possible Uses: - Military (battlefield conditions, track enemy movement, monitor secured zone for activity, measure damage, casualties - Could form communications network for rescue personnel at disaster sites, they could help locate casualties - Could monitor conditions at the rim of volcano, along an earthquake fault, around critical water reservoir - Could provide always0on monitoring of home healthcare for the elderly, detect chemical or biological thread at airport 3

Theory and Application Security issues for the USES listed on the previous slide: Disasters - It may be necessary to protect the location and status of casualties from unauthorized disclosure (particularly if the disaster relates to ongoing terrorist activities instead of natural causes) Public Safety - False alarms about chemical, biochemical, or environmental threats could cause panic or disregard for warning systems. An attack on the system s availability could precede a real attack on the protected resources Home healthcare - Because protecting privacy is paramount, only authorized users can query or monitor the network. These networks also can form critical pieces of an accidental-notification chain, thus they must be protected from failure 4

The Denial of Service Threat DoS attack is any event that diminishes or eliminates a network's capacity to perform its expected function Each layer is vulnerable to different DoS attacks and has different options for its defense Hardware failures, software bugs, resource exhaustion, environmental conditions, any complicated interaction between these factors can cause DoS 5

DSR Example of Route Discovery mechanism - Dynamic Source Routing -Uses source routing rather than hop-by-hop routing with each packet to be routed carrying in its header the complete, ordered list of nodes through which the packet must pass Route Discovery: 1) flood Route request message through network 2) request answered with route reply by -destination -some other node that knows a path to destination {A} {A,B} A B C {A,B, C} D {A,B, C,D} E reply: {A,B,C,D,E} 6

Example of Route Discovery mechanism 7

Physical Layer Jamming 8

Physical Layer Jamming 9

Physical Layer Tampering 1 0 1 01 01 01 01 1 0 10 10 0 10 0 10 0 10 01 10 One defense involves tamper-proofing the node s physical package. Its success depends on how accurately and completely designers considered potential threats at design time the resources available for design, construction, and test the attacker s cleverness and determination 10

Link Layer Collision A change in the data portion would cause a checksum mismatch at the receiver A corrupted ACK control message could induce costly exponential back-off in some MAC protocols Malicious collisions create a kind of link-layer jamming No completely effective defense is known 11

Link Layer Exhaustion A naïve link-layer implementations may attempt retransmission repeatedly (even if collisions at the end of the frame) This active DoS attack could culminate in the exhaustion of battery resources in nearby nodes One solution makes the MAC admission control rate limited, so the network can ignore excessive requests without sending expensive radio transmissions One design-time strategy for protection against battery-exhaustion attacks limits the extraneous responses the protocol requires 12

Link Layer Unfairness Intermittent application of these attacks can cause unfairness May not entirely prevent legitimate access to the channel, BUT Could degrade service, causing users of a real-time MAC protocol to miss their deadlines One defense against this threat uses small frames, so that an individual node can capture the channel only for short time 13

Network and Routing Layer Neglect and greed S ACK D trash 14

Network and Routing Layer Homing S D Just Listening and Watching Leader,Cryptographic Key Manager, Query Access Pont... You can attack D, he is important! Collaborator Mobile Adversary 15

Network and Routing Layer Misdirection (smurf attack) Source = V Source = V Source = V Source = V Source = V Source = V Source = V Echo Replies V 16

Network and Routing Layer Black holes C 0 hops to A 0 hops to B 0 hops to C B A 17

Network and Routing Layer Authorization (defense again misdirection and black hole attacks) Is he autho rized? 0 hops to A 18

Network and Routing Layer Monitoring 19

Network and Routing Layer Probing Probe 20

Network and Routing Layer Redundancy D S trash 21

Transport Layer Flooding Protocols that must maintain state at either end are vulnerable to memory exhaustion through flooding TCP SYN flood Victim Connection requests One defense requires clients to demonstrate the commitment of their own resources to each connection by solving client puzzles 22

Transport Layer Desynchronization Forges messages to one or both end points Messages carry sequence numbers that cause the end point to request retransmission of missed frames Cause end point waste energy in an endless synchronization-recovery protocol One defense to this attack authenticates all packets exchanged 23

Protocol Vulnerabilities Adaptive rate control Alec Woo and David Culler describe a series of improvement to standard MAC protocols that make them more applicable in sensor networks Key mechanisms include: - random delay for transmissions, - back-off that shifts an application s periodicity phase, - minimization of overhead in contention control mechanisms - passive adaptation of originating and route-through admission control rates - anticipatory delay for avoiding multi hop hidden-node problems 24

Protocol Vulnerabilities Adaptive rate control Woo and Culler propose giving preference to route-through traffic in a admission control by making its probabilistic multiplicative back-off factor 50 percent less than the back-off factor of originating traffic This preserves the network's investment in packets that, potentially, have already traversed many hops This approach exposes a protocol vulnerability by offering an adversary the opportunity to make flooding attacks more effective. High Bandwidth packet streams that an adversary generates will receive preference during collisions that can occur at every hop along their route. Thus, the network must not only bear the malicious traffic, it also gives preference to it! An attacker can exploit a reasonable approach to power conservation and efficiency 25

Protocol Vulnerabilities RAP Provides a real-time communication architecture integrating a query-event service API and geographic forwarding with novel velocity monitoring scheduling (VMS) policy An attacker can flood the entire network with high-velocity packets to waste bandwidth and energy The attack can also amounts to an attacker inducing the node to become a routing black hole 26

Conclusion DoS attacks against sensor networks may permit real-world damage to the health and safety of people Take security into account at design time 27