SlideShare ist ein Scribd-Unternehmen logo
1 von 21
SECURITY IN WSN
By Gaurav Kumar
PROBLEMS APPLYING TRADITIONAL NETWORK SECURITY TECHNIQUES
• Sensor devices are limited in their energy, computation, and
communication capabilities
• Sensor nodes are often deployed in open areas, thus allowing
physical attack
• Sensor networks closely interact with their physical environments
and with peoples, posing new security problems.
WHY HIGH SECURITY LEVEL IS NEEDED?
• Have many applications in military and homeland.
• Could be deployed in hostile environments.
• Could be deployed in uncontrolled environment.
• Wireless communication facilitates eavesdropping.
• Often monitor their surroundings, so it is easy to deduce extra
unwanted information results in privacy violation.
WSN SECURITY CHALLENGES
• Conflicting between minimization of resource consumption
and maximization of security level.
• Advanced anti-jamming techniques are impossible due
to its complex design and high energy consumption. .
• Ad-hoc topology facilitates attackers of different types
and from different directions.
• Most current standard security protocols do not scale to
a large number of participants.
WSN SECURITY CHALLENGES
• Encryption requires extra processing, memory and
battery power.
• Although sensors location information are important
most of current proposal are suitable for static WSNs.
• Most existing time synchronization schemes are
vulnerable to several attacks.
TAXONOMY OF ATTACKS IN WSN.
1. BASED ON CAPABILITY OF THE ATTACKER
• Outsider versus insider attacks.
• Passive versus active attacks.
• Mote-class versus laptop-class attacks.
2. BASED ON ATTACKS ON INFORMATION IN
TRANSIT.
• Interruption.
• Interception.
• Modification.
• Fabrication.
3. BASED ON PROTOCOL STACK.
This protocol stack combines power and routing awareness.
3.1. PHYSICAL LAYER ATTACKS.
• Attacks:
1. Device Tampering.
2. Eavesdropping.
3. Jamming.
• Solutions:
1. Access Restriction
2. Encryption.
3.2. DATA LINK LAYER ATTACKS.
• Attacks:
1. Traffic Manipulation.
2. Identity Spoofing.
ex. Sybil attack.
• Solutions:
1. Misbehavior Detection.
2. Identity Protection
3.3. NETWORK LAYER ATTACKS.
• Attacks:
1. False Routing.
2. Black Hole.
3. Sinkhole
• Solutions:
1. Routing Access Restriction.
2. False Routing Information Detection.
3.4. TRANSPORT LAYER ATTACKS.
• Attacks:
1. Flooding.
2. De-synchronization Attacks.
Solutions:
1. Limit number of connections from a particular node.
2. Header or full packet authentication.
3.5. APPLICATION LAYER ATTACKS.
• Attacks:
1. Selective Message Forwarding.
2. Data Aggregation Distortion.
Solutions:
1. Data Integrity Protection.
2. Data Confidentiality Protection.
IEEE 802.15.4 SECURITY
• The IEEE 802.15.4 specification [1] defines MAC layer and physical
layer (PHY) targeted for the Low Rate Wireless Personal Area
Networks (LR-WPAN) using short distance applications with low
power consumption and low cost communication networks,
particularly for the short-range applications such as wireless
sensor networks, residential/industrial setting networks, etc.
• The IEEE 802.15.4 specification supports many applications with
MAC security requirements. If the networks are not secured,
confidentiality, privacy, and integrity could be compromised.
ZIG-BEE
ZigBee is a technological standard, based on IEEE 802.15.4
standard, which was created specifically for control and sensor
networks.
•ZigBee has been designed to transmit slowly. It has a data
rate of 250kbps (kilobits per second).
•Low in cost ,complexity & power consumption as compared to
competing technologies.
•Intended to network inexpensive devices
•Data rates touch 250Kbps for 2.45Ghz ,40 Kbps 915Mhz and
20Kbps for 868Mhz band.
ZIGBEE GENERAL CHARACTERISTICS
Data rates of 20 kbps and up to 250 kbps
• Star or Peer-to-Peer network topologies
• Support for Low Latency Devices
• CSMA-CA Channel Access
• Handshaking
• Low Power Usage consumption
• 3 Frequencies bands with 27 channels
• Extremely low duty-cycle (<0.1%)
WHAT DOES ZIGBEE DO?
• Designed for wireless controls and sensors
• Operates in Personal Area Networks (PAN’s)
and device-to-device networks
• Connectivity between small packet devices
• Control of lights, switches, thermostats,
appliances, etc.
ZIG-BEE DEVICE TYPES
There are three different types of ZigBee devices:
1. ZigBee coordinator (ZC): The most capable device, the coordinator forms the root
of the network tree and might bridge to other networks. There is exactly one ZigBee
coordinator in each network since it is the device that started the network originally.
It is able to store information about the network, including acting as the Trust
Centre & repository for security keys.
2. ZigBee Router (ZR): As well as running an application function, a router can act as
an intermediate router, passing on data from other devices.
3. ZigBee End Device (ZED): Contains just enough functionality to talk to the parent
node (either the coordinator or a router); it cannot relay data from other devices.
This relationship allows the node to be asleep a significant amount of the time
thereby giving long battery life. A ZED requires the least amount of memory, and
therefore can be less expensive to manufacture than a ZR or ZC.
CONCLUSION.
• WSN needs high level of security due to its harsh environment.
• This leads to intense security and survival requirements.
• WSN face attacks of different types.
• Limited resources of sensors make WSN faces a huge security
challenges.
• Some challenges are resolved and many haven’t resolved yet
or under studying.
BY GAURAV KUMAR

