15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

Similar documents
Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

SPINS: Security Protocols for Sensor Networks

Security Sensor Network. Biswajit panja

Introduction to Wireless Sensor Network Security

Wireless Network Security Spring 2014

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

CSC 774 Advanced Network Security. Outline. Related Work

Secure Routing in Wireless Sensor Networks

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

About the Authors Preface Acknowledgements List of Acronyms

Security Solutions for Wireless Sensor Networks

Protocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig

Fundamentals of Mobile and Pervasive Computing

Security & Trust in Wireless Sensor Networks

Outline. Application examples. Infrastructure-based limits? Infrastructure-based wireless networks. Possible applications

Demystifying Wireless for Real-World Measurement Applications

Foundation University, Islamabad, Pakistan

A Transport Protocol for Multimedia Wireless Sensor Networks

Security for Ad Hoc Networks. Hang Zhao

INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware

Wireless Sensor Network: Challenges, Issues and Research

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

WSN Security. Sensor node. Javier Lopez. Computer Science Department University of Malaga Spain FOSAD'09

Mac Protocols for Wireless Sensor Networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Vehicular On-board Security: EVITA Project

How To Write A Transport Layer Protocol For Wireless Networks

Data Management in Sensor Networks

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Security in wireless sensor networks

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

Securing MANET Using Diffie Hellman Digital Signature Scheme

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April ISSN

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

The Internet of Things: Opportunities & Challenges

Some Security Trends over Wireless Sensor Networks

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

Propsim enabled Mobile Ad-hoc Network Testing

Denial of Service in Sensor Networks

Problems of Security in Ad Hoc Sensor Network

Recent Topics in Computer Networking Wireless Sensor Networks Introduction and Applications

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Wireless Sensor Networks Chapter 3: Network architecture

White Paper. Requirements of Network Virtualization

LIST OF FIGURES. Figure No. Caption Page No.

Chapter 1: Introduction

Using BroadSAFE TM Technology 07/18/05

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

An experimental test bed for the evaluation of the hidden terminal problems on the IEEE standard

6LoWPAN Technical Overview

Drahtlose Kommunikation. Sensornetze

EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks

Tema 5.- Seguridad. Problemas Soluciones

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Bit Chat: A Peer-to-Peer Instant Messenger

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

IoT Security Platform

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Security in Ad Hoc Network

Definition. A Historical Example

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Energy Optimal Routing Protocol for a Wireless Data Network

Internet of Things 2015/2016

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Efficient Data Transmission For Wireless Sensor Networks

Secured Communication in Wireless Sensor Networks

Thingsquare Technology

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

An Overview of ZigBee Networks

A Security Architecture for. Wireless Sensor Networks Environmental

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Exploring Semantic Interference in Heterogeneous Sensor Networks

A STUDY OF SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS

Mobile and Sensor Systems

STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Enabling Security in the Transmission Power Grid using Wireless Sensor Networks

Portable Wireless Mesh Networks: Competitive Differentiation

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

Implementing Software on Resource- Constrained Mobile Sensors Experience with Impala and ZebraNet

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

WIND RIVER SECURE ANDROID CAPABILITY

Dynamic Source Routing in Ad Hoc Wireless Networks

Transcription:

15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

Overview 2

Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration of computers into the world at large PCs will disappear, become invisible, and will be replaced by intelligent things. Many computers per person > Sensors and actuators as key technology Advancements in Micro-Electro-Mechanical System (MEMS) technology allows integration of sensors, transmission units, and CMOS building blocks on a chip. Current size is determined by battery size, but is expected to be in the cm and mm range within a few years. 3

Sensor Node Architecture Location Finding Unit Sensor Analog Digital Converter Processor Storage Mobilizer Transceiver Application dependent components Power Unit Power Generator 4

Sensor Hardware ESB ESB tmote BTnode micaz Flash memory (kb) 60 48 128 128 RAM (kb) 1 4 4 10 Supported operating systems TinyOS Contiki TinyOS Contiki TinyOS TinyOS Sleep (mw) 0.023 0.015 9.9 0.048 CPU on, Radio off 28.1 5.4 39.6 36 CPU on, Radio listen 52.8 65.4 82.5 95.1 CPU on, Radio rx/tx 57.2 58.5 102.3 88.2 5

