08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Security and privacy in Wireless Sensor Networks
1. Based on a research paper by
DI MA, UNIVERSITY OF MICHIGAN-DEARBORN
GENE TSUDIK, UNIVERSITY OF CALIFORNIA, IRVINE
PRESENTED BY :
IMRAN AHMED KHAN
University of Texas
2. Wireless communication is playing an
increasingly important role in many
spheres of society. It has become an
essential means of communication. Recent
advances in technology have motivated
new application domains for wireless
networks. The purpose of this article is to
examine security and privacy issues in
some new and emerging types of wireless
networks, and attempt to identify
directions for future research.
3. In this article we consider security and privacy
issues in certain emerging wireless networks:
Wireless sensor networks (WSN)
Vehicular ad hoc networks (VANET)
4. Wireless networks are inherently more
vulnerable than their wired counterparts.
Notable factors contributing to security
problems include the following:
Channel - Wireless usually involve broadcast
communication, which makes eavesdropping
and jamming easier.
Mobility - If a wireless device is affiliated with
a person, tracking the device reveals that
person's location. Thus privacy become a
important concern.
5. Resources – End host usually battery powered
devices which limits computation, size of RAM
and secondary storage. which open the door of
denial of service attacks at battery depletion
Accessibility- Some devices are generally left
unattended and are places in remote locations.
which increases more chances for physical
attacks.
6. The original motivation for WSN research
stemmed from the vision of Smart Dust in the
late 1990s
It consists of large number of small cheap
resource constraint sensors and a sink or base
stations
Easy to deploy
Use in military , environmental, disaster relief
and homeland security
7.
8. Constant presence of a sink
Limited life span
To resolve above issues, two new WSN
introduced:
Unattended WSN ( UWSN )
Radio frequency identification ( RFID )
9. Unattended WSNs operate without continuous
presence of (or supervision by) a sink. Instead,
sensor-collected data is harvested by an itinerant
sink that visits the network intermittently, with a
certain upper bound on the interval between
successive visits. Because sensors cannot
Communicate with the sink at will, they must
accumulate data in situ and wait for the sink. The
unattended nature of the network might be promoted
by some design requirements to avoid any
central point of failure.
10. Data Protection at individual sensor - The main
challenge is to protect the data on individual
sensor from the attacker. To attained this
encryption is used. So that even if the attacker get
control on the sensor, it cannot decrypt the data.
this is attained by periodically updating secret
keys through One way function ( hash functions )
Data Survival - To acheive data survival sensor
plays a hide & seek game by moving all of its data
around the network. This is ultimately a losing
game unless encryption is used.
11. Secrecy - The attackers aims to learns sensors
secrets in order to decrypt its data later. One of the
proposed solution allow sensor to recover from the
compromise by simultaneously providing and
obtaining help to/from peer sensors.
Authentication - Data obtain by each sensor is
authenticated by the sink. So that it can identify
that data is modified by any attacker or not. One of
the proposed technique involves sensors to co-sign
the data of their neighboring nodes. So that if any
one of the co-signer is not compromised, sink can
verify integrity and authenticity.
12. Sensors are based on the batteries. If battery
runs out , sensor will die.
Rsensors and Rsink.
Rsensors are also equipped with energy
harvesting means:
solar
thermal
vibrational
Reduced size.
13. Presence of Rsink is necessary.
Cryptographic operations.
RFID Reader Collision
Since RFID systems make use of the
electromagnetic spectrum They are relatively
easy to jam using energy at the right frequency.
14. In this article we examine security and privacy issues in
some new and emerging wireless networks. In surveying
relevant literature, we tried to identify new security and
privacy challenges as well as inadequacies of current
approaches. Certain challenges arise from the unattended,
intermittently connected, and possibly mobile network
operation. Consequently, we need to anticipate threats
arising from malicious exploitation of such network
features and design appropriate security countermeasures.
Also, since some emerging wireless networks are ad hoc in
nature, infrastructure-independent security and privacy
techniques are particularly suitable. Finally, emerging
wireless devices such as RSensors motivate the
development of new cryptographic primitives and
protocols.