Introduction to Wireless Sensor Network Security

Similar documents
DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Secure Routing in Wireless Sensor Networks

Wireless Sensor Networks Chapter 14: Security in WSNs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

A Security Architecture for. Wireless Sensor Networks Environmental

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Cyber-Physical Security for Wireless Sensor Networks

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Hello Flood Attack and its Countermeasures in Wireless Sensor Networks

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

How To Write A Transport Layer Protocol For Wireless Networks

Denial of Service in Sensor Networks

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Wireless Sensor Networks: Security, Attacks and Challenges

Secure Neighbor Discovery in Wireless Sensor Networks

Keywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Wireless Sensor Network: Challenges, Issues and Research

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

SECURITY VULNERABILITY ISSUES IN WIRELESS

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

International Journal of Advanced Research in Computer Science and Software Engineering

Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Security & Trust in Wireless Sensor Networks

Security Analysis of Routing Protocols in Wireless Sensor Networks

Data Management in Sensor Networks

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

WIRELESS SENSOR NETWORK SECURITY ANALYSIS

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

(I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Intrusion Detection for Mobile Ad Hoc Networks

Attacks on neighbor discovery

Security Issues in Mobile Ad Hoc Networks - A Survey

CHAPTER 1 INTRODUCTION

Secure Software Programming and Vulnerability Analysis

Security Solutions for Wireless Sensor Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

ANALYSIS OF WIRELESS SENSOR NETWORKS: SECURITY, ATTACKS AND CHALLENGES

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures

Security vulnerabilities in the Internet and possible solutions

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

Secure Data Aggregation in Wireless Sensor Networks

Security Vulnerabilities In Wireless Sensor Networks: A Survey

Evaluation of Security Mechanisms for Information Dissemination. in Wireless Sensor Networks

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

CERIAS Tech Report

A Survey on Wireless Sensor Network Security

WIRELESS SENSOR NETWORKS ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES

A Survey of Security Issues In Wireless Sensor Networks

Tema 5.- Seguridad. Problemas Soluciones

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Enhancing Base Station Security in Wireless Sensor Networks

Online Network Traffic Security Inspection Using MMT Tool

}w!"#$%&'()+,-./012345<ya

Current and Future Research into Network Security Prof. Madjid Merabti

Security for Ad Hoc Networks. Hang Zhao

An Enhanced Hierarchical Energy Efficient Intrusion Detection System for Malicious Packet Dropping Attacks in Wireless Sensor Networks

The Network and Security Analysis for Wireless Sensor Network : A Survey

Security Models for Wireless Sensor Networks

International Journal of Advanced Research in Computer Science and Software Engineering

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

A Short Survey on Secure Routing Protocols in Hierarchical Cluster- Based Wireless Sensor Networks

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Prediction of DDoS Attack Scheme

Security Issues and Sybil Attack in Wireless Sensor Networks

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Analysis of Typical Secure Routing Protocols in WSN

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

SPINS: Security Protocols for Sensor Networks

Security Issues with Integrated Smart Buildings

Security in Ad Hoc Network

Protecting Mobile Devices From TCP Flooding Attacks

UNMASK: Utilizing Neighbor Monitoring for Attack Mitigation in Multihop Wireless Sensor Networks

Foundation University, Islamabad, Pakistan

Link Layer and Network Layer Security for Wireless Networks

WSN Security. Sensor node. Javier Lopez. Computer Science Department University of Malaga Spain FOSAD'09

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik

Security Issues in Wireless Sensor Networks

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Complete Protection against Evolving DDoS Threats

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Security Requirements for Wireless Networks and their Satisfaction in IEEE b and Bluetooth

Chapter 6 Intrusion Detection in Wireless Sensor Networks

A STUDY OF SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Transcription:

Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering BRAC University, Bangladesh

Wireless Sensor Network Wireless networks consisting of a large number of motes Self-organizing Highly integrated with changing environment and network Highly constrained resources processing, storage, bandwidth, power Facilitate large scale deployment Health care monitoring Surveillance Traffic monitoring Military applications WSN!! 2

MICA2 Mote ATmega128L 8-bit processor at 8 MHz 128KB program memory (flash) 512KB additional data flash memory 433, 868/916, or 310 MHz multi-channel radio transceiver 38.4 kbps radio, 500-1000 feet outdoor range (depending on versions) with a size of only 58 x 32 x 7 (mm) Usually it is run by TinyOS operating system and powered by 2 AA sized batteries 3

