SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Edith Cowan University
Security Research Institute




         Security in Wireless Sensor Networks

       Security in Wireless(1) Sensor(2)
        Networks(3) - Two Out of Three
                   Ain't Bad?
                                                                                              Mike Johnstone
                                                                                     m.johnstone@ecu.edu.au

              Copyright 2013 - Security Research Institute, Edith Cowan University                      1
Edith Cowan University
Security Research Institute




                                                                                     Agenda
  •     The Scope of Wireless Sensor Networks
  •     What are Wireless Sensors?
  •     An example WSN technology
  •     Case Studies
  •     Security issues with WSN devices


              Copyright 2013 - Security Research Institute, Edith Cowan University       2
Edith Cowan University
Security Research Institute



                                                             The Internet of things…
                                                                                     (Cisco, 2011)




              Copyright 2013 - Security Research Institute, Edith Cowan University          3
Edith Cowan University
Security Research Institute



                                                                                     The Internet of things…
                                                                                                   (Cisco, 2011)




              Copyright 2013 - Security Research Institute, Edith Cowan University                        4
Edith Cowan University
Security Research Institute




                                                    Wireless Sensor Networks
  • Cheap and robust
  • A multitude of uses, including:
          – Home automation, tagging goods, weather
            reporting
          – Home monitoring of individuals in aged care
            environments
          – Automated meter reading for public/private
            utilities
              Copyright 2013 - Security Research Institute, Edith Cowan University   5
Edith Cowan University
Security Research Institute




                         What exactly is a Wireless Sensor?
  • Each node has:
          – A microprocessor
          – Some memory
          – One or more sensors (audio, video…)
          – Some way to communicate wirelessly with other
            nodes


              Copyright 2013 - Security Research Institute, Edith Cowan University   6
Edith Cowan University
Security Research Institute


                                                                        Wireless Sensor Node
                                                                                     (CC2431 on Battery Board)




              Copyright 2013 - Security Research Institute, Edith Cowan University                       7
Edith Cowan University
Security Research Institute


                                                                        Wireless Sensor Node
                                                                                                (Waspmote)


                                                                 Weight: 20g
                                                                 Power consumption: 15mA on, 55 A sleep
                                                                 Built-in: temp sensor and accelerometer
                                                                 Wireless protocols supported: 8
                                                                 Sensors available: 60




              Copyright 2013 - Security Research Institute, Edith Cowan University                    8
Edith Cowan University
Security Research Institute




                                                                            Manufactured by…
  •     Atmel
  •     Libelium
  •     Samsung
  •     Texas Instruments
  •     …


              Copyright 2013 - Security Research Institute, Edith Cowan University       9
Edith Cowan University
Security Research Institute




                                                    A Spectrum of Capabilities
                                                    Wireless Standards


                                                                                                 802.11b
                     Complexity




                                                                                     BlueTooth




                                                          ZigBee




                                                                   Data Rate


              Copyright 2013 - Security Research Institute, Edith Cowan University                         10
Edith Cowan University
Security Research Institute




                                                                                     Mesh Networks




              Copyright 2013 - Security Research Institute, Edith Cowan University             11
Edith Cowan University
Security Research Institute




                                               Low Power WSN Standards
  •     ZigBee
  •     Z-Wave
  •     WirelessHART
  •     6LoWPAN
  •     …


              Copyright 2013 - Security Research Institute, Edith Cowan University   12
Edith Cowan University
Security Research Institute




                                                                                     6LoWPAN
  • Problem: WSN protocols and the Internet are
    incompatible
  • Solution: 6LoWPAN
  • Lets any device be accessible from the
    Internet



              Copyright 2013 - Security Research Institute, Edith Cowan University       13
Edith Cowan University
Security Research Institute




                                                                                     Leading to…




              Copyright 2013 - Security Research Institute, Edith Cowan University          14
Edith Cowan University
Security Research Institute




                          ZigBee-An example WSN standard
  • Developed by the ZigBee Alliance
  • Main characteristics
          – low data rates
          – low power consumption
          – security
          – reliability


              Copyright 2013 - Security Research Institute, Edith Cowan University   15
Edith Cowan University
Security Research Institute




                                                                                     ZigBee
  • Specific characteristics
          – Operates on the 2.4 GHz ISM
            (industrial, scientific and medical) band
          – 16 channels available
          – Range 10-75m
          – Uses strong encryption


              Copyright 2013 - Security Research Institute, Edith Cowan University      16
Edith Cowan University
Security Research Institute




     ZigBee-aware devices can be used for…
  • Home Automation
          – Air conditioning
          – Irrigation Systems
          – Lighting Control Systems
          – Meter Reading Systems
          – Security Systems
          – Universal Remote Control

              Copyright 2013 - Security Research Institute, Edith Cowan University   17
Edith Cowan University
Security Research Institute




                                       To connect devices like this to a HAN




              Copyright 2013 - Security Research Institute, Edith Cowan University   18
Edith Cowan University
Security Research Institute




