Wireless Sensor Networks Chapter 14: Security in WSNs



Similar documents
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless sensor network

Denial of Service in Sensor Networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Introduction to Wireless Sensor Network Security

DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

How To Write A Transport Layer Protocol For Wireless Networks

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

Wireless Sensor Networks: Security, Attacks and Challenges

Security for Ad Hoc Networks. Hang Zhao

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Secure Routing in Wireless Sensor Networks

A Security Architecture for. Wireless Sensor Networks Environmental

A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

CHAPTER 1 INTRODUCTION

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Securing MANET Using Diffie Hellman Digital Signature Scheme

Prediction of DDoS Attack Scheme

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Wireless Sensor Network: Challenges, Issues and Research

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Problems of Security in Ad Hoc Sensor Network

COSC 472 Network Security

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks


Security Sensor Network. Biswajit panja

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

SECURITY VULNERABILITY ISSUES IN WIRELESS

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Efficient Data Transmission For Wireless Sensor Networks

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

Security in Ad Hoc Network

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

How To Secure A Wireless Sensor Network

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

PREVENTING SELECTIVE JAMMING ATTACKS BY USING PACKET-HIDING METHOD

Security and Privacy Issues in Wireless Mesh Networks: A Survey

Neighborhood-Based Security Protocol for Wireless Sensor Networks

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

SPINS: Security Protocols for Sensor Networks

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Wireless Network Security Spring 2014

Chapter 6: Fundamental Cloud Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Security Goals Services

SECURITY ISSUES: THE BIG CHALLENGE IN MANET

Security Requirements for Wireless Networks and their Satisfaction in IEEE b and Bluetooth

Security Solutions for Wireless Sensor Networks

About the Authors Preface Acknowledgements List of Acronyms

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

Content Teaching Academy at James Madison University

Enhancing Base Station Security in Wireless Sensor Networks

Some Security Trends over Wireless Sensor Networks

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

A STUDY OF SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS

Cryptography and Network Security

Secure Authentication Methods for Preventing Jamming Attacks In Wireless Networks

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

Intrusion Detection for Mobile Ad Hoc Networks

SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK

Chap. 1: Introduction

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

DESIGNING SECURE SENSOR NETWORKS

Introduction to Security

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Chapter 17 Wireless Sensor Network Security: A Survey

Routing Protocols Security in Ah Hoc Networks

Security for 802 Access Networks: A Problem Statement

Client Server Registration Protocol

Compter Networks Chapter 9: Network Security

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

A Survey of Security Issues In Wireless Sensor Networks

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Survey on different attacks in Wireless Sensor Networks and their prevention system

Chapter 17 Wireless Sensor Network Security: A Survey

Transcription:

Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list

Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks To identify the main classes of WSN security attacks To identify possible countermeasures to those attacks Wireless Sensor Networks: Security in WSNs 2

Outline WSN Security overview Denial of service attacks Network Security Services Wireless Sensor Networks: Security in WSNs 3

Fundamentals Confidentiality Data Integrity Accountability Availability Controlled Access Wireless Sensor Networks: Security in WSNs 4

Fundamentals (2) Some common threats: Eavesdropping Masquerading Authorization violation Provoking loss or modification of information Forgery Repudiation Sabotage Attacks may cover all layers of the protocol stack Many countermeasures are based on cryptographic algorithms How to perform key distribution and management? Wireless Sensor Networks: Security in WSNs 5

Problems Applying Traditional Network Security Techniques Sensor devices are limited in their energy, computation, and communication capabilities. Sensor nodes are often deployed in open areas, thus allowing physical attack. Sensor networks closely interact with their physical environments and with people, posing new security problems. In-network processing requires intermediate nodes to access and modify information. Wireless Sensor Networks: Security in WSNs 6

Adversarial Capability Physically damaged or manipulated node May be less powerful than a normally functioning node. Subverted nodes (or added ones) Interact with the network only through software As powerful as other nodes Immensely more powerful adversaries Existing wired network with virtually unlimited computational and energy resources possible. Wireless Sensor Networks: Security in WSNs 7

Key Establishment and Trust Sensor devices have limited computational power, making public-key cryptographic primitives too expensive in terms of system overhead. Simplest solution is a network-wide shared key. Problem: if even a single node were compromised, the secret key would be revealed, and decryption of all network traffic would be possible. Slightly better solution: Use a single shared key to establish a set of link keys, one per pair of communicating nodes, then erase the network-wide key Problem: does not allow addition of new nodes after initial deployment Wireless Sensor Networks: Security in WSNs 8

