SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
2010 International Conference on Computational Intelligence and Security



                               Research On Wireless Sensor Network Security

               Yan-Xiao Li                                    Lian-Qin                                          Qian-Liang
      Telecommunication Engineering               Telecommunication Engineering                     Telecommunication Engineering
                   Institute                                  Institute                                          Institute
     Air Force Engineering University             Air Force Engineering University                  Air Force Engineering University
          Xi’an, Shaanxi, China                        Xi’an, Shaanxi, China                             Xi’an, Shaanxi, China
    e-mail: lily.autumn@hotmail.com              e-mail: mbillow@pub.xaonline.com                   e-mail: liangqian0808@163.com




 Abstract—Wireless sensor networks are a new type of                      the privacy of the sensor networks. Though hardware and
 networked systems, characterized by severely constrained                 software improvements may address many of such security
 computational and energy resources, and an ad hoc                        issues, but development of new supporting technologies and
 operational environment. When wireless sensor networks are               security principles are challenging research issues in WSNs.
 deployed in a hostile terrain, security becomes extremely
 important, as they are prone to different types of malicious
 attacks. Due to the inherent resource limitations of sensor
 nodes, existing network security methods, including those
 developed for Mobile Ad-Hoc Networks, are not well suitable
 for wireless sensor networks. As a crucial issue security in
 wireless sensor networks has attracted a lot of attention in the
 recent year. This paper made a thorough analysis of the major
 security issue and presented the ongoing aspect of further
 development to designers in their struggle to implement the
 most cost effective and appropriate method of securing their
 network.

    Keywords- wireless sensor network; security; threat; attack;
 benchmark                                                                       Figure 1. Scenario of wireless sensor nodes deployment

                        I.   INTRODUCTION                                       II.    SENSOR NETWORK SECURITY ISSUE
     Wireless Sensor Network (WSN) consists of hundreds                        Two of the most security-oriented applications of
 or thousands of self organizing, low-power, low cost                     wireless sensor networks are military and medical solutions.
 wireless nodes and is used in a variety of applications such             Due to the nature of the military, it is obvious that the data
 as military sensing and tracking, environmental monitoring,              (sensed or disseminated) is of a private nature and is
 disaster management, etc. But when WSN is deployed in                    required to remain this way to ensure the success of the
 open, un-monitored, hostile environment [1], or operated on              application. Enemy tracking and targeting are among the
 an unattended mode, sensor nodes will be exposed to the                  most useful applications of wireless sensor networks in
 risk of being captured by an active adversary. So with the               military terms. The most up to date work can be found on
 demanding constraints of nodes’ limited capability, the key              the Defense Advanced Research Projects Agency (DARPA)
 issue for WSN is designing viable security mechanisms for                website [2, 3].
 the protection of confidentiality, integrity and                              The choice of which security services to implement on a
 authentication to prevent malicious attacks, involved.                   given sensor mainly depends on the type of application and
 Besides the inherent limitations in communication and                    its security requirements. Amongst these we examined:
 computing, the deployment nature of sensor networks                           • Authenticity - it makes possible that the message
 makes them more vulnerable to various attacks.                                    receiver is capable of verifying the identity the
     Largely deployed sensor nodes may cover a huge area                           message sender, hence preventing that likely
 further exposing them to attackers who may capture and                            intruder nodes inject malicious data into the
 reprogram the individual nodes,as shown in Fig.1. The                             network.
 adversary may use its own formula of attacking and induce                     • Confidentiality - it ensures that the content of the
 the network to accept them as legitimate nodes.                                   message is accessed only by authorized nodes.
 Falsification of original data, extraction of private sensed                  • Integrity - it guarantees that should a message have
 data, hacking of collected network readings and denial of                         its content modified during the transmission, the
 service are also certain possible threats to the security and                     receiver is able to identify these alterations.


