SlideShare a Scribd company logo
1 of 14
Based on a research paper by
  DI MA, UNIVERSITY OF MICHIGAN-DEARBORN
GENE TSUDIK, UNIVERSITY OF CALIFORNIA, IRVINE




                                 PRESENTED BY :
                                 IMRAN AHMED KHAN
                                 University of Texas
Wireless communication is playing an
increasingly important role in many
spheres of society. It has become an
essential means of communication. Recent
advances in technology have motivated
new application domains for wireless
networks. The purpose of this article is to
examine security and privacy issues in
some new and emerging types of wireless
networks, and attempt           to identify
directions for future research.
In this article we consider security and privacy
  issues in certain emerging wireless networks:

   Wireless sensor networks (WSN)
   Vehicular ad hoc networks (VANET)
Wireless networks are inherently more
    vulnerable than their wired counterparts.
    Notable factors contributing to security
    problems include the following:
   Channel - Wireless usually involve broadcast
    communication, which makes eavesdropping
    and jamming easier.
   Mobility - If a wireless device is affiliated with
    a person, tracking the device reveals that
    person's location. Thus privacy become a
    important concern.
   Resources – End host usually battery powered
    devices which limits computation, size of RAM
    and secondary storage. which open the door of
    denial of service attacks at battery depletion
   Accessibility- Some devices are generally left
    unattended and are places in remote locations.
    which increases more chances for physical
    attacks.
   The original motivation for WSN research
    stemmed from the vision of Smart Dust in the
    late 1990s
   It consists of large number of small cheap
    resource constraint sensors and a sink or base
    stations
   Easy to deploy
   Use in military , environmental, disaster relief
    and homeland security
   Constant presence of a sink
   Limited life span

To resolve above issues, two new WSN
  introduced:

   Unattended WSN ( UWSN )
   Radio frequency identification ( RFID )
Unattended WSNs operate without continuous
presence of (or supervision by) a sink. Instead,
sensor-collected data is harvested by an itinerant
sink that visits the network intermittently, with a
certain upper bound on the interval between
successive visits. Because sensors cannot
Communicate with the sink at will, they must
   accumulate data in situ and wait for the sink. The
unattended nature of the network might be promoted
by some design requirements to avoid any
central point of failure.
   Data Protection at individual sensor - The main
    challenge is to protect the data on individual
    sensor from the attacker. To attained this
    encryption is used. So that even if the attacker get
    control on the sensor, it cannot decrypt the data.
    this is attained by periodically updating secret
    keys through One way function ( hash functions )

   Data Survival - To acheive data survival sensor
    plays a hide & seek game by moving all of its data
    around the network. This is ultimately a losing
    game unless encryption is used.
   Secrecy - The attackers aims to learns sensors
    secrets in order to decrypt its data later. One of the
    proposed solution allow sensor to recover from the
    compromise by simultaneously providing and
    obtaining help to/from peer sensors.
   Authentication - Data obtain by each sensor is
    authenticated by the sink. So that it can identify
    that data is modified by any attacker or not. One of
    the proposed technique involves sensors to co-sign
    the data of their neighboring nodes. So that if any
    one of the co-signer is not compromised, sink can
    verify integrity and authenticity.
   Sensors are based on the batteries. If battery
    runs out , sensor will die.
   Rsensors and Rsink.
   Rsensors are also equipped with energy
    harvesting means:
     solar
     thermal
     vibrational

   Reduced size.
   Presence of Rsink is necessary.
   Cryptographic operations.
   RFID Reader Collision
   Since RFID systems make use of the
    electromagnetic spectrum They are relatively
    easy to jam using energy at the right frequency.
In this article we examine security and privacy issues in
some new and emerging wireless networks. In surveying
relevant literature, we tried to identify new security and
privacy challenges as well as inadequacies of current
approaches. Certain challenges arise from the unattended,
intermittently connected, and possibly mobile network
operation. Consequently, we need to anticipate threats
arising from malicious exploitation of such network
features and design appropriate security countermeasures.
Also, since some emerging wireless networks are ad hoc in
nature, infrastructure-independent security and privacy
techniques are particularly suitable. Finally, emerging
wireless devices such as RSensors motivate the
development of new cryptographic primitives and
protocols.