Key Establishment and Trust (2) Bootstrapping keys using a trusted base station. Each node needs to share only a single key with the base station and set up keys with other nodes through the base station The base station becomes a single point of failure, but being that there is only one base station, it becomes feasible (financially and otherwise) to utilize tamper-resistant packaging for the base station, reducing the threat of physical attack. Wireless Sensor Networks: Security in WSNs 9

Ongoing Research: random-key pre-distribution protocols Large pool of symmetric keys is chosen Random subset of the pool is distributed to each sensor node To communicate, two nodes search their pools for a common key If they find one, they use it to establish a session key Not every pair of nodes shares a common key, but if the keyestablishment probability is sufficiently great, nodes can securely communicate with sufficiently many nodes to obtain a connected network. This means of establishing keys avoids having to include a central trusted base station. The disadvantage of this approach is that attackers who compromised sufficiently many nodes could also reconstruct the complete key pool and break the scheme. Wireless Sensor Networks: Security in WSNs 10

Secrecy and Authentication We need cryptography as protection against eavesdropping, injection, and modification of packets Trade-offs when incorporating cryptography into sensor networks: end-to-end cryptography achieves a high level of security but requires that keys be set up among all end points and be incompatible with passive participation and local broadcast. link-layer cryptography with a network-wide shared key simplifies key setup and supports passive participation and local broadcast, but intermediate nodes might eavesdrop or alter messages. Wireless Sensor Networks: Security in WSNs 11

Hardware vs Software Cryptography Hardware solutions are generally more efficient, but also more costly ($). University of California, Berkeley, implementation of TinySec incurs only an additional 5% 10% performance overhead using software-only methods. Most of the overhead is due to increases in packet size. Cryptographic calculations have little effect on latency or throughput, since they can overlap with data transfer. Hardware reduces only the computational costs, not packet size. Therefore, software-only techniques are sufficient. Wireless Sensor Networks: Security in WSNs 12

Privacy Issues Employers might spy on their employees; shop owners might spy on customers Neighbors might spy on each other Law enforcement agencies might spy on public places. Technological improvements will only worsen the problem. Devices will get smaller and easier to conceal Devices will get cheaper, thus surveillance will be more affordable Wireless Sensor Networks: Security in WSNs 13

Privacy (2) Sensor networks raise new threats that are qualitatively different from what private citizens worldwide faced before. Sensor networks allow data collection, coordinated analysis, and automated event correlation. Example, networked systems of sensors can enable routine tracking of people and vehicles over long periods of time. Suggested ways of approaching solution include a mix of: societal norms new laws technological responses Wireless Sensor Networks: Security in WSNs 14

Resilience to Node Capture In traditional computing, physical security is often taken for granted Sensor nodes, by contrast, are likely to be placed in open locations. attacker might capture sensor nodes extract cryptographic secrets modify their programming possibly replace them with malicious nodes Tamper-resistant packaging may be one defense, but it s expensive. Wireless Sensor Networks: Security in WSNs 15

Resilience to Node Capture (2) Attempt to build networks that operate correctly even in the presence of nodes that might behave in an arbitrarily malicious way. Replicate state across the network and use majority voting to detect inconsistencies Gather redundant views of the environment and crosscheck them for consistency Node capture is one of the most challenging problems in sensor network security, and we are far from a complete solution. How to identify compromised nodes, e.g., in Transport layer attacks? Wireless Sensor Networks: Security in WSNs 16

Outline WSN Security overview Denial of service attacks Network Security Services Wireless Sensor Networks: Security in WSNs 17

The Denial-of-Service Threat A DoS attack is any event that diminishes or eliminates a network s capacity to perform its expected function. Hardware failures, software bugs, resource exhaustion, environmental conditions, or their combination Intentional Attack Wireless Sensor Networks: Security in WSNs 18

Robustness to Denial of Service Simple form: Radio jamming Sophisticated form: Transmit while a neighbor is also transmitting or continuously generating a request-to-send signal. Possible solution (when the jamming affects only a portion of the network): detect the jamming map the affected region route around the jammed area When the jammer is a WSN node Low Power Jamming Solution: carefully design MAC protocols to minimize periodicity Wireless Sensor Networks: Security in WSNs 19

Attacks on the Physical Layer Jamming Defenses Spread-spectrum Region mapping Lower duty cycle Tampering Defenses: Tamper-proofing, hiding Wireless Sensor Networks: Security in WSNs 20

