SlideShare a Scribd company logo
1 of 16
Threats in Wireless Sensor Networks
PRESENTED BY: PRIYA KAUSHAL
ROLL NO. 152615
ME (ECE) REGULAR
Introduction
 High level of security is needed in WSN.
 This leads to need of extra resources.
BUT
 WSN resources are very limited.
 Current researches haven’t treat this conflict yet.
SO
 Special security requirements are needed.
 WSN security faces a lot of challenges.
 A lot of research points in this area is open.
Why high security level is
needed?
 Have many applications in military and homeland.
 Could be deployed in hostile environments.
 Could be deployed in uncontrolled environment.
 Wireless communication facilitates eavesdropping.
 Often monitor their surroundings, so it is easy to deduce extra unwanted information
results in privacy violation.
SECURITY SCHEMES
Security scheme
Basic
Cryptography
Steganography
Proposed
Holistic Security
Attacks
Sensor networks are particularly vulnerable to several key types of attacks. Attacks can be performed in a
variety of ways.
Wireless networks are vulnerable to security attacks due to the broadcast nature of the transmission medium.
Furthermore, WSNs have an additional vulnerability because nodes are often placed in a hostile or dangerous
environment where they are not physically protected.
For a large-scale sensor network, it is impractical to monitor and protect each individual sensor from physical
or logical attack.
Attackers may device different types of security threats to make the WSN system unstable.
Classifications
Based on
Capability of the
attacker
Attack on
information in transit
Protocol stack
Based on Capability of
attacker
• Outside attacks are defined as attacks from nodes, which do not belong to a WSN
• Insider attacks occur when legitimate nodes of a WSN behave in unintended or
unauthorized ways.
Outsider versus
insider attacks
• Passive attacks include eavesdropping on or monitoring packets exchanged within
a WSN
• Active attacks involve some modifications of the data steam or the creation of a
false stream.
Passive versus active
attacks
• In mote-class attacks, an adversary attacks a WSN by using a few nodes with similar
capabilities to the network nodes.
• laptop-class attacks, an adversary can use more powerful devices (e.g., a laptop) to
attack a WSN.
Mote-class versus
laptop-class attacks
Attacks on information in
transit
• This involves breaking the software running on the sensor nodes. Chances are the
operating system and/or the applications running in a sensor node are vulnerable to
popular exploits such as buffer overflows.
Software
compromise
• It has two orthogonal perspectives layer-specific compromises, and protocol-specific
compromises. This includes all the attacks on information in transit. Apart from that it
also includes Deviating from protocol.
Network-
based attacks
Based on Protocol Stack
Physical layer
Jamming
Radio interference
Data link layer
Continues channel
access
Collision
Network layer
sinkhole
Hello flood
Transport layer
Flooding
De-synchronization
attack
Application layer
overwhelm attack
Path based DOC
Physical layer
• Attackers broadcasting a high-energy signal. Jamming attacks in WSNs, classifying them as
• constant :corrupts packets as they are transmitted
• Deceptive: sends a constant stream of bytes into the network to make it look like legitimate traffic
• Random: randomly alternates between sleep and jamming to save energy
• Reactive: transmits a jam signal when it senses traffic
Jamming
• In which the adversary either produces large amounts of interference intermittently.
• Solution: use of symmetric key algorithms in which the disclosure of the keys is delayed by some time
interval.
Radio
interference
Data link layer
• malicious node disrupts the Media Access Control protocol, by continuously
requesting or transmitting over the channel. This eventually leads a starvation for
other nodes in the network with respect to channel access.
• Solution: Rate Limiting to the MAC admission control such that the network can ignore
excessive requests, thus preventing the energy drain caused by repeated
transmissions.
• time division multiplexing
Continuous
Channel
Access
• A collision occurs when two nodes attempt to transmit on the same frequency
simultaneously.
• When packets collide, a change will likely occur in the data portion, causing a
checksum mismatch at the receiving end.
• solution: error-correcting codes .
collision
Network layer
• Depending on the routing algorithm technique, a sinkhole attack tries to lure almost all the
traffic toward the compromised node, creating a metaphorical sinkhole with the adversary
at the center.
• Geo-routing protocols.
sinkhole
• This attack exploits Hello packets
• A laptop class adversary can send this kind of packet to all sensor nodes in the network so that they
believe the compromised node belongs to their neighbors. This causes a large number of nodes sending
packets to this imaginary neighbor and thus into oblivion.
• Authentication is a solution . Such attacks can easily be avoided by verify bi-directionality of a link
before taking action based on the information received over that link.
Hello
Flood
Transport layer
• An attacker may repeatedly make new connection requests until the resources required
by each connection are exhausted or reach a maximum limit. It produces severe resource
constraints for legitimate nodes.
• solution: each connecting client demonstrate its commitment to the connection by
solving a puzzle.
Flooding
• In this attack, the adversary repeatedly forges messages to one or both end points which
request transmission of missed frames. Hence, these messages are again transmitted and if
the adversary maintains a proper timing, it can prevent the end points from exchanging
any useful information. This will cause a considerable drainage of energy of legitimate
nodes in the network in an end less synchronization-recovery protocol.
• Solution: authentication of all packets including control fields communicated between
De-
synchronization
Application layer
• An attacker might attempt to overwhelm network nodes with sensor stimuli, causing
the network to forward large volumes of traffic to a base station.
• consumes network bandwidth and drains node energy.
• Solution: carefully tuning sensors so that only the specifically desired stimulus
• Rate-limiting and efficient data-aggregation algorithms can also reduce these attacks’
effects
Overwhelm
attack
• It involves injecting spurious or replayed packets into the network at leaf nodes. This attack can
starve the network of legitimate traffic, because it consumes resources on the path to the base
station, thus preventing other nodes from sending data to the base station.
• Solution: Combining packet authentication and anti replay protection prevents these attacks.
Path –based
DOS attack
conclusion
 WSN needs high level of security due to its harsh environment.
 This leads to intense security and survival requirements.
 WSN face attacks of different types.
 Limited resources of sensors make WSN faces a huge security challenges.
 Some challenges are resolved and many haven’t resolved yet or under studying.
Thank You