                                                                      Example: Smart Grid




              Copyright 2013 - Security Research Institute, Edith Cowan University    19
Edith Cowan University
Security Research Institute




                                                               Further uses of ZigBee
  • Industrial Automation
          – Asset Management
          – Livestock Tracking
          – Personnel Tracking
  • Other Applications
          – Fire Extinguishers
          – Gas (air quality, forest fire) Sensors
          – Room Access
              Copyright 2013 - Security Research Institute, Edith Cowan University   20
Edith Cowan University
Security Research Institute




                                                                 WSNs-Security issues
  • Confidentiality
          – Key distribution
          – Key transmission
  • Integrity
          – False nodes joining the network
  • Availability
          – Susceptibility to denial-of-service attacks
              Copyright 2013 - Security Research Institute, Edith Cowan University   21
Edith Cowan University
Security Research Institute




              Case Studies: Valuable uses of WSNs
  • Vehicle tracking
          – Your car knows when the speed limit changes
  • Heath care
          – If someone is in trouble, an alert can be raised
  • Environmental monitoring
          – Track progress of chemical spills
  • Battlefield intelligence
              Copyright 2013 - Security Research Institute, Edith Cowan University   22
Edith Cowan University
Security Research Institute




                     WSNs-Current research at ECU-SRI
  • Mitigation of denial of service attacks
  • Advances in key distribution
  • Using multi-agent systems to improve
    decision-making




              Copyright 2013 - Security Research Institute, Edith Cowan University   23
Edith Cowan University
Security Research Institute




                                                                                     Questions?




              Copyright 2013 - Security Research Institute, Edith Cowan University          24

Weitere ähnliche Inhalte

Andere mochten auch

NCTA 5 min presentation (2) PP show
NCTA 5 min presentation (2) PP showNCTA 5 min presentation (2) PP show
NCTA 5 min presentation (2) PP showSimon Hanney
 
Data of the australian ICT market - Australia ict industry 2015
Data of the australian ICT market - Australia ict industry 2015Data of the australian ICT market - Australia ict industry 2015
Data of the australian ICT market - Australia ict industry 2015Elioplus .com
 
Эвристическая оценка, или как решить проблемы в интерфейсе за час
Эвристическая оценка, или как решить проблемы в интерфейсе за часЭвристическая оценка, или как решить проблемы в интерфейсе за час
Эвристическая оценка, или как решить проблемы в интерфейсе за часПрофсоUX
 
Как и когда использовать айтрекер на юзабилити тестировании
Как и когда использовать айтрекер на юзабилити тестированииКак и когда использовать айтрекер на юзабилити тестировании
Как и когда использовать айтрекер на юзабилити тестированииПрофсоUX
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Управление Рисками в бизнес-анализе
Управление Рисками в бизнес-анализеУправление Рисками в бизнес-анализе
Управление Рисками в бизнес-анализеSQALab
 
To requirements and beyond...
To requirements and beyond...To requirements and beyond...
To requirements and beyond...SQALab
 

Andere mochten auch (8)

NCTA 5 min presentation (2) PP show
NCTA 5 min presentation (2) PP showNCTA 5 min presentation (2) PP show
NCTA 5 min presentation (2) PP show
 
Data of the australian ICT market - Australia ict industry 2015
Data of the australian ICT market - Australia ict industry 2015Data of the australian ICT market - Australia ict industry 2015
Data of the australian ICT market - Australia ict industry 2015
 
Эвристическая оценка, или как решить проблемы в интерфейсе за час
Эвристическая оценка, или как решить проблемы в интерфейсе за часЭвристическая оценка, или как решить проблемы в интерфейсе за час
Эвристическая оценка, или как решить проблемы в интерфейсе за час
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Как и когда использовать айтрекер на юзабилити тестировании
Как и когда использовать айтрекер на юзабилити тестированииКак и когда использовать айтрекер на юзабилити тестировании
Как и когда использовать айтрекер на юзабилити тестировании
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Управление Рисками в бизнес-анализе
Управление Рисками в бизнес-анализеУправление Рисками в бизнес-анализе
Управление Рисками в бизнес-анализе
 
To requirements and beyond...
To requirements and beyond...To requirements and beyond...
To requirements and beyond...
 

Kürzlich hochgeladen

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Kürzlich hochgeladen (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Security in Wireless(1) Sensor(2) Networks(3) - Two out of three ain't bad?