978-0-7695-4297-3/10 $26.00 © 2010 IEEE                             493
                                                                    494
DOI 10.1109/CIS.2010.113
In order to design a completely secure wireless sensor                Multi-hop (Multi-hop) is usually assumed that the
network, security must be integrated into every node of the               network involved in the transfer node will be transparent
system. This is due to the possibility that a component                   to transmit it to the receiver. In the selective forwarding
implemented without any security could easily become a                    attacks, malicious node may refuse to forward certain
point of attack. This dictates that security must pervade                 messages and discarding them. The attack is a simple
every aspect of the design of a wireless sensor network                   form of malicious nodes as a black hole (Black Hole)
application that will require a high level of security [4].               refused to forward the same as it received the packet.
                                                                          • Sinkhole attack
A. Link Layer Security Movivation                                         Sinkhole in the attack, the attacker's goal is to "mutiny"
    In conventional networks, message authenticity,                       to lure specific nodes in the region of all
integrity, and confidentiality are usually achieved by an                 communications traffic in the center of the region caused
end-to-end security mechanism such as SSH [5], SSL [6] or                 by similar "collapse" of the same attack. In fact, the
IPSec [7] because the dominant traffic pattern is end-to-end              attackers set up a large "hole" in order to attract node to
communication; intermediate routers only need to view                     all the communications sent to the base station.
message headers and it is neither necessary nor desirable for             • Hello flooding attack
them to have access to message bodies. This is not the case               HELLO flooding attacks is a new type of sensor network
in sensor networks. The dominant traffic pattern in sensor                for the attack. Many agreements require HELLO packet
networks is many-to-one, with many sensor nodes                           radio node to node adjacent to its own broadcasting.
communicating sensor readings or network events over a                    Attacker with enough power to launch route broadcasts
multihop topology to a central base station. To prune these               or other information, so that the network each node is
redundant messages to reduce traffic and save energy, sensor              believed to attack its neighbors. In order to use HELLO
networks use in- network processing such as aggregation                   flooding attack the attacker does not need to build a
and duplicate elimination [8,9]. Since in-network processing              legitimate communications. An attacker can simply use a
requires inter- mediate nodes to access, modify, and                      large enough power tapping replay (Overheard) to the
suppress the contents of messages, it is unlikely we can use              package, so that each node in the network can be
end-to-end security mechanisms between each sensor node                   received.
and the base station to guarantee the authenticity, integrity,            • Response to deceive
and confidentiality of these messages. Link-layer security                As the number of routing protocol relies on a fixed link
architecture can detect unauthorized packets when they are                layer response, so an attacker can deceive the link layer
first injected into the network. For the above reasons,                   response to the "bugging" of the adjacent node packet.
Link-layer security mechanisms guarantee the authenticity,                Response to deceive the goals, including the sender to
integrity, and confidentiality of messages between                        make sure the actual efficiency of low-efficient link, or
neighboring nodes, while permitting in-network processing.                that have been suspended or banned node is also
The security goals of a link layer protocol are listed here as            effective.
following:
     • Access Control and Message Integrity                                          III.   SECURITY REQURIEMENT
     • Message Confidentiality                                             The goal of security services in WSNs is to protect the
     • Data Authenticity                                               information and resources from attacks and misbehavior.
     • Data Freshness                                                  The security requirements in WSNs include:
                                                                           • Availability, which ensures that the desired network
B. Routing Security Motivation                                                 services are available even in the presence of
    In the design of a new security routing protocol, first                    denial-of-service attacks require configuring the
understand the analysis of the WSN routing attacks. The                        initial duty cycle carefully.
problems are summarized as follows: eavesdropping, fraud,                  • Authorization, which ensures that only authorized
tampering or replay (Relay) routing information; selective                     sensors can be involved in providing information to
forwarding attack; "collapse" (Sink-hole) attacks; Hello                       network services.
flooding attacks; response to deceive, and so on.                          • Authentication,        which    ensures    that   the
    • Eavesdropping, fraud, tampering or replay                                communication from one node to another node is
         information                                                           genuine, that is, a malicious node cannot
    The most direct route to the agreement of the target node                  masquerade as a trusted network node.
    is the exchange between the routing information. The                   • Confidentiality, which ensures that a given message
    attacker through eavesdropping, fraud, tampering or                        cannot be understood by anyone other than the
    replay routing information, routing loop can be                            desired recipients.
    generated, or refuse to lure traffic, to extend or shorten             • Integrity, which ensures that a message sent from
    the source route, a false error messages, separated by the                 one node to another is not modified by malicious
    network to increase the end-to-end delay (Latency ) , and                  intermediate nodes.
    so on.                                                                 • Nonrepudiation, which denotes that a node cannot
    • Selective forwarding attack                                              deny sending a message it has previously sent.


