Securing wireless sensor networks

Similar documents
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Some Security Trends over Wireless Sensor Networks

Securing MANET Using Diffie Hellman Digital Signature Scheme

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

Fundamentals of Mobile and Pervasive Computing

Wireless Security Architecture

Data Security in Unattended Wireless Sensor Network

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Wireless Sensor Network: Challenges, Issues and Research

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Demystifying Wireless for Real-World Measurement Applications


Security Sensor Network. Biswajit panja

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Tema 5.- Seguridad. Problemas Soluciones

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES

INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Privacy & Security of Mobile Cloud Computing (MCC)

Design of Remote data acquisition system based on Internet of Things

A Security Architecture for. Wireless Sensor Networks Environmental

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks

About the Authors Preface Acknowledgements List of Acronyms

Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System

Efficient Data Transmission For Wireless Sensor Networks

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

The Interoperability of Wireless Sensor Networks

Protocol Design for Neighbor Discovery in AD-HOC Network

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik

DAG based In-Network Aggregation for Sensor Network Monitoring

Internet of Things (IoT): A vision, architectural elements, and future directions

Problems of Security in Ad Hoc Sensor Network

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Vehicular On-board Security: EVITA Project

EPL 657 Wireless Networks

Research Projects in the Mobile Computing and Networking (MCN) Lab

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Wireless Sensor Network: Improving the Network Energy Consumption

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

TETRA Security for Poland

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

Secure Routing in Wireless Sensor Networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

A Catechistic Method for Traffic Pattern Discovery in MANET

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Secure Data Aggregation and Data Recovery in Wireless Sensor Networks

SPINS: Security Protocols for Sensor Networks

Seminar: Security Metrics in Cloud Computing ( se)

Vampire Attack Detecting and Preventing in Wireless Sensor Network

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Graduation Project Ideas Proposed By Faculty Members Department of Communication and Networks

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting

A Secure Decentralized Access Control Scheme for Data stored in Clouds

An Efficient Data Correctness Approach over Cloud Architectures

MetroNet6 - Homeland Security IPv6 R&D over Wireless

A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Distribution transparency. Degree of transparency. Openness of distributed systems

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

Remote Home Security System Based on Wireless Sensor Network Using NS2

A Secure Intrusion Avoidance System Using Hybrid Cryptography

Transcription:

Securing wireless sensor networks ODU Sensor Network Research Group Stephan Olariu Ashraf Wadaa Larry Wilson Kennie Jones ODU ODU ODU NASA LANGLEY

Agenda What are wireless sensor networks (WSNs)? Security Goals Toward Security Products Conclusions Future Research and Development Listing of Publications/talks

An generic sensor network Satellite Sink Event Internet End user

Sensor networks Wireless sensor network massive collection of tiny sensors linked by a wireless medium Main goal: global info from local data Must integrate sensing, data fusion and lowpower communication Must work unattended Amorphous à self-organized Massive fault tolerance An inherently distributed platform

The virtual infrastructure Dynamic coordinate system Cluster structure Work model Task-based management TA

Ubiquitous WSNs/ Temporary Infrastructures Sensor nodes Remote security monitoring station Command Node Command Node Command Node Agile multi-service sensor network system self-organized to serve a rescue

Sensors Each sensor packs: micro-sensor technology low power signal processing low power computation low power networking capabilities Non-renewable energy budget Anonymity: no fabrication-time identity Sleep as much as possible - conserve energy Sense and compute freely limit communication- conserve energy

Security goals addressed Availability: ensure the survivability of network services despite denial-of-service (DoS) attacks Confidentiality: ensure that information is not disclosed to unauthorized entities Integrity: guarantee that a message being transferred is not corrupted Authentication: enable a node to ensure the identity of the peer node Anonymity: hide the identity of sources, destinations, and routes Tamper Proofing: Ensure that nodes cannot be physically forced to divulge secrets

FH illustration

NSA Tamper proofing, authentication After deployment each sensor transmits on a specified sets of frequencies Each sensor collects an array of signal strengths from the sensors in its locale NSA the Neighborhood Signature Array Removal from deployment area à changes in the NSA

Randomized Routing

Color Graphs

Color paths

Security techniques in a nutshell Initialize sensors with secrets and synchronize clocks Deploy sensors over the desired area FH communications only NSA Resynchronize clocks periodically Train the sensors to provide temporary virtual infrastructure Assign tasks to the trained network Randomly vary sources, destinations and communication paths Partition the network into color sets - concurrent tasking Lightweight data encryption available

Grant Results Invited book chapters 3 Journal Articles 6 International Conference Proceedings 7 Presentations - 9 NSF Proposals - 4 Two PhD dissertations nearing completion Third dissertation in preliminary stages NASA proposals 3, One funded - 1 Collaborations with JMU and VA Tech

Conclusions Contributions: Virtual infrastructure leveraged for security Physical level encoding via FH, very light weight and highly effective DoS, Confidentiality, Integrity NSA Authentication, Tamper Proofing Software Random routing - Anonymity Current Situation: Wireless sensor network research is still in its infancy Securing sensor networks a subject for active research