More Related Content

What's hot

Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Data representation and visualization ppt
Data representation and visualization pptData representation and visualization ppt
Data representation and visualization pptSindhujaCSEngineerin
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksAmeer Sameer
 
Microstrip Patch Antenna Design
Microstrip Patch Antenna DesignMicrostrip Patch Antenna Design
Microstrip Patch Antenna DesignAmit Samanta
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation projectShohin Aheleroff
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Ali Habeeb
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architectureVidhi603146
 

What's hot (20)

Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Satellite Link Design: C/N Ratio
Satellite Link Design:  C/N RatioSatellite Link Design:  C/N Ratio
Satellite Link Design: C/N Ratio
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
Data representation and visualization ppt
Data representation and visualization pptData representation and visualization ppt
Data representation and visualization ppt
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
Microstrip Patch Antenna Design
Microstrip Patch Antenna DesignMicrostrip Patch Antenna Design
Microstrip Patch Antenna Design
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 

Viewers also liked

Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Sigma web solutions pvt. ltd.
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Session 5.6 towards a semantic outlier detection framework in wireless sens...
Session 5.6   towards a semantic outlier detection framework in wireless sens...Session 5.6   towards a semantic outlier detection framework in wireless sens...
Session 5.6 towards a semantic outlier detection framework in wireless sens...semanticsconference
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventuresemanticsconference
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811praveen369
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksSouhaiel tekaya
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networksahmad abdelhafeez
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkdeawoo Kim
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKPavithraRShettigar
 

Viewers also liked (20)

Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Session 5.6 towards a semantic outlier detection framework in wireless sens...
Session 5.6   towards a semantic outlier detection framework in wireless sens...Session 5.6   towards a semantic outlier detection framework in wireless sens...
Session 5.6 towards a semantic outlier detection framework in wireless sens...
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Lecture3 - Machine Learning
Lecture3 - Machine LearningLecture3 - Machine Learning
Lecture3 - Machine Learning
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventure
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORK
 

Similar to Threats in wireless sensor networks

Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networksProf. Dr. Noman Islam
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
Unit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfUnit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfMathavan N
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSIRJET Journal
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...IRJET Journal
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocolSuganthiN2
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Vasserman-TMC13-slide
Vasserman-TMC13-slideVasserman-TMC13-slide
Vasserman-TMC13-slidemanoj kumar s
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksKishan Patel
 

Similar to Threats in wireless sensor networks (20)

Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
Unit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfUnit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdf
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
D0961927
D0961927D0961927
D0961927
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Vasserman-TMC13-slide
Vasserman-TMC13-slideVasserman-TMC13-slide
Vasserman-TMC13-slide
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 

