100 likes | 117 Views
Explore security issues in distributed sensor networks, vulnerabilities, attack types, and effective security schemes to safeguard data. Learn about intrusion detection, secure routing, and key management.
E N D
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County 2007. 10
Outline • Introduction • Security Criteria • Vulnerabilities • Attack types • Security Schemes
1. Introduction • Explosive growth of mobile computing devices laptops personal digital assistants (PDAs) handheld digital devices … • Ubiquitous computing Individual users utilize, at the same time, several electronic platforms through which they can access all the required information whenever and wherever they may be
2. Security Criteria • Availability Provide all the designed services • Integrity Malicious altering, accidental altering • Confidentiality Accessible to authorized nodes • Authenticity Prove identities
2. Security Criteria • Nonrepudiation Cannot disavow sent or received a message • Authorization Specifies the privileges and permissions • Anonymity Privacy preserving
3. Vulnerabilities • Lack of secure boundaries No needto gain the physical access to visit the network • Threats from compromised nodes inside the network Behavioral diversity of different nodes, mobility • Lack of centralized management facility Benign failures, trust management, cooperative algorithm • Restricted power supply Battery, DoS, selfish node • Scalability Efficient routing protocol, key management service
4. Attack types • Denial of Service (DoS) Radio jamming, battery exhaustion • Impersonation Compromised nodes join the network as normal nodes • Eavesdropping Obtain confidential information during communication • Attacks against routing Attacks on routing protocols, attacks on packet forwarding/delivery
5. Security Schemes • Intrusion Detection Techniques Distributed and cooperative to meet with the needs of sensor networks • Secure Routing Techniques Defend specific attacks and general attacks • Medium Access Control Guaranteed or controlled access, random access • Key Management Cryptography
References • Y. Zhang and W. Lee, Intrusion Detection in Wireless Ad-hoc Networks, in Proceedingsof the 6th International Conference on Mobile Computing and Networking (MobiCom2000), pages 275–283, Boston, Massachusetts, August 2000. • Jim Parker, Anand Patwardhan, and Anupam Joshi, Detecting Wireless Misbehavior through Cross-layer Analysis, in Proceedings of the IEEE Consumer Communications and Networking Conference Special Sessions (CCNC’2006), Las Vegas, Nevada, 2006. • Y. Hu, A. Perrig and D. Johnson, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, in Proceedings of ACM MobiCom Workshop - WiSe’03, 2003. • Yi-an Huang and Wenke Lee, A Cooperative Intrusion Detection System for Ad Hoc Networks, in Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, Fairfax, Virginia, 2003, pp. 135 – 147. • Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31), CRC Press LLC, 2003.