Sensing Parameters > Pressure > Humidity > Temperature > Light > Chemicals > Strain and tilt > Speed and acceleration > Magnetic fields > Vibrations > Motion > Metal detection > Sound > 6

Definition: Sensor Network > A sensor network is a deployment of massive numbers of small, inexpensive, self-powered devices that can sense, compute, and communicate with other devices for the purpose of gathering local information to make global decisions about a physical environment. > Source: SmartDust program sponsored by DARPA 7

Wireless Sensor Network (WSN) Structure user fixed network sink sensor nodes > Sink is a (mobile) gateway between fixed and wireless sensor network controls and manages (mobile) sensor nodes on behalf of a user > Sensor data from sensor nodes to sink by multi-hop communication and data aggregation > Broadcast / multicast communication from sink to sensors 8

Requirements > Long network lifetime > Low costs > Wide area availability > Fault tolerance > Scalability > Security > Quality-of-Service (delay and data throughput) > Programmability and maintainability from: Talzi et al.: PermaSense: Investigating Permafrost with a WSN in the Swiss Alps, 4th Workshop on Embedded Networked Sensors, Cork, 25-26 June 07 9

Challenges > Finite energy resources energy-efficient operation > Limited processing, communication, and storage capabilities in-network processing > High degree of uncertainty redundancy > Importance of time and location of events synchronization and localization > Untethered/unattended operation of sensors and dynamic structures due to sleep cycles node failures, unreliable nodes energy depletion varying workload, e.g. by simultaneous related events mobility of sensors, targets, and observers changing environmental conditions self-configuration capabilities 10

Energy Issues > Energy is the main concern in wireless sensor networks. > Energy sources: batteries, fuel cells, scavenging > Battery-driven sensors can not be recharged and become useless after depletion. > Communication Tradeoff between processing and communication: Transmission of 1 bit costs same energy as 100-1000 instructions. 1 nj per instruction / sample Bluetooth: 100 nj per bit for a distance of 10 100 m Transmission and reception costs are nearly the same. Overhearing is relatively expensive. 11

Applications > Military and security applications > Disaster detection / recovery and emergency response > Supply chain management and asset tracking > Industrial, environmental and agricultural monitoring > Habitat and building monitoring / surveillance > Animal tracking > Education > Medical applications: medical monitoring and micro-surgery > Traffic and vehicle control, telematics > Location and context-sensitive computing > Home automation and consumer electronics 12

Protocol Stack > Layers Application: application software Transport: maintain data flow, reliability and congestion control Network: routing and topology control MAC: fixed and random channel allocation, power awareness, collision avoidance Physical: robust modulation, transmission, and reception techniques > Management Planes Power: management of power usage by a node Mobility: detection / registration of sensor movements and neighbors Task: balancing and scheduling of sensing tasks in a region Application layer Transport layer Network layer Data link layer Physical layer Power Management Plane Mobility Management Plane Task Management Plane 13

WSN Management and Middleware > Dynamic structures require dynamic (re)configuration of sensor nodes > Dynamic configuration and code download / installation Traditional network management approaches Database Model: sensor network = distributed data base Active Sensor Model (abstraction of run-time environment by virtual machines or script interpreters to support heterogeneous platforms and code efficiency) Active networks and mobile agents 14

WSN Management with Wireless Mesh Networks 15

Security and Privacy > Threats to sensor nodes Passive information gathering Traffic analysis Capturing and compromising of nodes, e.g., disclosure of cryptographic information False or malfunctioning nodes, e.g., generation of false data or block routing, and node outage Message corruption Denial of service attacks, e.g., jamming or resource exhaustion, can happen on all layers of the communication system. > Privacy Issues Sensor information (about humans) should not be accessible by everyone. > Challenge Established security mechanisms require significant computing and communication resources 16