                                                                 494
                                                                 495
•     Freshness, which implies that the data is recent and              •    Attacks on network availability: attacks on
         ensures that no adversary can replay old messages.                     availability are often referred to as denial-of-service
     Moreover, as new sensors are deployed and old sensors                      (DoS) attacks. DoS attacks may target any layer of a
fail, we suggest that forward and backward secrecy should                       sensor network.
also be considered:                                                        •    Stealthy attacks against service integrity: in a
     • Forward secrecy: a sensor should not be able to read                     stealthy attack, the goal of the attacker is to make
         any future messages after it leaves the network.                       the network accept a false data value. For example,
     • Backward secrecy: a joining sensor should not be                         an attacker compromises.
         able to read any previously transmitted message.
         The security services in WSNs are usually centered                          V. SECURITY BENCHMARKS
         around cryptography. However, due to the                          We suggest using the following metrics to evaluate
         constraints in WSNs, many already existing secure              whether a security scheme is appropriate in WSNs:
         algorithms are not practical for use.                             • Security: a security scheme has to meet the
                                                                               requirements discussed above.
          IV.    THREAT MODEL AND ATTACKS                                  • Resiliency: in case a few nodes are compromised, a
    In WSNs, it is usually assumed that an attacker may                        security scheme should still protect against the
know the security mechanisms that are deployed in a sensor                     attacks.
network; they may be able to compromise a node or even                     • Energy efficiency: a security scheme must be energy
physically capture a node. Due to the high cost of deploying                   efficient so as to maximize node and network
tamper resistant sensor nodes, most WSN nodes are viewed                       lifetime.
as non tamper- resistant. Further, once a node is                          • Flexibility: key management needs to be flexible so
compromised, the attacker is capable of stealing the key                       as to allow for different network deployment
materials contained within that node.                                          methods, such as random node scattering and
    Base stations in WSNs are usually regarded as                              predetermined node placement.
trustworthy. Most research studies focus on secure routing                 • Scalability: a security scheme should be able to
between sensors and the base station. Deng et al. considered                   scale without compromising the security
strategies against threats which can lead to the failure of the                requirements.
base station [10].                                                         • Fault-tolerance: a security scheme should continue
    Attacks in sensor networks can be classified into the                      to provide security services in the presence of faults
following categories:                                                          such as failed nodes.
    • Outsider versus insider attacks: outside attacks are                 • Self-healing: sensors may fail or run out of energy.
         defined as attacks from nodes which do not belong                     The remaining sensors may need to be reorganized
         to a WSN; insider attacks occur when legitimate                       to maintain a set level of security.
         nodes of a WSN behave in unintended or                            • Assurance: assurance is the ability to disseminate
         unauthorized ways.                                                    different information at different levels to end-users
    • Passive versus active attacks: passive attacks include                   [12]. A security scheme should offer choices with
         eavesdropping on or monitoring packets exchanged                      regard to desired reliability, latency, and so on.
         within a WSN; active attacks involve some
         modifications of the data steam or the creation of a                     VI.   SECURITY RESEARCH FORMS
         false stream.                                                     •    New, more efficient cryptographic algorithms and
    • Mote-class versus laptop-class attacks: in mote-class                     security protocols. Efficient versions of public key
         attacks, an adversary attacks a WSN by using a few                     cryptography (such as the NTRU algorithms [13])
         nodes with similar capabilities to the network nodes;                  and broadcast authentication protocols (such as
         in laptop-class attacks, an adversary can use more                     μTESLA [14]) have been devised.
         powerful devices (e.g., a laptop) to attack a WSN.                •    Asymmetric algorithms and protocols. Security
         These devices have greater transmission range,                         services have been designed to place the primary
         processing power, and energy reserves than the                         computational and communication burden on
         network nodes.                                                         external entities and/or relay devices rather than on
    WSNs are vulnerable to various types of attacks.                            sensor nodes.
According to the security requirements in WSNs, these                      •    Integration of security into applications. The
attacks can be categorized as [11]:                                             computing infrastructure of miniaturized devices is
    • Attacks on secrecy and authentication: standard                           often much flatter than conventional devices,
         cryptographic techniques can protect the secrecy                       avoiding layers of networking protocols and
         and authenticity of communication channels from                        application functionality for performance reasons.
         outsider attacks such as eavesdropping, packet                         This approach requires security to be deployed at
         replay attacks, and modification or spoofing of                        higher abstraction levels, since a generic security
         packets.                                                               service is too costly.