More Related Content

What's hot

Network security
Network securityNetwork security
Network securityEstiak Khan
 
FIREWALL
FIREWALL FIREWALL
FIREWALL Akash R
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeSMSumon8
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall美兰 曾
 
Network scanning
Network scanningNetwork scanning
Network scanningoceanofwebs
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesArshadRaja786
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 

What's hot (20)

Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Network security
Network securityNetwork security
Network security
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall
 
Network scanning
Network scanningNetwork scanning
Network scanning
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
ioT_SDN
ioT_SDN ioT_SDN
ioT_SDN
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning Techniques
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Honeypots
HoneypotsHoneypots
Honeypots
 

Viewers also liked

Innovation Presentation
Innovation PresentationInnovation Presentation
Innovation PresentationAshleyBryant
 
Безпілотники
БезпілотникиБезпілотники
БезпілотникиAnna98725
 
Chirok (teal) reconnaissance and strike drone, russia
Chirok (teal) reconnaissance and strike drone, russiaChirok (teal) reconnaissance and strike drone, russia
Chirok (teal) reconnaissance and strike drone, russiahindujudaic
 
[bone shaker] :: DIY health final
[bone shaker] :: DIY health final[bone shaker] :: DIY health final
[bone shaker] :: DIY health finalkimispencer
 
AMCM (Airborne Mine Counter Measures)
AMCM (Airborne Mine Counter Measures)AMCM (Airborne Mine Counter Measures)
AMCM (Airborne Mine Counter Measures)Glenn Mallo
 
USMC UAS Family of Systems (April 2015)
USMC UAS Family of Systems (April 2015)USMC UAS Family of Systems (April 2015)
USMC UAS Family of Systems (April 2015)Tom "Blad" Lindblad
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionwireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionJOLLUSUDARSHANREDDY
 
The Future Of Battlefield Ma Vs
The Future Of Battlefield Ma VsThe Future Of Battlefield Ma Vs
The Future Of Battlefield Ma Vsstephen40
 
UAV(unmanned aerial vehicle) and its application
UAV(unmanned aerial vehicle) and its application UAV(unmanned aerial vehicle) and its application
UAV(unmanned aerial vehicle) and its application Joy Karmakar
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Drones and their Increasing Number of Applications
Drones and their Increasing Number of ApplicationsDrones and their Increasing Number of Applications
Drones and their Increasing Number of ApplicationsJeffrey Funk
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Drone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial VehicleDrone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial Vehicleshivu1234
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 

Viewers also liked (19)

Innovation Presentation
Innovation PresentationInnovation Presentation
Innovation Presentation
 
Безпілотники
БезпілотникиБезпілотники
Безпілотники
 
Chirok (teal) reconnaissance and strike drone, russia
Chirok (teal) reconnaissance and strike drone, russiaChirok (teal) reconnaissance and strike drone, russia
Chirok (teal) reconnaissance and strike drone, russia
 
[bone shaker] :: DIY health final
[bone shaker] :: DIY health final[bone shaker] :: DIY health final
[bone shaker] :: DIY health final
 
Security in sensor network1
Security in sensor network1Security in sensor network1
Security in sensor network1
 
AMCM (Airborne Mine Counter Measures)
AMCM (Airborne Mine Counter Measures)AMCM (Airborne Mine Counter Measures)
AMCM (Airborne Mine Counter Measures)
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
USMC UAS Family of Systems (April 2015)
USMC UAS Family of Systems (April 2015)USMC UAS Family of Systems (April 2015)
USMC UAS Family of Systems (April 2015)
 
Security issues
Security issuesSecurity issues
Security issues
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Drones
DronesDrones
Drones
 
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionwireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
 
The Future Of Battlefield Ma Vs
The Future Of Battlefield Ma VsThe Future Of Battlefield Ma Vs
The Future Of Battlefield Ma Vs
 
UAV(unmanned aerial vehicle) and its application
UAV(unmanned aerial vehicle) and its application UAV(unmanned aerial vehicle) and its application
UAV(unmanned aerial vehicle) and its application
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Drones and their Increasing Number of Applications
Drones and their Increasing Number of ApplicationsDrones and their Increasing Number of Applications
Drones and their Increasing Number of Applications
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Drone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial VehicleDrone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial Vehicle
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 