Weitere ähnliche Inhalte

Was ist angesagt?

Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Ali Habeeb
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkShubhamTakkar
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksNaveen Kumar
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkNeha Kulkarni
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networksahmad abdelhafeez
 

Was ist angesagt? (20)

Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Routing
RoutingRouting
Routing
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
WEP
WEPWEP
WEP
 
Dsdv
DsdvDsdv
Dsdv
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
middleware
middlewaremiddleware
middleware
 
Firewalls
FirewallsFirewalls
Firewalls
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)
 

Ähnlich wie Security in Wireless Sensor Network

Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSijwmn
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509IJMER
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksJahan Zeb Xebi
 

Ähnlich wie Security in Wireless Sensor Network (20)

Wsn
WsnWsn
Wsn
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
D0961927
D0961927D0961927
D0961927
 
S04404116120
S04404116120S04404116120
S04404116120
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networks
 
Paper1
Paper1Paper1
Paper1
 

Kürzlich hochgeladen

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Kürzlich hochgeladen (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Security in Wireless Sensor Network

  • 1. SECURITY IN WSN By Gaurav Kumar
  • 2. PROBLEMS APPLYING TRADITIONAL NETWORK SECURITY TECHNIQUES • Sensor devices are limited in their energy, computation, and communication capabilities • Sensor nodes are often deployed in open areas, thus allowing physical attack • Sensor networks closely interact with their physical environments and with peoples, posing new security problems.
  • 3. WHY HIGH SECURITY LEVEL IS NEEDED? • Have many applications in military and homeland. • Could be deployed in hostile environments. • Could be deployed in uncontrolled environment. • Wireless communication facilitates eavesdropping. • Often monitor their surroundings, so it is easy to deduce extra unwanted information results in privacy violation.
  • 4. WSN SECURITY CHALLENGES • Conflicting between minimization of resource consumption and maximization of security level. • Advanced anti-jamming techniques are impossible due to its complex design and high energy consumption. . • Ad-hoc topology facilitates attackers of different types and from different directions. • Most current standard security protocols do not scale to a large number of participants.
  • 5. WSN SECURITY CHALLENGES • Encryption requires extra processing, memory and battery power. • Although sensors location information are important most of current proposal are suitable for static WSNs. • Most existing time synchronization schemes are vulnerable to several attacks.
  • 7. 1. BASED ON CAPABILITY OF THE ATTACKER • Outsider versus insider attacks. • Passive versus active attacks. • Mote-class versus laptop-class attacks.
  • 8. 2. BASED ON ATTACKS ON INFORMATION IN TRANSIT. • Interruption. • Interception. • Modification. • Fabrication.
  • 9. 3. BASED ON PROTOCOL STACK. This protocol stack combines power and routing awareness.
  • 10. 3.1. PHYSICAL LAYER ATTACKS. • Attacks: 1. Device Tampering. 2. Eavesdropping. 3. Jamming. • Solutions: 1. Access Restriction 2. Encryption.
  • 11. 3.2. DATA LINK LAYER ATTACKS. • Attacks: 1. Traffic Manipulation. 2. Identity Spoofing. ex. Sybil attack. • Solutions: 1. Misbehavior Detection. 2. Identity Protection