                                                                  495
                                                                  496
[4]    Perrig, A., Stankovic, J., Wagner, D. (2004), “Security in Wireless
       VII. CONCLUSION AND FUTURE SCOPE                                         Sensor Networks”, Communications of the ACM, 47(6), 53-57.
    Security in wireless sensor networks has attracted a lot             [5]    OpenSSL. http://www.openssl.org.
of attention in the recent years. The severe energy                      [6]    Security architecture for the Internet Protocol. RFC 2401,
                                                                                November 1998.
constraints and demanding deployment environments of
                                                                         [7]    http://www.ssh.com
wireless sensor networks make computer security for
                                                                         [8]    Samuel R. Madden, Michael J. Franklin, Joseph M. Hellerstein,
these systems more challenging than for conventional                            and Wei Hong. TAG: A tiny aggregation service for ad-hoc sensor
networks. Components designed without security can                              networks. In The Fifth Symposium on Operating Systems Design
easily become a point of attack. So it is critical to                           and Implementation (OSDI 2002),2002.
integrate security into every component to pervade                       [9]    Samuel R. Madden, Robert Szewczyk, Michael J. Franklin, and
security and privacy into every aspect of the design.                           David Culler. Supporting aggregate queries over ad-hoc wireless
                                                                                sensor networks. In Workshop on Mobile Computing and Systems
    While each of the security solutions could be used go                       Applications, 2002.
part of the way to effectively securing a WSN, there is                  [10]   J. Deng, R. Han, and S. Mishra, “Enhancing Base Station Security
currently no one solution that can be “plugged-in” to an                        in Wireless Sensor Networks,” Department of Computer Science,
application to provide all the necessary security                               University of Colorado, Tech. Report CU-CS-951-03, 2003.
primitives.                                                              [11]   B. Deb, S. Bhatnagar, and B. Nath, “Information Assurance in
                                                                                Sensor Networks,” Proc. 2nd ACM Int'l. Conf. Wireless Sensor
                                                                                Networks and Applications (WSNA '03), New York: ACM Press,
                                                                                2003, pp. 160–68.
                                                                         [12]   E. Shi and A. Perrig, “Designing Secure Sensor Networks,”
                         REFERENCES                                             Wireless Commun. Mag., vol. 11, no. 6, Dec. 2004 pp. 38 43.
[1]   I. F. Akyildiz,W. Su, Y. Sankasubramaniam, and E. Cayirci.         [13]   J. Hoffstein, J. Pipher, J. H. Silverman, “NTRU: A Ring-Based
      “Wireless Sensor Networks: A Survey”, Computer Networks,                  Public Key Cryptosystem,” in Algorithmic Number Theory (ANTS
      38:393–422, 2002.                                                         III), J.P. Buhler (ed.), Lecture Notes in Computer Science 1423,
[2]   Defence Advanced Research Projects Agency (13 Oct 2006)                   Springer-Verlag, Berlin, 1998.
      Defence Advanced Research Projects Agency Home [online],           [14]   A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar,
      available:                                                                “SPINS: Security protocols for sensor networks,” in Proceedings
[3]   http://www.darpa.mil/index.html [accessed 13 Dec 06]                      of MOBICOM, 2001.




