SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Security
in
Wireless Sensor Networks
Shruti Pathak
CS 685
Fall 2009
Introduction (Wireless sensor Networks)
 Current applications include ocean and
wildlife monitoring, manufacturing machinery
performance monitoring, building safety and
earthquake monitoring, military applications
etc.
 Future applications might involve highway
traffic, building security, water quality and
people’s heart rates.
Challenges posed by WSN
 To make the sensor networks economically
viable they have limited energy consumption
and communication capabilities.
 Often deployed in accessible areas; implies
added risk to physical attacks.
 Interaction with their physical environments
and people result in new security problems.
A Secure System
 Usually a standalone component of the
system where a separate module provides
security.
 This is a flawed approach.
 Ideally, security should be a part of every
component. (the components designed
without security can become a point of
attack)
Key Establishment and Trust Setup
 Cryptographic keys need to be established during
the setting up of a sensor network for later use.
 Various traditional protocols cannot be used in case
of sensor devices due to limited computational
capabilities.
 The key establishment techniques need to scale to
networks with hundreds and thousands of nodes.
 Sensor nodes differ in communication patterns with
the traditional networks; sensor nodes may need to
set up keys with their neighbors and with data
aggregation nodes.
Simplest solution for key establishment
 Network-wide shared key.
Disadvantage: Compromise of any single node result
in decryption of complete network traffic.
 Variant to the above approach use a single shared
key to establish a set of link keys, one per pair of
communicating nodes, then erase the network-wide
key after setting up the session keys.
Disadvantage: This process does not allow addition
of new nodes after initial deployment.
Public Key Cryptography
(Diffie-Hellman key Establishment)
 D-H Key Establishment: Allows two parties
that have no prior knowledge of each other to
jointly establish a shared secret key over an
insecure communications channel.
 Advantage: A node can set up a secure key
with any other node in the network.
 But is beyond the scope of the capabilities of
the sensor networks.
Bootstrapping
 Bootstrapping keys with a trusted base
station is an option.
 Each node shares a single key with the base
station and set up keys with the other nodes
through the base stations.
 Disadvantage: Single point of failure.
 Advantage: If the network incorporates
tamper-resistant packaging for the base
station, it would help in the mitigation of
threats of physical attacks.
Random Key Distribution Protocols
 Large pool of symmetric key is chosen and a random
subset of pool is distributed to each sensor node.
 Two nodes that want to communicate search their pools
to determine whether they share a common key.
 Not every pair of nodes share a common key.
 A fully connected network can be established if the key
establishment probability is sufficiently great.
 Advantage: Avoids having to include a central base
station.
 Disadvantage: Attackers who are able to compromise
sufficiently large number of nodes could reconstruct the
complete key pool and break the entire scheme.
Security and Authentication
 Need for protection against eavesdropping, injection
and modification of packets.
 Cryptography is the standard defense mechanism
but has its own tradeoffs.
 It entails performance cost for extra computation
that increases packet size.
 Hardware support of it increases efficiency but also
increase financial cost of implementing a network.
 Software-only cryptography is practical with today’s
sensor technology. Hardware support is not needed.
Privacy Concerns
 Secret surveillance:
- Employers can spy on their employees
- Shop owners on customers
- Neighbors on each other
- Law enforcement agencies on public places
 Surveillance technology has become cheaper
and more effective and hence affordable.
 Devices have become smaller hence easy to
conceal.
Threats
 New type of threats introduced by the sensor
networks.
 Enables routine tracking of people and vehicles over
long period of time.
 In order to be able to solve the problems related to
privacy; not only the technology but a mix of societal
norms, new laws and technological responses are
necessary.
 The existence of sensor technology and surveillance
should be made known to people for a better
acceptance of the technology.
Robustness to communication
denial of service
 Denial of services attacks are one of the greatest
concerns.
 An adversary can severely disrupt the network’s
operation by broadcasting a high energy signal,
entire system could be jammed.
 Solution: When jamming effects only the portion of
the network, a jamming-resistant network could
defeat the attack by detection of the jammed area
and mapping the affected region and the routing
around the jammed area.
Secure Routing
 Routing and data forwarding is an essential service
for enabling communication in sensor networks.
 Simplest attack: Injection of malicious routing
information into the network can result in routing
inconsistencies.
Solution: Simple authentication might guard against
these attacks; still susceptible to replay attacks by
attackers with legitimate routing messages.
 Node-capture attacks: In almost all the routing
protocols, compromise of single nodes suffices to
take over the entire network or prevent
communication within it.
Resilience to node capture
 Generally, sensor nodes are present in locations that are readily
accessible to attackers.
 It becomes easy for an attacker to capture these nodes, extract
cryptographic secrets, modify their programming or replace them
with malicious nodes.
 Defense: Tamper-resistant packaging but is expensive hence not
preferable instead algorithmic solutions are preferred over it.
 Challenge is to build a network that would operate correctly even
if several nodes are compromised without our knowledge.
 Sending every packet across multiple, independent paths and
checking at the destination for consistency among the packets
that are received, resilience against node-capture can be
achieved.
Network Security Services:
Secure Group Management
 High level security mechanisms.
 Each node in the sensor network is limited in computing and
communication capabilities.
 However, data aggregation and analysis can be performed by
group of nodes.
 Example: A group of nodes might be responsible for tracking the
vehicle through the network.
 Secure protocols are required for group management that would
ensure secure admission of new group members and secure
communication among that group.
 The outcome of the group’s computation is normally transmitted
to the base station which should be authenticated to ensure that
it comes from a valid group.
 Any solution must be efficient in time and energy.
Network Security Services:
Intrusion Detection
 Wireless sensor networks are susceptible to many
forms of intrusion.
 In wired networks, traffic and computation are
typically monitored and analyzed for anomalies at
various concentration points, which is often
expensive.
 For a lesser expensive solution, applications and
typical threat models must be understood,
particularly how cooperating adversaries might
attack the system.
 Use of secure groups may be a promising approach
for decentralized intrusion detection.
Network Security Services:
Secure data aggregation
 One benefit of wireless sensor networks is
the fine-grain sensing that large and dense
set of nodes can provide.
 To avoid overwhelming traffic back to the
base station; data should be aggregated.
 Aggregation may take place at many places
in the network, depending upon the
architecture of the wireless sensor networks.
 All such locations should be secured.
Research Challenges
 Severe constraints and demanding
deployment environments of wireless sensor
networks make computer security for these
systems challenging.
 How to secure wireless communication links?
 Understanding the environment-related
constraints.

