1 / 10

Security In Wireless Sensor Network

Security In Wireless Sensor Network. CHIA-LING YANG CSCI 5235. Abstract .

nguyet
Download Presentation

Security In Wireless Sensor Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security In Wireless Sensor Network CHIA-LING YANG CSCI 5235

  2. Abstract • Wireless sensor networks are a device that can collect data and its size can range from a few hundred sensors to a few hundred thousand or possibly more [1]. As WSNs can be data collection, coordinated analysis, and automated event correlation [2], they can be applied to a wide range of purposes such as temperature monitoring, vehicle monitoring, animal monitoring…etc. These sensors, different from traditional networks, are deployed over our environment and it is more vulnerable to security attacks than wired networks, due to the broadcast communication [3]. Therefore, security issues become extremely important. In this paper, different kinds of threats in WSN are introduced and it indicates that how they can be avoided and protected by security services in WSN.

  3. Outline • Section I Introduction • Section II Wireless Sensor Networks • What is WSN? • Where can it be used for? • Section III Threats and Attacks in Wireless Sensor Networks • Passive Information Gathering • False Node insertion • Sybil Attack • Wormhole Attack • Section IV Security Goals in Wireless Sensor Networks • Data Confidentiality • Data authentication • Data Integrity • Data Freshness • Robustness • Section V Security Method: LEAP • Individual Key • Group Key • Cluster Key • Pairwise Shared Key • Section VI Conclusion

  4. Wireless Sensor Networks From: http://arri.uta.edu/acs/networks/WirelessSensorNetChap04.pdf

  5. Threats and Attacks (1) • Passive Information Gathering • Physical location • Message • Use encryption to prevent it • False Node insertion • False data • Inject False Messages • Use authentication to prevent it

  6. Threats and Attacks (2) • Sybil Attack

  7. Threats and Attacks (3) • Wormhole Attack From: http://csie.npu.edu.tw/itaoi/6/B/6.pdf

  8. Security Goals • Data Confidentiality • Data authentication • Data Integrity • Data Freshness • Robustness

  9. Security Method: LEAP • Localized Encryption and Authentication Protocol • Four types of keys • Individual key • Each node has a unique key shared with the base station • Cluster key • A node has the key shared with all of its neighboring nodes • Pairwise key • A node has the key shared with its immediate neighbors. • Group key • “This is a globally shared key that is used by the base station for encrypting messages that are broadcast to the whole group.”[3]

  10. Reference • [1] Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei, Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Springer Science + Business Media, LLC, 19 May 2006. • [2] Adrian Perrig, “John Stankovic, and David Wagner, Security in Wireless Sensor Netoworks,” Communications of The ACM, Vol. 47 No. 6, pp. 53-57, June 2004. • [3] Xiuli Ren, “Security Methods for Wireless Sensor Networks,” in International Conference on Mechatronics and Automation, 2006, pp. 1925-1930. • [4] Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu, and Nael Abu-Ghazaleh, An application-Driven Perspective on Wireless Sensor Network Security, • [5] F. L. LEWIS, Wireless Sensor Networks, http://arri.uta.edu/acs/networks/WirelessSensorNetChap04.pdf.

More Related