                                                                   496
                                                                   497

Weitere ähnliche Inhalte

Was ist angesagt?

Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
 
Ad hoc secuirty-vemula
Ad hoc secuirty-vemulaAd hoc secuirty-vemula
Ad hoc secuirty-vemulaRaju Vemula
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Attacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksAttacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksijasuc
 

Was ist angesagt? (19)

Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
 
D0961927
D0961927D0961927
D0961927
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
 
Ad hoc secuirty-vemula
Ad hoc secuirty-vemulaAd hoc secuirty-vemula
Ad hoc secuirty-vemula
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
1705 1708
1705 17081705 1708
1705 1708
 
Attacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksAttacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networks
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 

Ähnlich wie wireless sensor network security

Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksiosrjce
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetijctet
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 

Ähnlich wie wireless sensor network security (20)

Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
N010617783
N010617783N010617783
N010617783
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Security issues
Security issuesSecurity issues
Security issues
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

wireless sensor network security

  • 1. 2010 International Conference on Computational Intelligence and Security Research On Wireless Sensor Network Security Yan-Xiao Li Lian-Qin Qian-Liang Telecommunication Engineering Telecommunication Engineering Telecommunication Engineering Institute Institute Institute Air Force Engineering University Air Force Engineering University Air Force Engineering University Xi’an, Shaanxi, China Xi’an, Shaanxi, China Xi’an, Shaanxi, China e-mail: lily.autumn@hotmail.com e-mail: mbillow@pub.xaonline.com e-mail: liangqian0808@163.com Abstract—Wireless sensor networks are a new type of the privacy of the sensor networks. Though hardware and networked systems, characterized by severely constrained software improvements may address many of such security computational and energy resources, and an ad hoc issues, but development of new supporting technologies and operational environment. When wireless sensor networks are security principles are challenging research issues in WSNs. deployed in a hostile terrain, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the inherent resource limitations of sensor nodes, existing network security methods, including those developed for Mobile Ad-Hoc Networks, are not well suitable for wireless sensor networks. As a crucial issue security in wireless sensor networks has attracted a lot of attention in the recent year. This paper made a thorough analysis of the major security issue and presented the ongoing aspect of further development to designers in their struggle to implement the most cost effective and appropriate method of securing their network. Keywords- wireless sensor network; security; threat; attack; benchmark Figure 1. Scenario of wireless sensor nodes deployment I. INTRODUCTION II. SENSOR NETWORK SECURITY ISSUE Wireless Sensor Network (WSN) consists of hundreds Two of the most security-oriented applications of or thousands of self organizing, low-power, low cost wireless sensor networks are military and medical solutions. wireless nodes and is used in a variety of applications such Due to the nature of the military, it is obvious that the data as military sensing and tracking, environmental monitoring, (sensed or disseminated) is of a private nature and is disaster management, etc. But when WSN is deployed in required to remain this way to ensure the success of the open, un-monitored, hostile environment [1], or operated on application. Enemy tracking and targeting are among the an unattended mode, sensor nodes will be exposed to the most useful applications of wireless sensor networks in risk of being captured by an active adversary. So with the military terms. The most up to date work can be found on demanding constraints of nodes’ limited capability, the key the Defense Advanced Research Projects Agency (DARPA) issue for WSN is designing viable security mechanisms for website [2, 3]. the protection of confidentiality, integrity and The choice of which security services to implement on a authentication to prevent malicious attacks, involved. given sensor mainly depends on the type of application and Besides the inherent