1 / 16

Sensor Network Security: Survey

Sensor Network Security: Survey. Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza. Outlines……. Introduction WSN Security Why , different from traditional network ? Seven Categories of security issues Existing Research in WSN Spins TinySec TinyPK

duman
Download Presentation

Sensor Network Security: Survey

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza

  2. Outlines…… • Introduction • WSN Security • Why, different from traditional network ? • Seven Categories of security issues • Existing Research in WSN • Spins • TinySec • TinyPK • Motivation for Security at Link Layer

  3. Introduction: WSN Wireless Sensor Network • A WSN is a network made of many small devices consisting of: • Battery, • Radio Communication, • Microcontroller and sensors.

  4. Motes….

  5. Application of WSN… • Body Area Sensor • Network (BASN): • ECG Sensor • SpO2 & Motion sensor • Motion Sensor

  6. WSN Security Sensor networks are vulnerable to security attacks due to the broadcast nature of transmission Sensor nodes can be physically captured or destroyed Protecting confidentiality, integrity, and availability of the communications and computations

  7. Why Security different from traditional network ? • Sensor Node Constraints: • CPU power: • 8-bit CPU • Memory: • Program Storage(Flash) and Working Memory(RAM) • Battery: • Computational Energy Consumption • Communications Energy Consumption

  8. Security issues are divided in Seven Categories as referenced paper • Secure Routing • Secure Location • Secure Data Fusion • And other Security issues Reference : Xiangqian Chen, k. Makki, Kang Yen, Niki P.,”Sensor network Security: A Survey”, IEEE communication surveys & Tutorial, Vol. 11, No. 2, Second Quarter 2009. Cryptography Key Management Attack Detections and prevention

  9. Existing Research: Reference: Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks”, Proceedings of 7th Annual International Conference on Mobile Computing and Networks (MOBICOM 2001), Rome, Italy July 2001 • SPINS: Security Protocol for Sensor Network • SENP: • Sensor-Network Encryption Protocol. • Secures point-to-point communication • TESLA: • Micro Timed Efficient Stream Loss-tolerant Authentication • Provides broadcast authentication

  10. Cont… • Use simple symmetric encryption function (RC5) provides: • Encryption & Decryption • Message Authentication Code • Pseudorandom number generation • Hash Function • TESLA : efficient source authentication in multicast for wired networks. • µTESLA: authentication in broadcast for WSNs. • µTESLA removes or adapts the expensive features of TESLA

  11. TinySec….. Reference: Chris Karlof, Naveen Sastry, David Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004. Light weight and efficient generic link layer security package. Developers can easily integrate into sensor network applications. A research platform that is easily extensible and has been incorporated into higher level protocols.

  12. TinySec-Design • Two Security Options • Authentication Encryption (Tinysec-AE) • Authentication only (Tinysec-Au) • Encryption : • Specifying the IV format • Selecting an encryption Scheme( CBC)

  13. TinyPK Reference: TinyPK: Securing Sensor Networks with Public Key Technology”, R. Watro et al., ACM SASN, October 2004. • In order to make TinyPK practical, protocol require only public key operations on the sensor. • TinyPK is based on RSA cryptosystem. • TinyPK requires a Certificate Authority. • Any external party that wishes to interact with the node also requires its own Public/private key

  14. Motivation for Link Layer Security • End-End security Mechanisms : Suitable only for conventional networks using end-end communications where intermediate routers only need to view the message headers. • BUT, in Sensor networks In-network processing is done to avoid redundant messages-Requires intermediate nodes to have access to whole message packets and just not the headers as in conventional networks.

  15. Cont… Why end-end security mechanisms not suitable for sensor networks? If message integrity checked only at the destination, the networks may route packets injected by an adversary many hops before they are detected. This will waste precious energy. A link layer security mechanism can detect unauthorized packets when they are first injected onto the network.

  16. Next Plan…. Any Question ? • Discuss more about related topic. • Discuss Problems in existing research.

More Related