Link Layer attacks Collision Use error-correcting codes Exhaustion Rate limitation Unfairness Small frames Wireless Sensor Networks: Security in WSNs 21

Secure Routing Proper routing and forwarding are essential for communication in sensor networks. Injection attacks Transmit malicious routing information into the network resulting in routing inconsistencies. Authentication might guard against injection attacks, but some routing protocols are vulnerable to replay by the attacker of legitimate routing messages. Sensor network routing protocols are particularly susceptible to node-capture attacks. the compromise of a single node is enough to take over the entire network or prevent any communication within it Wireless Sensor Networks: Security in WSNs 22

Network and Routing Attacks Neglect and greed Redundancy, probing Homing/traffic analysis Encryption: enough? Misdirection Egress filtering, authorization, monitoring Black holes Authorization, monitoring, probing, redundancy Wireless Sensor Networks: Security in WSNs 23

Neglect and Greed Neglect Drops packets arbitrarily Greed Gives undue priority to it s own messages Use multiple paths and/or redundant messages to mitigate these effects. Wireless Sensor Networks: Security in WSNs 24

Black-Holes Distance-vector-based protocol weakness Nodes advertise zero-cost routes to every other node. Fixes: Authorization Monitoring watchdog the next hop transmission of your packets by neighbors Probing Send periodic messages across topology to test for blackout regions Redundancy Wireless Sensor Networks: Security in WSNs 25

Homing Geographic forwarding allows attacker to figure out where important nodes are. Encrypting headers as well as content might alleviate this issue. Wireless Sensor Networks: Security in WSNs 26

Misdirection Diverting traffic away from intended destination targets the sender Misdirecting many flows in one direction targets an arbitrary victim (receiver) Defense Egress Filtering Verification of source addresses Legitimately generated from below? Wireless Sensor Networks: Security in WSNs 27

Transport Layer DoS Flooding Client puzzles Make the adversary commit resources Only useful if the adversary has limited resources Desynchronization Authentication Wireless Sensor Networks: Security in WSNs 28

Outline WSN Security overview Denial of service attacks Network Security Services Wireless Sensor Networks: Security in WSNs 29

Network Security Services So far, we ve explored low-level security primitives for securing sensor networks. Now, we consider high-level security mechanisms. secure group management intrusion detection secure data aggregation Wireless Sensor Networks: Security in WSNs 30

Secure Group Management Protocols for group management are required to securely admit new group members support secure group communication The outcome of the group computation is normally transmitted to a base station, therefore the output must be authenticated to ensure it comes from a valid group. Any solution must also be efficient in terms of time and energy (or involve low computation and communication costs). precludes most classical group-management solutions Wireless Sensor Networks: Security in WSNs 31

Intrusion Detection In wired networks, traffic and computation are typically monitored and analyzed for anomalies at various concentration points. expensive in terms of the network s memory and energy consumption hurts bandwidth constraints Wireless sensor networks require a solution that is fully distributed and inexpensive in terms of communication, energy, and memory requirements. In order to look for anomalies, applications and typical threat models must be understood. It is particularly important for researchers and practitioners to understand how cooperating adversaries might attack the system. The use of secure groups may be a promising approach for decentralized intrusion detection. Wireless Sensor Networks: Security in WSNs 32

Secure Data Aggregation One benefit of a wireless sensor network is the fine-grain sensing that large and dense sets of nodes can provide. The sensed values must be aggregated to avoid overwhelming amounts of traffic back to the base station. Depending on the architecture of the network, aggregation may take place in many places. All aggregation locations must be secured. If the application tolerates approximate answers, powerful techniques are available. randomly sampling a small fraction of nodes and checking that they have behaved properly supports detection of many different types of attacks Wireless Sensor Networks: Security in WSNs 33

Conclusion Constraints and open environments of wireless sensor networks make security for these systems challenging. Several properties of sensor networks may provide solutions. Architect security into these systems from the outset (they are still in their early design stages) Exploit redundancy, scale, and the physical characteristics of the environment in the solutions Build sensor networks so that they can detect and work around some fraction of their nodes which are compromised Wireless Sensor Networks: Security in WSNs 34

Reading List A. Perrig, J. Stankovic, and D. Wagner, Security in Wireless Sensor Networks, CACM, Vol. 47, No. 6, June 2004. Anthony Wood, John A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, 35(10):54-62, October 2002. C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Sensor Network Protocols and Applications, 2003. Wireless Sensor Networks: Security in WSNs 35