limitations in communication and its security requirements. Amongst these we examined: computing, the deployment nature of sensor networks • Authenticity - it makes possible that the message makes them more vulnerable to various attacks. receiver is capable of verifying the identity the Largely deployed sensor nodes may cover a huge area message sender, hence preventing that likely further exposing them to attackers who may capture and intruder nodes inject malicious data into the reprogram the individual nodes,as shown in Fig.1. The network. adversary may use its own formula of attacking and induce • Confidentiality - it ensures that the content of the the network to accept them as legitimate nodes. message is accessed only by authorized nodes. Falsification of original data, extraction of private sensed • Integrity - it guarantees that should a message have data, hacking of collected network readings and denial of its content modified during the transmission, the service are also certain possible threats to the security and receiver is able to identify these alterations. 978-0-7695-4297-3/10 $26.00 © 2010 IEEE 493 494 DOI 10.1109/CIS.2010.113
  • 2. In order to design a completely secure wireless sensor Multi-hop (Multi-hop) is usually assumed that the network, security must be integrated into every node of the network involved in the transfer node will be transparent system. This is due to the possibility that a component to transmit it to the receiver. In the selective forwarding implemented without any security could easily become a attacks, malicious node may refuse to forward certain point of attack. This dictates that security must pervade messages and discarding them. The attack is a simple every aspect of the design of a wireless sensor network form of malicious nodes as a black hole (Black Hole) application that will require a high level of security [4]. refused to forward the same as it received the packet. • Sinkhole attack A. Link Layer Security Movivation Sinkhole in the attack, the attacker's goal is to "mutiny" In conventional networks, message authenticity, to lure specific nodes in the region of all integrity, and confidentiality are usually achieved by an communications traffic in the center of the region caused end-to-end security mechanism such as SSH [5], SSL [6] or by similar "collapse" of the same attack. In fact, the IPSec [7] because the dominant traffic pattern is end-to-end attackers set up a large "hole" in order to attract node to communication; intermediate routers only need to view all the communications sent to the base station. message headers and it is neither necessary nor desirable for • Hello flooding attack them to have access to message bodies. This is not the case HELLO flooding attacks is a new type of sensor network in sensor networks. The dominant traffic pattern in sensor for the attack. Many agreements require HELLO packet networks is many-to-one, with many sensor nodes radio node to node adjacent to its own broadcasting. communicating sensor readings or network events over a Attacker with enough power to launch route broadcasts multihop topology to a central base station. To prune these or other information, so that the network each node is redundant messages to reduce traffic and save energy, sensor believed to attack its neighbors. In order to use HELLO networks use in- network processing such as aggregation flooding attack the attacker does not need to build a and duplicate elimination [8,9]. Since in-network processing legitimate communications. An attacker can simply use a requires inter- mediate nodes to access, modify, and large enough power tapping replay (Overheard) to the suppress the contents of messages, it is unlikely we can use package, so that each node in the network can be end-to-end security mechanisms between each sensor node received. and the base station to guarantee the authenticity, integrity, • Response to deceive and confidentiality of these messages. Link-layer security As the number of routing protocol relies on a fixed link architecture can detect unauthorized packets when they are layer response, so an attacker can deceive the link layer first injected into the network. For the above reasons, response to the "bugging" of the adjacent node packet. Link-layer security mechanisms guarantee the authenticity, Response to deceive the goals, including the sender to integrity, and confidentiality of messages between make sure the actual efficiency of low-efficient link, or neighboring nodes, while permitting in-network processing. that have been suspended or banned node is also The security goals of a link layer protocol are listed here as effective. following: • Access Control and Message Integrity III. SECURITY