Similar to Security and privacy in Wireless Sensor Networks

Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...iosrjce
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 

Similar to Security and privacy in Wireless Sensor Networks (20)

Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
G017644454
G017644454G017644454
G017644454
 
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Wsn
WsnWsn
Wsn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Security and privacy in Wireless Sensor Networks

  • 1. Based on a research paper by DI MA, UNIVERSITY OF MICHIGAN-DEARBORN GENE TSUDIK, UNIVERSITY OF CALIFORNIA, IRVINE PRESENTED BY : IMRAN AHMED KHAN University of Texas
  • 2. Wireless communication is playing an increasingly important role in many spheres of society. It has become an essential means of communication. Recent advances in technology have motivated new application domains for wireless networks. The purpose of this article is to examine security and privacy issues in some new and emerging types of wireless networks, and attempt to identify directions for future research.
  • 3. In this article we consider security and privacy issues in certain emerging wireless networks:  Wireless sensor networks (WSN)  Vehicular ad hoc networks (VANET)
  • 4. Wireless networks are inherently more vulnerable than their wired counterparts. Notable factors contributing to security problems include the following:  Channel - Wireless usually involve broadcast communication, which makes eavesdropping and jamming easier.  Mobility - If a wireless device is affiliated with a person, tracking the device reveals that person's location. Thus privacy become a important concern.
  • 5. Resources – End host usually battery powered devices which limits computation, size of RAM and secondary storage. which open the door of denial of service attacks at battery depletion  Accessibility- Some devices are generally left unattended and are places in remote locations. which increases more chances for physical attacks.
  • 6. The original motivation for WSN research stemmed from the vision of Smart Dust in the late 1990s  It consists of large number of small cheap resource constraint sensors and a sink or base stations  Easy to deploy  Use in military , environmental, disaster relief and homeland security
  • 7.
  • 8. Constant presence of a sink  Limited life span To resolve above issues, two new WSN introduced:  Unattended WSN ( UWSN )  Radio frequency identification ( RFID )
  • 9. Unattended WSNs operate without continuous presence of (or supervision by) a sink. Instead, sensor-collected data is harvested by an itinerant sink that visits the network intermittently, with a certain upper bound on the interval between successive visits. Because sensors cannot Communicate with the sink at will, they must accumulate data in situ and wait for the sink. The unattended nature of the network might be promoted by some design requirements to avoid any central point of failure.
  • 10. Data Protection at individual sensor - The main challenge is to protect the data on individual sensor from the attacker. To attained this encryption is used. So that even if the attacker get control on the sensor, it cannot decrypt the data. this is attained by periodically updating secret keys through One way function ( hash functions )  Data Survival - To acheive data survival sensor plays a hide & seek game by moving all of its data around the network. This is ultimately a losing game unless encryption is used.
  • 11. Secrecy - The attackers aims to learns sensors secrets in order to decrypt its data later. One of the proposed solution allow sensor to recover from the compromise by simultaneously providing and obtaining help to/from peer sensors.  Authentication - Data obtain by each sensor is authenticated by the sink. So that it can identify that data is modified by any attacker or not. One of the proposed technique involves sensors to co-sign the data of their neighboring nodes. So that if any one of the co-signer is not compromised, sink can verify integrity and authenticity.
  • 12. Sensors are based on the batteries. If battery runs out , sensor will die.  Rsensors and Rsink.  Rsensors are also equipped with energy harvesting means:  solar  thermal  vibrational  Reduced size.
  • 13. Presence of Rsink is necessary.  Cryptographic operations.  RFID Reader Collision  Since RFID systems make use of the electromagnetic spectrum They are relatively easy to jam using energy at the right frequency.
  • 14. In this article we examine security and privacy issues in some new and emerging wireless networks. In surveying relevant literature, we tried to identify new security and privacy challenges as well as inadequacies of current approaches. Certain challenges arise from the unattended, intermittently connected, and possibly mobile network operation. Consequently, we need to anticipate threats arising from malicious exploitation of such network features and design appropriate security countermeasures. Also, since some emerging wireless networks are ad hoc in nature, infrastructure-independent security and privacy techniques are particularly suitable. Finally, emerging wireless devices such as RSensors motivate the development of new cryptographic primitives and protocols.