  • 1. Edith Cowan University Security Research Institute Security in Wireless Sensor Networks Security in Wireless(1) Sensor(2) Networks(3) - Two Out of Three Ain't Bad? Mike Johnstone m.johnstone@ecu.edu.au Copyright 2013 - Security Research Institute, Edith Cowan University 1
  • 2. Edith Cowan University Security Research Institute Agenda • The Scope of Wireless Sensor Networks • What are Wireless Sensors? • An example WSN technology • Case Studies • Security issues with WSN devices Copyright 2013 - Security Research Institute, Edith Cowan University 2
  • 3. Edith Cowan University Security Research Institute The Internet of things… (Cisco, 2011) Copyright 2013 - Security Research Institute, Edith Cowan University 3
  • 4. Edith Cowan University Security Research Institute The Internet of things… (Cisco, 2011) Copyright 2013 - Security Research Institute, Edith Cowan University 4
  • 5. Edith Cowan University Security Research Institute Wireless Sensor Networks • Cheap and robust • A multitude of uses, including: – Home automation, tagging goods, weather reporting – Home monitoring of individuals in aged care environments – Automated meter reading for public/private utilities Copyright 2013 - Security Research Institute, Edith Cowan University 5
  • 6. Edith Cowan University Security Research Institute What exactly is a Wireless Sensor? • Each node has: – A microprocessor – Some memory – One or more sensors (audio, video…) – Some way to communicate wirelessly with other nodes Copyright 2013 - Security Research Institute, Edith Cowan University 6
  • 7. Edith Cowan University Security Research Institute Wireless Sensor Node (CC2431 on Battery Board) Copyright 2013 - Security Research Institute, Edith Cowan University 7
  • 8. Edith Cowan University Security Research Institute Wireless Sensor Node (Waspmote) Weight: 20g Power consumption: 15mA on, 55 A sleep Built-in: temp sensor and accelerometer Wireless protocols supported: 8 Sensors available: 60 Copyright 2013 - Security Research Institute, Edith Cowan University 8
  • 9. Edith Cowan University Security Research Institute Manufactured by… • Atmel • Libelium • Samsung • Texas Instruments • … Copyright 2013 - Security Research Institute, Edith Cowan University 9
  • 10. Edith Cowan University Security Research Institute A Spectrum of Capabilities Wireless Standards 802.11b Complexity BlueTooth ZigBee Data Rate Copyright 2013 - Security Research Institute, Edith Cowan University 10
  • 11. Edith Cowan University Security Research Institute Mesh Networks Copyright 2013 - Security Research Institute, Edith Cowan University 11
  • 12. Edith Cowan University Security Research Institute Low Power WSN Standards • ZigBee • Z-Wave • WirelessHART • 6LoWPAN • … Copyright 2013 - Security Research Institute, Edith Cowan University 12
  • 13. Edith Cowan University Security Research Institute 6LoWPAN • Problem: WSN protocols and the Internet are incompatible • Solution: 6LoWPAN • Lets any device be accessible from the Internet Copyright 2013 - Security Research Institute, Edith Cowan University 13
  • 14. Edith Cowan University Security Research Institute Leading to… Copyright 2013 - Security Research Institute, Edith Cowan University 14
  • 15. Edith Cowan University Security Research Institute ZigBee-An example WSN standard • Developed by the ZigBee Alliance • Main characteristics – low data rates – low power consumption – security – reliability Copyright 2013 - Security Research Institute, Edith Cowan University 15
  • 16. Edith Cowan University Security Research Institute ZigBee • Specific characteristics – Operates on the 2.4 GHz ISM (industrial, scientific and medical) band – 16 channels available – Range 10-75m – Uses strong encryption Copyright 2013 - Security Research Institute, Edith Cowan University 16
  • 17. Edith Cowan University Security Research Institute ZigBee-aware devices can be used for… • Home Automation – Air conditioning – Irrigation Systems – Lighting Control Systems – Meter Reading Systems – Security Systems – Universal Remote Control Copyright 2013 - Security Research Institute, Edith Cowan University 17
  • 18. Edith Cowan University Security Research Institute To connect devices like this to a HAN Copyright 2013 - Security Research Institute, Edith Cowan University 18
  • 19. Edith Cowan University Security Research Institute Example: Smart Grid Copyright 2013 - Security Research Institute, Edith Cowan University 19
  • 20. Edith Cowan University Security Research Institute Further uses of ZigBee • Industrial Automation – Asset Management – Livestock Tracking – Personnel Tracking • Other Applications – Fire Extinguishers – Gas (air quality, forest fire) Sensors – Room Access Copyright 2013 - Security Research Institute, Edith Cowan University 20
  • 21. Edith Cowan University Security Research Institute WSNs-Security issues • Confidentiality – Key distribution – Key transmission • Integrity – False nodes joining the network • Availability – Susceptibility to denial-of-service attacks Copyright 2013 - Security Research Institute, Edith Cowan University 21
  • 22. Edith Cowan University Security Research Institute Case Studies: Valuable uses of WSNs • Vehicle tracking – Your car knows when the speed limit changes • Heath care – If someone is in trouble, an alert can be raised • Environmental monitoring – Track progress of chemical spills • Battlefield intelligence Copyright 2013 - Security Research Institute, Edith Cowan University 22
  • 23. Edith Cowan University Security Research Institute WSNs-Current research at ECU-SRI • Mitigation of denial of service attacks • Advances in key distribution • Using multi-agent systems to improve decision-making Copyright 2013 - Security Research Institute, Edith Cowan University 23
  • 24. Edith Cowan University Security Research Institute Questions? Copyright 2013 - Security Research Institute, Edith Cowan University 24