Sensor Networks: Network Security Security Related Properties in WSNs > Limited memory and computing power limited set of security protocols Asymmetric encryption is usually not feasible, because of large variables (> 1000 bits) for cryptographic algorithms Energy consumption for 1024 bits on a MC68328 processor: 0.104 mj (AES) vs. 42 mj (RSA) Asymmetric digital signatures for authentication cause high overhead (~ 50 1000 bytes per packet) > Large number of nodes scalability > Hostile environment difficult physical protection > In-network processing use of end-to-end security mechanisms and protocols is prohibited > Application-specific software and hardware architectures adaptation of security mechanisms to application needs WS 2006/07 17

Sensor Networks: Network Security Cell-based Wireless Sensor Networks > Base station (sink) with more resources and running more sophisticated protocols / algorithms > Base station represents a trust base that can not be compromised easily. safe bootstrapping and configuration > Access control in base stations to control access by external users. > Nodes can still be compromised or malicious nodes can be added. > Example: SPINS (Security Protocols for Sensor Networks) protocol suite Sensor Network Encryption Protocol (SNEP) for secure unicast communication between base stations and sensor nodes avoids use of initialization vectors by counters and counter synchronization protocol μtesla for authenticated data broadcast Basic idea: delayed disclosure of symmetric keys for (delayed) authentication Operation Packet transmission: Base station broadcasts message with a MAC using symmetric key that is secret at this point of time. Packet reception: Receiver detects that authentication key has not yet been disclosed and can not verify the message authentication. Key disclosure: Base station broadcasts verification key to all receivers, which can then authenticate stored packets. WS 2006/07 18

Sensor Networks: Network Security μtesla > Sender chooses key K n and applies public one-way function F to all other keys: K i = F(K i+1 ) > Division of time into intervals and usage of a single authentication key during a time interval. > Broadcasts of disclosed keys are redundant: A receiver lacking keys K 0 and K 1 reconstructs these after receiving K 2. > Receiver Bootstrapping Receiver needs to have 1 authentic K i from the chain to authenticate K i +1 by verifying K i = F(K i +1). Subsequent keys are self-authenticating! > Key disclosure delay δ is in the order of some time intervals. K 0 K 1 K 2 K 3 K 4 P1 P2 P3 P4 P5 P6 P7 K 0 Interval 0 1 2 3 4 K 1 K 2 WS 2006/07 19

Sensor Networks: Network Security Ad Hoc Sensor Networks > Symmetric keys are preferred over asymmetric keys. > Lack of trusted base station for key management > Algorithms for ad hoc sensor networks are typically based on predeployment of keys, because key servers are physically exposed. > Extreme options One key for the whole sensor network compromised node can decrypt all messages. One key for each pair of nodes scalability concerns Approach: (random) key pre-distribution WS 2006/07 20

Sensor Networks: Network Security Key Pre-Distribution and Shared Key Discovery > Key pre-distribution Before deployment: generation of a pool of P keys. k (<< P) keys are selected for each node key ring If a node gets compromised, the probability for decrypting a message is k/p. > Shared key discovery Two nodes intending to communicate with each other exchange information (key identifiers) about available keys. If they find a common key, they can use it for direct communication. Result of this phase: topology of connected nodes If two nodes do not share a common key path-key establishment WS 2006/07 21

Sensor Networks: Network Security Path-Key Establishment > Nodes that do not share a common key, can establish a key via a secured path, possibly using keys that have not yet been assigned. > Problem: intermediate nodes know key and attacker can get the knowledge too by subverting a single node > Approach: Multi-path Key Establishment, k = k 1 k 2 k n > Problem: finding disjoint paths WS 2006/07 22

Conclusions and Outlook > Manifold opportunities with wireless sensor networks > Deployment is slowly emerging. > Technology needs to make further progress. > Many research challenges remain, see also www.mics.ch (Swiss National Competence Centre in Research on Mobile Information and Communication Systems) 23

Sensor Access via Internet Wireless sensor networks Authentication server Redirect Sensor portal Users Resource access Internet Attribute exchange 24