REQURIEMENT • Message Confidentiality The goal of security services in WSNs is to protect the • Data Authenticity information and resources from attacks and misbehavior. • Data Freshness The security requirements in WSNs include: • Availability, which ensures that the desired network B. Routing Security Motivation services are available even in the presence of In the design of a new security routing protocol, first denial-of-service attacks require configuring the understand the analysis of the WSN routing attacks. The initial duty cycle carefully. problems are summarized as follows: eavesdropping, fraud, • Authorization, which ensures that only authorized tampering or replay (Relay) routing information; selective sensors can be involved in providing information to forwarding attack; "collapse" (Sink-hole) attacks; Hello network services. flooding attacks; response to deceive, and so on. • Authentication, which ensures that the • Eavesdropping, fraud, tampering or replay communication from one node to another node is information genuine, that is, a malicious node cannot The most direct route to the agreement of the target node masquerade as a trusted network node. is the exchange between the routing information. The • Confidentiality, which ensures that a given message attacker through eavesdropping, fraud, tampering or cannot be understood by anyone other than the replay routing information, routing loop can be desired recipients. generated, or refuse to lure traffic, to extend or shorten • Integrity, which ensures that a message sent from the source route, a false error messages, separated by the one node to another is not modified by malicious network to increase the end-to-end delay (Latency ) , and intermediate nodes. so on. • Nonrepudiation, which denotes that a node cannot • Selective forwarding attack deny sending a message it has previously sent. 494 495
  • 3. Freshness, which implies that the data is recent and • Attacks on network availability: attacks on ensures that no adversary can replay old messages. availability are often referred to as denial-of-service Moreover, as new sensors are deployed and old sensors (DoS) attacks. DoS attacks may target any layer of a fail, we suggest that forward and backward secrecy should sensor network. also be considered: • Stealthy attacks against service integrity: in a • Forward secrecy: a sensor should not be able to read stealthy attack, the goal of the attacker is to make any future messages after it leaves the network. the network accept a false data value. For example, • Backward secrecy: a joining sensor should not be an attacker compromises. able to read any previously transmitted message. The security services in WSNs are usually centered V. SECURITY BENCHMARKS around cryptography. However, due to the We suggest using the following metrics to evaluate constraints in WSNs, many already existing secure whether a security scheme is appropriate in WSNs: algorithms are not practical for use. • Security: a security scheme has to meet the requirements discussed above. IV. THREAT MODEL AND ATTACKS • Resiliency: in case a few nodes are compromised, a In WSNs, it is usually assumed that an attacker may security scheme should still protect against the know the security mechanisms that are deployed in a sensor attacks. network; they may be able to compromise a node or even • Energy efficiency: a security scheme must be energy physically capture a node. Due to the high cost of deploying efficient so as to maximize node and network tamper resistant sensor nodes, most WSN nodes are viewed lifetime. as non tamper- resistant. Further, once a node is • Flexibility: key management needs to be flexible so compromised, the attacker is capable of stealing the key as to allow for different network deployment materials contained within that node. methods, such as random node scattering and Base stations in WSNs are usually regarded as predetermined node placement. trustworthy. Most research studies focus on secure routing • Scalability: a security scheme should be able to between sensors and the base station. Deng et al. considered scale without compromising the security strategies against threats which can lead to the failure of the requirements. base station [10]. • Fault-tolerance: a security scheme should continue Attacks in sensor networks can be classified into the to provide security services in the presence of faults following categories: such as failed nodes. • Outsider versus insider attacks: outside attacks are • Self-healing: sensors may fail or run out of energy. defined as attacks from nodes which do not belong The remaining sensors may need to be reorganized to a WSN; insider attacks occur when legitimate to maintain a set level of