An Application 4

WSN Security Angles Viewing Angle 1 (a) Key Management (b) Secure Routing (c) Secure Services (d) Intrusion Detection Systems (IDS) [outsider, insider] Viewing Angle 2 (a) Physical security (b) Deployment security (sparse or dense, etc.) (c) Topological security (cluster/flat, hierarchy/tree, etc.) (d) Wireless communication security (e) Data security 5

WSN Security Angles Viewing Angle 3: Holistic Security (a) Application layer security (b) Transport layer security (c) Network layer security (d) Data link layer security (e) Physical layer security Holistic Security? Still open research issue! 6

DoS and DoS Attack Any kind of attempt of an adversary to disrupt, subvert, or destroy the network is a Denial of Service (DoS) attack In reality, any kind of incident that diminishes, eliminates, or hinders the normal activities of the network can cause a DoS situation Some examples include Hardware failures Software bugs Resource exhaustion Environmental conditions, or any type of complicated interaction of these factors 7

DoS and DoS Attack DoS (Denial of Service) is basically a given formal name of a particular condition of the network but when it occurs as a result of an intentional attempt of an adversary, it is called DoS attack In general, Denial of Service (DoS) is an umbrella term that can indicate many kinds of events in the network in which legitimate nodes are deprived of getting the expected services (intentional attempts or unintentional incidents) 8

DoS Attack Categories DoS attacks can mainly be categorized into three types: (1) Consumption of scarce, limited, or non-renewable resources (2) Destruction or alteration of configuration information (3) Physical destruction or alteration of network resources 9

Attacks Against Routing Attacks on Information in Transit Selective Forwarding Blachole/Sinkhole Attack Sybil Attack Wormhole Attack HELLO Flood Attack Acknowledgement Spoofing 10

Information in Transit Routing information can be spoofed, altered during transmission or replayed Thus adversaries might be able to create routing loops attract or repel network traffic extend or shorten source routes generate false error messages partition the network increase end-to-end latency 11

Information Spoofing Base Station/Sink B Spoofed Packet Attacker 12

Selective Forwarding Base Station/Sink B Packets Forwarded Selectively Attacker Harder to detect because selectively the packets are forwarded 13

Countermeasures? Intrusion Detection System or IDS Could be installed in the Base Station or Distributed IDS installed in each sensor node 14

Blackhole/Sinkhole Attack Flooding Based Protocols are vulnerable Malicious node inserts itself between the communicating nodes 15

Countermeasures? Reward based system Intrusion Detection Systems (IDS) for Sensor Networks This attack might enable other attacks like selective forwarding; hence, IDS could be the solution 16

Sybil Attack A Node pretends to be more than one node at the same time Mostly affects geographical routing protocol 17

Countermeasures? Difficult to deal with Not many works are available or efficient mechanisms yet to be developed Radio resource testing Random key pre-distribution Others mechanisms like combinations of various schemes 18

Wormhole Attack Wormhole attack is a critical attack in which the attacker records the packets (or bits) at one location in the network and tunnels those to another location 19

Countermeasures? Significant threat to Wireless Sensor Network It could be launched even in the neighbor discovery phase 20

Hello Flood Attack HELLO packets are used for this attack By sending the HELLO packet the adversary tries to be considered as the neighbor of a particular node With incoming packets attacker can do anything Laptop-class attacker Node-class attacker 21

Countermeasures? Bidirectional verification Multipath, multi-base routing 22

Acknowledgement Spoofing Some routing protocols use link layer acknowledgments Attacker may spoof acknowledgements This sort of attack convinces that weak link is strong or that dead node is alive Consequently weak link may be selected for routing; packets sent through that link may be lost or corrupted Countermeasures? Link layer security architecture Key Management mechanisms numerous!!! 23

Approaches to Solutions Efficient key management schemes could provide proper authentication of nodes in the network Security for all the layers should be ensured however, this is an open research issue If sensed data could at least be sent to the base station using node-to-node authentication, it could deal with the rest Physical attacks cannot be prohibited without proper guarding mechanisms 24

Approaches to Solutions Critical Parameters in our Research are Computation Resource Utilization Storage Utilization Energy Utilization Level of Security??!! However there should be a trade-off among these parameters depending on the requirements and situation at hand 25

Approaches to Solutions A single mechanism cannot ensure security for all the levels Hence, there should be some sorts of co-operations among the various security measures applied to the sensors in a WSN 26

Our Approach (Cont.) Working areas I dealt with Storage-Efficient Security Schemes Key Management Schemes Increasing the level of security especially for military networks Preventing Homing type DoS attacks using Key Management Schemes As in Military Networks, security is the Major issue we could consider a slight increase of the usage of the resources in the sensors 27

THANK YOU 28

Questions and Answers spathan@ieee.org, spathan@bracu.ac.bd??? 29