SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Security in
Wireless sensor network
Disclaimer:
a.
Information included in this slides came from multiple sources. We have
tried our best to cite the sources. Please refer to the Table of References
slide (#2) to learn about the sources, when applicable.
b.
The slides should be used only for academic purposes (e.g., in teaching a
class), and should not be used for commercial purposes.

Security in Wireless sensor network

1
Table of references
Slides

References

5

http://www.sciencedirect.com/

6

www.cis.syr.edu/~wedu/Research/slides/Purdue04.ppt

7-9

Wireless Sensor Network Security: A Survey

11-13,
15-17

Karlof, C., and D. Wagner,” Secure Routing in Wireless
Sensor Networks: Attacks and Countermeasures”

14

Security for Sensor Networks: Cryptography and
Beyond by David Wagner

18-20

www.cs.binghamton.edu/~kang/teaching/cs580s/secwsn.ppt

2
Security in Wireless sensor network
Introduction


What is wireless sensor network?
The wireless network consists of hundreds or thousands of lowpower, low-cost nodes deployed to monitor and affect the
environment
Organization of Wireless sensor network
Ref:-www.cis.syr.edu/~wedu/Research/slides/Purdue04.ppt
Sensors
Deploy

3
Security in Wireless sensor network
Benefits-WSN




Low Cost
Easy to Deploy / Maintain
Access and Measure unreachable events

4
Security in Wireless sensor network
Application of WSN









Military applications
Enemy movement
Environmental applications
Habitat monitoring
Forrest fire monitoring
Health applications
Tracking patients, doctors, drug administrators
Home applications
Other commercial applications

5
Security in Wireless sensor network
Need for Security


Protecting confidentiality, integrity, and availability of the
communications and computations



Sensor networks have certain severe resource
constraints due to their lack of data storage and power



Wireless Sensor networks are vulnerable to security
attacks as medium of transmission of data is
broadcasting
Sensor nodes can be physically captured or destroyed



6
Security in Wireless sensor network
Requirements of security








Data confidentiality
Sensor networks should not leak any sensitive data
to any unauthorized neighboring nodes
Data integrity
The sensitive data should not be erased or changed
by the adversary
Data Freshness
The data received by the nodes should be recent
and should be the old message replayed
Availability
Limitation of data access
7
Security in Wireless sensor network
Standard approach








The standard approach to achieve the data
confidentiality is to encrypt it with the secret key which is
possessed by the intended receivers
uTESLA is a protocol which uses asymmetric key
cryptography and minimal packet overhead to achieve
the data integrity
Typical approach to achieve the data freshness is
shared needs to be exchanged over a period of time
Traditional encryption algorithm can be used to achieve
make the data available

8
Security in Wireless sensor network
Obstacles of Sensor nodes Security







A sensor nodes have a small amount of memory and
storage space for the code
Energy is the biggest constraints in the wireless sensor
network
Unreliable communication
Unattended Operation

9
Security in Wireless sensor network
Network layer attacks on WSN






Spoofed, altered and replayed routing information
Selective Forwarding
Sinkhole attacks
The Sybil attack
Wormholes

10
Security in Wireless sensor network
Description of attacks


Spoof, alter, or replay routing info
- Create loops, attack or repel network traffic, partition
the network, extend or shorten the source routes and
generate false error messages



Selective forwarding
- Malicious node selectively drops incoming packets
- Adversary can also modify packets and forward
these messages

11
Security in Wireless sensor network
Continued..


Sinkhole attacks
- All packets are directed to base station
- A malicious node advertises a high quality link to the
base station to attract a lot of packets
- Enable other attacks, e.g., selective forwarding or
wormhole attack

12
Security in Wireless sensor network
Continued..


Sybil attack
- A single node presents multiple ID’s to other nodes
- Affect distributed storage, multi-path routing , topology
maintenance and geographic routing



Wormhole Attack
- Two colluding nodes
- A node at one end of the wormhole advertises high
quality link to the base station
- Another node at the other end receives the attracted
packets
13
Security in Wireless sensor network
Protocols and relevant attacks
Protocol

Relevant attacks

TinyOS beaconing

Bogus routing information, selective forwarding, sinkholes,
Sybil, wormholes, HELLO floods

Directed diffusion and
multipath variant

Bogus routing information, selective forwarding, sinkholes,
Sybil, wormholes, HELLO floods

Geographic routing
(GPSR,GEAR)

Bogus routing information, selective forwarding, Sybil

Minimum cost forwarding

Bogus routing information, selective forwarding, sinkholes,
wormholes, HELLO floods

Clustering based protocols Selective forwarding, HELLO floods
(LEACH,TEEN,PEGASIS)
Rumor routing