security. nodes of a WSN behave in unintended or • Assurance: assurance is the ability to disseminate unauthorized ways. different information at different levels to end-users • Passive versus active attacks: passive attacks include [12]. A security scheme should offer choices with eavesdropping on or monitoring packets exchanged regard to desired reliability, latency, and so on. within a WSN; active attacks involve some modifications of the data steam or the creation of a VI. SECURITY RESEARCH FORMS false stream. • New, more efficient cryptographic algorithms and • Mote-class versus laptop-class attacks: in mote-class security protocols. Efficient versions of public key attacks, an adversary attacks a WSN by using a few cryptography (such as the NTRU algorithms [13]) nodes with similar capabilities to the network nodes; and broadcast authentication protocols (such as in laptop-class attacks, an adversary can use more μTESLA [14]) have been devised. powerful devices (e.g., a laptop) to attack a WSN. • Asymmetric algorithms and protocols. Security These devices have greater transmission range, services have been designed to place the primary processing power, and energy reserves than the computational and communication burden on network nodes. external entities and/or relay devices rather than on WSNs are vulnerable to various types of attacks. sensor nodes. According to the security requirements in WSNs, these • Integration of security into applications. The attacks can be categorized as [11]: computing infrastructure of miniaturized devices is • Attacks on secrecy and authentication: standard often much flatter than conventional devices, cryptographic techniques can protect the secrecy avoiding layers of networking protocols and and authenticity of communication channels from application functionality for performance reasons. outsider attacks such as eavesdropping, packet This approach requires security to be deployed at replay attacks, and modification or spoofing of higher abstraction levels, since a generic security packets. service is too costly. 495 496
  • 4. [4] Perrig, A., Stankovic, J., Wagner, D. (2004), “Security in Wireless VII. CONCLUSION AND FUTURE SCOPE Sensor Networks”, Communications of the ACM, 47(6), 53-57. Security in wireless sensor networks has attracted a lot [5] OpenSSL. http://www.openssl.org. of attention in the recent years. The severe energy [6] Security architecture for the Internet Protocol. RFC 2401, November 1998. constraints and demanding deployment environments of [7] http://www.ssh.com wireless sensor networks make computer security for [8] Samuel R. Madden, Michael J. Franklin, Joseph M. Hellerstein, these systems more challenging than for conventional and Wei Hong. TAG: A tiny aggregation service for ad-hoc sensor networks. Components designed without security can networks. In The Fifth Symposium on Operating Systems Design easily become a point of attack. So it is critical to and Implementation (OSDI 2002),2002. integrate security into every component to pervade [9] Samuel R. Madden, Robert Szewczyk, Michael J. Franklin, and security and privacy into every aspect of the design. David Culler. Supporting aggregate queries over ad-hoc wireless sensor networks. In Workshop on Mobile Computing and Systems While each of the security solutions could be used go Applications, 2002. part of the way to effectively securing a WSN, there is [10] J. Deng, R. Han, and S. Mishra, “Enhancing Base Station Security currently no one solution that can be “plugged-in” to an in Wireless Sensor Networks,” Department of Computer Science, application to provide all the necessary security University of Colorado, Tech. Report CU-CS-951-03, 2003. primitives. [11] B. Deb, S. Bhatnagar, and B. Nath, “Information Assurance in Sensor Networks,” Proc. 2nd ACM Int'l. Conf. Wireless Sensor Networks and Applications (WSNA '03), New York: ACM Press, 2003, pp. 160–68. [12] E. Shi and A. Perrig, “Designing Secure Sensor Networks,” REFERENCES Wireless Commun. Mag., vol. 11, no. 6, Dec. 2004 pp. 38 43. [1] I. F. Akyildiz,W. Su, Y. Sankasubramaniam, and E. Cayirci. [13] J. Hoffstein, J. Pipher, J. H. Silverman, “NTRU: A Ring-Based “Wireless Sensor Networks: A Survey”, Computer Networks, Public Key Cryptosystem,” in Algorithmic Number Theory (ANTS 38:393–422, 2002. III), J.P. Buhler (ed.), Lecture Notes in Computer Science 1423, [2] Defence Advanced Research Projects Agency (13 Oct 2006) Springer-Verlag, Berlin, 1998. Defence Advanced Research Projects Agency Home [online], [14] A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, available: “SPINS: Security protocols for sensor networks,” in Proceedings [3] http://www.darpa.mil/index.html [accessed 13 Dec 06] of MOBICOM, 2001. 496 497