Threats in wireless sensor networks

  • 1. Threats in Wireless Sensor Networks PRESENTED BY: PRIYA KAUSHAL ROLL NO. 152615 ME (ECE) REGULAR
  • 2. Introduction  High level of security is needed in WSN.  This leads to need of extra resources. BUT  WSN resources are very limited.  Current researches haven’t treat this conflict yet. SO  Special security requirements are needed.  WSN security faces a lot of challenges.  A lot of research points in this area is open.
  • 3. Why high security level is needed?  Have many applications in military and homeland.  Could be deployed in hostile environments.  Could be deployed in uncontrolled environment.  Wireless communication facilitates eavesdropping.  Often monitor their surroundings, so it is easy to deduce extra unwanted information results in privacy violation.
  • 5. Attacks Sensor networks are particularly vulnerable to several key types of attacks. Attacks can be performed in a variety of ways. Wireless networks are vulnerable to security attacks due to the broadcast nature of the transmission medium. Furthermore, WSNs have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected. For a large-scale sensor network, it is impractical to monitor and protect each individual sensor from physical or logical attack. Attackers may device different types of security threats to make the WSN system unstable.
  • 6. Classifications Based on Capability of the attacker Attack on information in transit Protocol stack
  • 7. Based on Capability of attacker • Outside attacks are defined as attacks from nodes, which do not belong to a WSN • Insider attacks occur when legitimate nodes of a WSN behave in unintended or unauthorized ways. Outsider versus insider attacks • Passive attacks include eavesdropping on or monitoring packets exchanged within a WSN • Active attacks involve some modifications of the data steam or the creation of a false stream. Passive versus active attacks • In mote-class attacks, an adversary attacks a WSN by using a few nodes with similar capabilities to the network nodes. • laptop-class attacks, an adversary can use more powerful devices (e.g., a laptop) to attack a WSN. Mote-class versus laptop-class attacks
  • 8. Attacks on information in transit • This involves breaking the software running on the sensor nodes. Chances are the operating system and/or the applications running in a sensor node are vulnerable to popular exploits such as buffer overflows. Software compromise • It has two orthogonal perspectives layer-specific compromises, and protocol-specific compromises. This includes all the attacks on information in transit. Apart from that it also includes Deviating from protocol. Network- based attacks
  • 9. Based on Protocol Stack Physical layer Jamming Radio interference Data link layer Continues channel access Collision Network layer sinkhole Hello flood Transport layer Flooding De-synchronization attack Application layer overwhelm attack Path based DOC
  • 10. Physical layer • Attackers broadcasting a high-energy signal. Jamming attacks in WSNs, classifying them as • constant :corrupts packets as they are transmitted • Deceptive: sends a constant stream of bytes into the network to make it look like legitimate traffic • Random: randomly alternates between sleep and jamming to save energy • Reactive: transmits a jam signal when it senses traffic Jamming • In which the adversary either produces large amounts of interference intermittently. • Solution: use of symmetric key algorithms in which the disclosure of the keys is delayed by some time interval. Radio interference
  • 11. Data link layer • malicious node disrupts the Media Access Control protocol, by continuously requesting or transmitting over the channel. This eventually leads a starvation for other nodes in the network with respect to channel access. • Solution: Rate Limiting to the MAC admission control such that the network can ignore excessive requests, thus preventing the energy drain caused by repeated transmissions. • time division multiplexing Continuous Channel Access • A collision occurs when two nodes attempt to transmit on the same frequency simultaneously. • When packets collide, a change will likely occur in the data portion, causing a checksum mismatch at the receiving end. • solution: error-correcting codes . collision
  • 12. Network layer • Depending on the routing algorithm technique, a sinkhole attack tries to lure almost all the traffic toward the compromised node, creating a metaphorical sinkhole with the adversary at the center. • Geo-routing protocols. sinkhole • This attack exploits Hello packets • A laptop class adversary can send this kind of packet to all sensor nodes in the network so that they believe the compromised node belongs to their neighbors. This causes a large number of nodes sending packets to this imaginary neighbor and thus into oblivion. • Authentication is a solution . Such attacks can easily be avoided by verify bi-directionality of a link before taking action based on the information received over that link. Hello Flood
  • 13. Transport layer • An attacker may repeatedly make new connection requests until the resources required by each connection are exhausted or reach a maximum limit. It produces severe resource constraints for legitimate nodes. • solution: each connecting client demonstrate its commitment to the connection by solving a puzzle. Flooding • In this attack, the adversary repeatedly forges messages to one or both end points which request transmission of missed frames. Hence, these messages are again transmitted and if the adversary maintains a proper timing, it can prevent the end points from exchanging any useful information. This will cause a considerable drainage of energy of legitimate nodes in the network in an end less synchronization-recovery protocol. • Solution: authentication of all packets including control fields communicated between De- synchronization
  • 14. Application layer • An attacker might attempt to overwhelm network nodes with sensor stimuli, causing the network to forward large volumes of traffic to a base station. • consumes network bandwidth and drains node energy. • Solution: carefully tuning sensors so that only the specifically desired stimulus • Rate-limiting and efficient data-aggregation algorithms can also reduce these attacks’ effects Overwhelm attack • It involves injecting spurious or replayed packets into the network at leaf nodes. This attack can starve the network of legitimate traffic, because it consumes resources on the path to the base station, thus preventing other nodes from sending data to the base station. • Solution: Combining packet authentication and anti replay protection prevents these attacks. Path –based DOS attack
  • 15. conclusion  WSN needs high level of security due to its harsh environment.  This leads to intense security and survival requirements.  WSN face attacks of different types.  Limited resources of sensors make WSN faces a huge security challenges.  Some challenges are resolved and many haven’t resolved yet or under studying.