Future Directions of this group Partner with industry to market results. Extend and improve results with an emphasis on implementation and marketing. Further progress on the open research questions required by WSNs. Continue collaborations

Publications acknowledging the current grant Invited Chapters 1. D. Gracanin, M. Eltoweissy, S. Olariu, and A. Wadaa, Dependability Support in Wireless Sensor Networks, in H. Diab and A.Y. Zomaya, Eds, Dependable Systems, John Wiley and Sons, 2004. 2. S. Olariu, K. Maly, E.C. Foudriat, S. M. Yamany and T. Luckenbach, A Dependable Architecture for Telemedicine in Support of Disaster Relief, in H. Diab and A.Y. Zomaya, Eds, Dependable Systems, John Wiley and Sons, 2004. 3. K. H. Jones, K. N. Lodding, S. Olariu, A. Wadaa, L. Wilson and M. Eltoweissy, Biomimetic Models for Wireless Sensor Networks, in S. Olariu and A. Y. Zomaya, Eds, Bio-Inspired Paradigms in Computer Science, CRC Press, Boca Raton, Florida, August 2004.

Publications acknowledging the current grant Archival Journals 1. L. Wang and S. Olariu, A unifying look at clustering in mobile ad-hoc networks, Journal of Wireless Communications and Mobile Computing, to appear, 2004. 2. S. Olariu, A. Wadaa, L. Wilson, and M. Eltoweissy, Wireless sensor networks - Leveraging the Virtual Infrastructure, IEEE Network, August 2004, to appear. 3. A. Wadaa, S. Olariu, L. Wilson, M. Eltoweissy, and K. Jones, Training a Sensor Network, Mobile Networks and Applications (MONET), June 2004, to appear. 4. A. Wadaa, K. Jones, S. Olariu, and M. Eltoweissy; and L. Wilson, A Scalable Solution for Securing Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, submitted. 5. A. Wadaa, S. Olariu, and L. Wilson, and M. Eltoweissy, Scalable Cryptographic Key Management in Wireless Sensor Networks, Journal of Ad Hoc Networks: Special issue on Data Communications and Topology Control in Ad Hoc Networks, Elsevier Publishers, accepted for publication. 6. S. Olariu, A. Wadaa, M. Eltoweissy, D. Gracanin, and L. Wilson, Anonymity in Sensor Networks: Time-Frequency Randomization of Virtual Communication Graphs, International Journal of Wireless and Mobile Communications, Special Issue on Wireless Ad Hoc Networking, Interscience Publishers, to appear, 2004.

Publications acknowledging the current grant International Conference Proceedings 7. D. Gracanin, M. Eltoweissy, S. Olariu, A. Wadaa, On Modeling Wireless Sensor Networks, Proc. International Workshop on Wireless, Mobile and Ad Hoc Networks (WMAN)}, Santa Fe, NM, April 2004. 8. A. Wadaa, S. Olariu, L. Wilson, M. Eltoweissy and K. Jones, On providing anonymity in wireless sensor networks, International Conference on Parallel and Distributed Systems, (ICPADS-2004), Newport Beach, California, July 2004. 9. A. Wadaa, S. Olariu, L. Wilson, and M. Eltoweissy gwise: A Group Key Management Scheme for Wireless Sensor Networks, IEEE Mediterranean Electro-technical Conference, Croatia, May 2004. 10. S. Olariu, K. Maly, E. C. Foudriat and S. Yamany, Wireless support for telemedicine in disaster management, International Conference on Parallel and Distributed Systems, (ICPADS-2004), Newport Beach, California, July 2004. 11. K. Jones, A.Wadaa, S. Olariu, L. Wilson, and M. Eltoweissy, Towards a New Paradigm for Securing Wireless Sensor Networks, NSPW 2003, August 18 th - 21 st, 2003. Ascona, Switzerland, Proceedings New Security Paradigms Workshop 2003, pp 115-122. 12. A. Wadaa, S. Olariu, L. Wilson, K. Jones and Q Xu, On Training a Sensor Network, International Workshop on Wireless, Mobile and Ad Hoc Networks (WMAN), Nice, France, April 26, 2003. 13. A. Wadaa, S. Olariu, L. Wilson, and M. Eltoweissy, Scalable key management for secure communications in wireless sensor networks, Proc. International Workshop on Wireless Ad-hoc Networking, Tokyo, Japan, March 23-26, 2004.

Presentations acknowledging the current grant 1. Security in wireless networks, Hampton University, February 2003. 2. State of the art in wireless sensor networks, Invited talk, WMAN'2003, April2003, Nice, France. 3. Securing wireless sensor networks, NRL, May 2003. 4. Wireless sensor networks, University of Burgundy, Dijon, France, June 2003. 5. Energy-efficient protocols in wireless networks, Humboldt University, Berlin, Germany, July 2003 6. Securing wireless sensor networks -- new paradigms, Free Universitaet, Berlin, Germany, July 2003. 7. Securing wireless sensor networks -- a new paradigm, University of Bologna, Italy, July 2003. 8. Wireless sensor networks, Virginia Tech, October 2003 9. Security issues in wireless sensor networks, Kent State University, January 2004.