Bogus routing information, selective forwarding, sinkholes,
Sybil, wormholes

Energy conserving
topology maintenance

Bogus routing information, Sybil, HELLO floods

14
Security in Wireless sensor network
Approaches against the attacks


Outsider attacks and link layer security
Precaution against outsider attacks, e.g., Sybil
attacks, selective forwarding, ACK spoofing
- Cannot handle insider attacks



Sybil attack
- Every node shares a unique secret key with the base
station
- Create pair wise shared key for msg authentication
- Limit the number of neighbors for a node

15
Security in Wireless sensor network
Continued..


Wormhole, sinkhole attack
- Cryptography may not help directly
- Good routing protocol design
- Geographic routing

Tunnel packets from one part
of the network and replay them
in a different part.
-

16
Security in Wireless sensor network
Continued..


Selective forwarding
- Multi-path routing
- Route messages over disjoint or Braided paths
- Dynamically pick next hop from a set of candidates

17
Security in Wireless sensor network
Secure routing






To send data safely proper routing and forwarding is
required in sensor network
Injection attacks
Insert malicious information in the network to
produce inconsistencies
Authentication can avoid the injection attacks
Sensor networks are susceptible to node capture
attacks
Single node is compromised to take over the entire
network
18
Security in Wireless sensor network
Secure group management






protocols for group management are required to
- securely admit new group members
- support secure group communication
The outcome of the group computation is normally
transmitted to a base station, therefore the output must
be authenticated to ensure it comes from a valid group.
Any solution must also be efficient in terms of time and
energy (or involve low computation and communication
costs).
- precludes most classical group-management solutions

19
Security in Wireless sensor network
Secure data aggregation







Wireless sensor network sense the large and dense set
of nodes
The sensed values must be aggregated to avoid
overwhelming amounts of traffic back to the base station
Aggregation takes place depending on the architecture
If the application tolerates approximate answers,
powerful techniques are available.
- randomly sampling a small fraction of nodes and
checking that they have behaved properly supports
detection of many different types of attacks

20
Security in Wireless sensor network

Weitere ähnliche Inhalte

Was ist angesagt?

Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTPositiveTechnologies
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network pptPramod Kuruvatti
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksZaahir Salam
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architectureVidhi603146
 

Was ist angesagt? (20)

Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
SS7: 2G/3G's weakest link
SS7: 2G/3G's weakest linkSS7: 2G/3G's weakest link
SS7: 2G/3G's weakest link
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 

Ähnlich wie Security in WSN

A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Dharmendrasingh417
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor NetworksRandom Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networksijceronline
 

Ähnlich wie Security in WSN (20)

A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Paper1
Paper1Paper1
Paper1
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
Security issues
Security issuesSecurity issues
Security issues
 
Presentation1
Presentation1Presentation1
Presentation1
 
D0961927
D0961927D0961927
D0961927
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
S04404116120
S04404116120S04404116120
S04404116120
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor NetworksRandom Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
 

Kürzlich hochgeladen

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Kürzlich hochgeladen (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Security in WSN