  • 12. 3.3. NETWORK LAYER ATTACKS. • Attacks: 1. False Routing. 2. Black Hole. 3. Sinkhole • Solutions: 1. Routing Access Restriction. 2. False Routing Information Detection.
  • 13. 3.4. TRANSPORT LAYER ATTACKS. • Attacks: 1. Flooding. 2. De-synchronization Attacks. Solutions: 1. Limit number of connections from a particular node. 2. Header or full packet authentication.
  • 14. 3.5. APPLICATION LAYER ATTACKS. • Attacks: 1. Selective Message Forwarding. 2. Data Aggregation Distortion. Solutions: 1. Data Integrity Protection. 2. Data Confidentiality Protection.
  • 15. IEEE 802.15.4 SECURITY • The IEEE 802.15.4 specification [1] defines MAC layer and physical layer (PHY) targeted for the Low Rate Wireless Personal Area Networks (LR-WPAN) using short distance applications with low power consumption and low cost communication networks, particularly for the short-range applications such as wireless sensor networks, residential/industrial setting networks, etc. • The IEEE 802.15.4 specification supports many applications with MAC security requirements. If the networks are not secured, confidentiality, privacy, and integrity could be compromised.
  • 16. ZIG-BEE ZigBee is a technological standard, based on IEEE 802.15.4 standard, which was created specifically for control and sensor networks. •ZigBee has been designed to transmit slowly. It has a data rate of 250kbps (kilobits per second). •Low in cost ,complexity & power consumption as compared to competing technologies. •Intended to network inexpensive devices •Data rates touch 250Kbps for 2.45Ghz ,40 Kbps 915Mhz and 20Kbps for 868Mhz band.
  • 17. ZIGBEE GENERAL CHARACTERISTICS Data rates of 20 kbps and up to 250 kbps • Star or Peer-to-Peer network topologies • Support for Low Latency Devices • CSMA-CA Channel Access • Handshaking • Low Power Usage consumption • 3 Frequencies bands with 27 channels • Extremely low duty-cycle (<0.1%)
  • 18. WHAT DOES ZIGBEE DO? • Designed for wireless controls and sensors • Operates in Personal Area Networks (PAN’s) and device-to-device networks • Connectivity between small packet devices • Control of lights, switches, thermostats, appliances, etc.
  • 19. ZIG-BEE DEVICE TYPES There are three different types of ZigBee devices: 1. ZigBee coordinator (ZC): The most capable device, the coordinator forms the root of the network tree and might bridge to other networks. There is exactly one ZigBee coordinator in each network since it is the device that started the network originally. It is able to store information about the network, including acting as the Trust Centre & repository for security keys. 2. ZigBee Router (ZR): As well as running an application function, a router can act as an intermediate router, passing on data from other devices. 3. ZigBee End Device (ZED): Contains just enough functionality to talk to the parent node (either the coordinator or a router); it cannot relay data from other devices. This relationship allows the node to be asleep a significant amount of the time thereby giving long battery life. A ZED requires the least amount of memory, and therefore can be less expensive to manufacture than a ZR or ZC.
  • 20. CONCLUSION. • WSN needs high level of security due to its harsh environment. • This leads to intense security and survival requirements. • WSN face attacks of different types. • Limited resources of sensors make WSN faces a huge security challenges. • Some challenges are resolved and many haven’t resolved yet or under studying.