Weitere ähnliche Inhalte

Was ist angesagt?

Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security insAstha Parihar
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Eng. Mohammed Ahmed Siddiqui
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAijp2p
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
 
Network security using data mining concepts
Network security using data mining conceptsNetwork security using data mining concepts
Network security using data mining conceptsJaideep Ghosh
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressVallie Joseph
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkEng. Mohammed Ahmed Siddiqui
 

Was ist angesagt? (20)

Network Security
Network  SecurityNetwork  Security
Network Security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Intercept product
Intercept productIntercept product
Intercept product
 
RSA Anatomy of an Attack
RSA Anatomy of an AttackRSA Anatomy of an Attack
RSA Anatomy of an Attack
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security ins
 
Another proposal
Another proposalAnother proposal
Another proposal
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Network security
Network securityNetwork security
Network security
 
Network security using data mining concepts
Network security using data mining conceptsNetwork security using data mining concepts
Network security using data mining concepts
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Ids 001 ids vs ips
Ids 001 ids vs ipsIds 001 ids vs ips
Ids 001 ids vs ips
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 

Ähnlich wie Paper1

Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksZac Darcy
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaperMumbai Academisc
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
 
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKSAN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKScsandit
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 

Ähnlich wie Paper1 (20)

Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
S04404116120
S04404116120S04404116120
S04404116120
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKSAN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
D0961927
D0961927D0961927
D0961927
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 

Kürzlich hochgeladen

Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 

Kürzlich hochgeladen (20)

Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 

Paper1

  • 2. Introduction (Wireless sensor Networks)  Current applications include ocean and wildlife monitoring, manufacturing machinery performance monitoring, building safety and earthquake monitoring, military applications etc.  Future applications might involve highway traffic, building security, water quality and people’s heart rates.
  • 3. Challenges posed by WSN  To make the sensor networks economically viable they have limited energy consumption and communication capabilities.  Often deployed in accessible areas; implies added risk to physical attacks.  Interaction with their physical environments and people result in new security problems.
  • 4. A Secure System  Usually a standalone component of the system where a separate module provides security.  This is a flawed approach.  Ideally, security should be a part of every component. (the components designed without security can become a point of attack)
  • 5. Key Establishment and Trust Setup  Cryptographic keys need to be established during the setting up of a sensor network for later use.  Various traditional protocols cannot be used in case of sensor devices due to limited computational capabilities.  The key establishment techniques need to scale to networks with hundreds and thousands of nodes.  Sensor nodes differ in communication patterns with the traditional networks; sensor nodes may need to set up keys with their neighbors and with data aggregation nodes.
  • 6. Simplest solution for key establishment  Network-wide shared key. Disadvantage: Compromise of any single node result in decryption of complete network traffic.  Variant to the above approach use a single shared key to establish a set of link keys, one per pair of communicating nodes, then erase the network-wide key after setting up the session keys. Disadvantage: This process does not allow addition of new nodes after initial deployment.
  • 7. Public Key Cryptography (Diffie-Hellman key Establishment)  D-H Key Establishment: Allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel.  Advantage: A node can set up a secure key with any other node in the network.  But is beyond the scope of the capabilities of the sensor networks.
  • 8. Bootstrapping  Bootstrapping keys with a trusted base station is an option.  Each node shares a single key with the base station and set up keys with the other nodes through the base stations.  Disadvantage: Single point of failure.  Advantage: If the network incorporates tamper-resistant packaging for the base station, it would help in the mitigation of threats of physical attacks.
  • 9. Random Key Distribution Protocols  Large pool of symmetric key is chosen and a random subset of pool is distributed to each sensor node.  Two nodes that want to communicate search their pools to determine whether they share a common key.  Not every pair of nodes share a common key.  A fully connected network can be established if the key establishment probability is sufficiently great.  Advantage: Avoids having to include a central base station.  Disadvantage: Attackers who are able to compromise sufficiently large number of nodes could reconstruct the complete key pool and break the entire scheme.
  • 10. Security and Authentication  Need for protection against eavesdropping, injection and modification of packets.  Cryptography is the standard defense mechanism but has its own tradeoffs.  It entails performance cost for extra computation that increases packet size.  Hardware support of it increases efficiency but also increase financial cost of implementing a network.  Software-only cryptography is practical with today’s sensor technology. Hardware support is not needed.
  • 11. Privacy Concerns  Secret surveillance: - Employers can spy on their employees - Shop owners on customers - Neighbors on each other - Law enforcement agencies on public places  Surveillance technology has become cheaper and more effective and hence affordable.  Devices have become smaller hence easy to conceal.
  • 12. Threats  New type of threats introduced by the sensor networks.  Enables routine tracking of people and vehicles over long period of time.  In order to be able to solve the problems related to privacy; not only the technology but a mix of societal norms, new laws and technological responses are necessary.  The existence of sensor technology and surveillance should be made known to people for a better acceptance of the technology.
  • 13. Robustness to communication denial of service  Denial of services attacks are one of the greatest concerns.  An adversary can severely disrupt the network’s operation by broadcasting a high energy signal, entire system could be jammed.  Solution: When jamming effects only the portion of the network, a jamming-resistant network could defeat the attack by detection of the jammed area and mapping the affected region and the routing around the jammed area.
  • 14. Secure Routing  Routing and data forwarding is an essential service for enabling communication in sensor networks.  Simplest attack: Injection of malicious routing information into the network can result in routing inconsistencies. Solution: Simple authentication might guard against these attacks; still susceptible to replay attacks by attackers with legitimate routing messages.  Node-capture attacks: In almost all the routing protocols, compromise of single nodes suffices to take over the entire network or prevent communication within it.
  • 15. Resilience to node capture  Generally, sensor nodes are present in locations that are readily accessible to attackers.  It becomes easy for an attacker to capture these nodes, extract cryptographic secrets, modify their programming or replace them with malicious nodes.  Defense: Tamper-resistant packaging but is expensive hence not preferable instead algorithmic solutions are preferred over it.  Challenge is to build a network that would operate correctly even if several nodes are compromised without our knowledge.  Sending every packet across multiple, independent paths and checking at the destination for consistency among the packets that are received, resilience against node-capture can be achieved.
  • 16. Network Security Services: Secure Group Management  High level security mechanisms.  Each node in the sensor network is limited in computing and communication capabilities.  However, data aggregation and analysis can be performed by group of nodes.  Example: A group of nodes might be responsible for tracking the vehicle through the network.  Secure protocols are required for group management that would ensure secure admission of new group members and secure communication among that group.  The outcome of the group’s computation is normally transmitted to the base station which should be authenticated to ensure that it comes from a valid group.  Any solution must be efficient in time and energy.
  • 17. Network Security Services: Intrusion Detection  Wireless sensor networks are susceptible to many forms of intrusion.  In wired networks, traffic and computation are typically monitored and analyzed for anomalies at various concentration points, which is often expensive.  For a lesser expensive solution, applications and typical threat models must be understood, particularly how cooperating adversaries might attack the system.  Use of secure groups may be a promising approach for decentralized intrusion detection.
  • 18. Network Security Services: Secure data aggregation  One benefit of wireless sensor networks is the fine-grain sensing that large and dense set of nodes can provide.  To avoid overwhelming traffic back to the base station; data should be aggregated.  Aggregation may take place at many places in the network, depending upon the architecture of the wireless sensor networks.  All such locations should be secured.
  • 19. Research Challenges  Severe constraints and demanding deployment environments of wireless sensor networks make computer security for these systems challenging.  How to secure wireless communication links?  Understanding the environment-related constraints.