O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

Wireless sensor network security issues

11.571 visualizações

Publicada em

Publicada em: Tecnologia
  • Login to see the comments

Wireless sensor network security issues

  1. 1. WSN security issues Presented by: Maha Saad Mohamed
  2. 2. Introduction High level of security is needed in WSN. This leads to need of extra resources.   BUT WSN resources are very limited. Current researches haven’t treat this conflict yet.   SO Special security requirements are needed. WSN security faces a lot of challenges. A lot of research points in this area is open.    2 Sensor network
  3. 3. Agenda Why high security level is needed? Security AND survivability requirements. Taxonomy of attacks. WSN security challenges. Conclusion. 3 Sensor network
  4. 4. Why high security level is needed?  Have many applications in military and homeland.  Could be deployed in hostile environments.  Could be deployed in uncontrolled environment.  Wireless communication facilitates eavesdropping.  Often monitor their surroundings, so it is easy to deduce extra unwanted information results in privacy violation. 4 Sensor network
  5. 5. WSN security AND survivability requirements. run Security in a WSN is extremely important. Moreover, it should be reliably without interruption. Security requirements:        Confidentiality. Authentication. Non-repudiation . Integrity. Freshness Forward and Backward secrecy Survivability requirements:     5 Reliability Availability. Energy efficiency. Sensor network
  6. 6. Taxonomy of attacks. BASED ON Capability of the attacker 6 Attacks on information in transit Sensor network Protocol stack
  7. 7. 1. Based on capability of the attacker  Outsider versus insider attacks.  Passive versus active attacks.  Mote-class versus laptop-class attacks. 7 Sensor network
  8. 8. 2. Based on attacks on information in transit.  Interruption.  Interception.  Modification.  Fabrication. 8 Sensor network
  9. 9. 3. Based on protocol stack. This protocol stack combines power and routing awareness. WSN protocol stack 9 Sensor network
  10. 10. 3.1. Physical layer attacks.  Attacks:     Device Tampering. Eavesdropping. Jamming. Solutions:   10 Access Restriction Encryption. Sensor network
  11. 11. 3.2. Data link layer attacks.  Attacks:   Traffic Manipulation. Identity Spoofing. ex. Sybil attack  Solutions:   11 Misbehavior Detection. Identity Protection Sensor network
  12. 12. 3.3. Network layer attacks.  Attacks:    False Routing. Black Hole.  Sinkhole Solutions:   12 Routing Access Restriction. False Routing Information Detection. Sensor network
  13. 13. 3.3. Transport layer attacks.  Attacks:    Flooding. De-synchronization Attacks. Solutions:   13 Limit number of connections from a particular node. Header or full packet authentication. Sensor network
  14. 14. 3.3. Application layer attacks.  Attacks:    Selective Message Forwarding. Data Aggregation Distortion Solutions:   14 Data Integrity Protection. Data Confidentiality Protection. Sensor network
  15. 15. WSN security challenges (1/3).  Conflicting between minimization of resource consumption and maximization of security level.  Advanced anti-jamming techniques are impossible due to its complex design and high energy consumption. .  Ad-hoc topology facilitates attackers of different types and from different directions.  Most current standard security protocols do not scale to a large number of participants. 15 Sensor network
  16. 16. WSN security challenges (2/3).  Encryption requires extra processing, memory and battery power.  Secure asymmetric key needs more computations.  Although sensors location information are important most of current proposal are suitable for static WSNs. 16 Sensor network
  17. 17. WSN security challenges (3/3).  Most existing time synchronization schemes are vulnerable to several attacks.  Their low costs impedes use of expensive tamperresistant hardware.  Little research has been done in code attestation. 17 Sensor network
  18. 18. Conclusion.  WSN needs high level of security due to its harsh environment.  This leads to intense security and survival requirements.  WSN face attacks of different types.  Limited resources of sensors make WSN faces a huge security challenges.  Some challenges are resolved and many haven’t resolved yet or under studying. 18 Sensor network
  19. 19. References.  T.Kavitha and D.Sridharan, “Security Vulnerabilities In Wireless Sensor Networks: A Survey”, Journal of Information Assurance and SecurityVol. 5, No. 1 pp. 31– 44, 2010.  Yi Qian and Kejie Lu and David Tipper, “A Design For Secure And Survivable Wireless Sensor Networks”, IEEE Wireless Communications , pp. 30 - 37, October 2007.  K. Xing, S. Srinivasan, M. Rivera, J. Li, and X. Cheng, Attacks and Countermeasures in Sensor Networks: A Survey, The George Washington University Technical Report GWU-CSTR-010-05, 2005. 19 Sensor network
  20. 20. Questions 20 Sensor network
  21. 21. 21 Sensor network

×