  • 1. Security in Wireless sensor network Disclaimer: a. Information included in this slides came from multiple sources. We have tried our best to cite the sources. Please refer to the Table of References slide (#2) to learn about the sources, when applicable. b. The slides should be used only for academic purposes (e.g., in teaching a class), and should not be used for commercial purposes. Security in Wireless sensor network 1
  • 2. Table of references Slides References 5 http://www.sciencedirect.com/ 6 www.cis.syr.edu/~wedu/Research/slides/Purdue04.ppt 7-9 Wireless Sensor Network Security: A Survey 11-13, 15-17 Karlof, C., and D. Wagner,” Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures” 14 Security for Sensor Networks: Cryptography and Beyond by David Wagner 18-20 www.cs.binghamton.edu/~kang/teaching/cs580s/secwsn.ppt 2 Security in Wireless sensor network
  • 3. Introduction  What is wireless sensor network? The wireless network consists of hundreds or thousands of lowpower, low-cost nodes deployed to monitor and affect the environment Organization of Wireless sensor network Ref:-www.cis.syr.edu/~wedu/Research/slides/Purdue04.ppt Sensors Deploy 3 Security in Wireless sensor network
  • 4. Benefits-WSN    Low Cost Easy to Deploy / Maintain Access and Measure unreachable events 4 Security in Wireless sensor network
  • 5. Application of WSN      Military applications Enemy movement Environmental applications Habitat monitoring Forrest fire monitoring Health applications Tracking patients, doctors, drug administrators Home applications Other commercial applications 5 Security in Wireless sensor network
  • 6. Need for Security  Protecting confidentiality, integrity, and availability of the communications and computations  Sensor networks have certain severe resource constraints due to their lack of data storage and power  Wireless Sensor networks are vulnerable to security attacks as medium of transmission of data is broadcasting Sensor nodes can be physically captured or destroyed  6 Security in Wireless sensor network
  • 7. Requirements of security     Data confidentiality Sensor networks should not leak any sensitive data to any unauthorized neighboring nodes Data integrity The sensitive data should not be erased or changed by the adversary Data Freshness The data received by the nodes should be recent and should be the old message replayed Availability Limitation of data access 7 Security in Wireless sensor network
  • 8. Standard approach     The standard approach to achieve the data confidentiality is to encrypt it with the secret key which is possessed by the intended receivers uTESLA is a protocol which uses asymmetric key cryptography and minimal packet overhead to achieve the data integrity Typical approach to achieve the data freshness is shared needs to be exchanged over a period of time Traditional encryption algorithm can be used to achieve make the data available 8 Security in Wireless sensor network
  • 9. Obstacles of Sensor nodes Security     A sensor nodes have a small amount of memory and storage space for the code Energy is the biggest constraints in the wireless sensor network Unreliable communication Unattended Operation 9 Security in Wireless sensor network
  • 10. Network layer attacks on WSN      Spoofed, altered and replayed routing information Selective Forwarding Sinkhole attacks The Sybil attack Wormholes 10 Security in Wireless sensor network
  • 11. Description of attacks  Spoof, alter, or replay routing info - Create loops, attack or repel network traffic, partition the network, extend or shorten the source routes and generate false error messages  Selective forwarding - Malicious node selectively drops incoming packets - Adversary can also modify packets and forward these messages 11 Security in Wireless sensor network
  • 12. Continued..  Sinkhole attacks - All packets are directed to base station - A malicious node advertises a high quality link to the base station to attract a lot of packets - Enable other attacks, e.g., selective forwarding or wormhole attack 12 Security in Wireless sensor network
  • 13. Continued..  Sybil attack - A single node presents multiple ID’s to other nodes - Affect distributed storage, multi-path routing , topology maintenance and geographic routing  Wormhole Attack - Two colluding nodes - A node at one end of the wormhole advertises high quality link to the base station - Another node at the other end receives the attracted packets 13 Security in Wireless sensor network
  • 14. Protocols and relevant attacks Protocol Relevant attacks TinyOS beaconing Bogus routing information, selective forwarding, sinkholes, Sybil, wormholes, HELLO floods Directed diffusion and multipath variant Bogus routing information, selective forwarding, sinkholes, Sybil, wormholes, HELLO floods Geographic routing (GPSR,GEAR) Bogus routing information, selective forwarding, Sybil Minimum cost forwarding Bogus routing information, selective forwarding, sinkholes, wormholes, HELLO floods Clustering based protocols Selective forwarding, HELLO floods (LEACH,TEEN,PEGASIS) Rumor routing Bogus routing information, selective forwarding, sinkholes, Sybil, wormholes Energy conserving topology maintenance Bogus routing information, Sybil, HELLO floods 14 Security in Wireless sensor network
  • 15. Approaches against the attacks  Outsider attacks and link layer security Precaution against outsider attacks, e.g., Sybil attacks, selective forwarding, ACK spoofing - Cannot handle insider attacks  Sybil attack - Every node shares a unique secret key with the base station - Create pair wise shared key for msg authentication - Limit the number of neighbors for a node 15 Security in Wireless sensor network
  • 16. Continued..  Wormhole, sinkhole attack - Cryptography may not help directly - Good routing protocol design - Geographic routing Tunnel packets from one part of the network and replay them in a different part. - 16 Security in Wireless sensor network
  • 17. Continued..  Selective forwarding - Multi-path routing - Route messages over disjoint or Braided paths - Dynamically pick next hop from a set of candidates 17 Security in Wireless sensor network
  • 18. Secure routing    To send data safely proper routing and forwarding is required in sensor network Injection attacks Insert malicious information in the network to produce inconsistencies Authentication can avoid the injection attacks Sensor networks are susceptible to node capture attacks Single node is compromised to take over the entire network 18 Security in Wireless sensor network
  • 19. Secure group management    protocols for group management are required to - securely admit new group members - support secure group communication The outcome of the group computation is normally transmitted to a base station, therefore the output must be authenticated to ensure it comes from a valid group. Any solution must also be efficient in terms of time and energy (or involve low computation and communication costs). - precludes most classical group-management solutions 19 Security in Wireless sensor network
  • 20. Secure data aggregation     Wireless sensor network sense the large and dense set of nodes The sensed values must be aggregated to avoid overwhelming amounts of traffic back to the base station Aggregation takes place depending on the architecture If the application tolerates approximate answers, powerful techniques are available. - randomly sampling a small fraction of nodes and checking that they have behaved properly supports detection of many different types of attacks 20 Security in Wireless sensor network