Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Security in wireless sensor network


Published on

ppt includes various operational paradigms,their vulnerabilities & solutions of WSN

Published in: Technology, Business
  • Login to see the comments

Security in wireless sensor network

  1. 1. Security In Wireless Sensor Network <br /> By 09bce053 AditPathak<br /> 09bce057 Mihir Shah<br />
  2. 2. Presentation flow<br />What is WSN?<br />Threats to WSN<br />WSN operational paradigms<br />Key distribution techniques for WSN<br />Various key distribution schemes<br />
  3. 3. INTRODUCTION<br />What is a WSN?<br />A wireless sensor network (WSN) consists of spatially distributed autonomous sensor nodes to monitor physical or environmental conditions, such as temprature,sound,vibration,pressure, motion or pollutants and to cooperatively pass their data through the network to a main location.<br />What are they used for?<br />Ocean and wildlife monitoring.<br />Monitoring of manufactured machinery.<br />Building safety.<br />Earthquake monitoring.<br />Variety of military applications.<br />Medical monitoring and research<br />
  4. 4. Threats to a WSN<br />Passive Information Gathering : The powerful receiver<br /> can passively pick off data.<br />Subversion of a node: Capturing of sensor node & compromised sensor node<br />False node: Robust device which impersonates a sensor node<br />Node Malfunction: Generate inaccurate data,drop the data.Detecion of these nodes is an issue.<br />Node outage: Node stops functioning<br />DoS (Jamming,BlackHole,Resource Exhaustion)<br />
  5. 5. WSN OPERATIONAL PARADIGMS<br />Simple Collection and Transmittal<br />Forwarding<br />Receive and Process Commands<br />Self Organization<br />Data Aggregation<br />
  6. 6. SIMple collection & transmittal<br />Sensor takes periodic measurements & transmit the associated data directly to the collection point.<br />Immediate or scheduled transmission<br />Each node is only concerned with its transmission to base station , which is assumed to be within the range.<br />No routing & co-operation among nodes<br />
  7. 7. Vulnerabilities<br />Jamming<br />Spoofing (Counterfeit data source broadcasts spurious information)<br />Loss of confidentiality due to passive monitoring<br />Physical attacks(capturing of a node & subversion)<br />
  8. 8. Solutions<br />Data encryption(symmetric key)<br />Predeployed keys are shared between & unique to the collection point & individual node.<br />Each node uses its key to encrypt data before transmission & the collection point decrypts the data using the shared key corresponding to that node.<br />Spread spectrum communications may be used to offset efforts to jam the frequency band.<br />Use of temper assistant technologies which may transmit an alert and/or self destruct when tempering is detected. <br />
  9. 9. forwarding<br />Allows sensor nodes far away from collection point to transmit data to neighboring nodes , which in turn forward the data toward the collection point.<br />Forwarding process may span multiple sensor nodes on the path between the source & collection point.<br />Solves the radio range problem presented in the Simple Collection and Transmittal paradigm.<br />
  10. 10. Vulnerabilities<br />Single shared key won’t do<br />Black Hole : Sensor node drops packets<br />Data Corruption: Node modifies the data<br />Resource Exhaustion: Attacker maliciously transmits an inordinate amount of data to be forwarded ,causing the intermediate node(s) to exhaust their power supply.<br />
  11. 11. Solutions<br />System utilizes pre-built headers encrypted under intermediate node’s key. The entire frame is encrypted under senders key and inserted into another frame that is prepended with the pre-built headers and forwards.<br />When intermediate node receives the frame,it strips-off the prepended header and forwards it. At the end it is decrypted by collection point.<br />The algorithm is used to deal with other attacks.<br />The algorithm tracks the absence of expected data from each sensor,quantifies the amount of corrupted data received at the controller from each sensor,and compares those values to acceptable statistical noms.<br />If controller determines a sensor node to be aberrant,it is culled.<br />
  12. 12. Receive and process commands<br />Previous paradigms described many-to-one communication for unsolicited data & may reduce lifetime of WSN due to unnecessary data transmission<br />RPC is one-to-many communication model in which the controller transmits commands to sensor nodes<br />Initially sensor nodes are in idle mode(low power)-controller broadcasts(or unicast) wakeup command- getdatacommand-instruct sensor nodes to idle<br />
  13. 13. Vulnerabilities<br />Authentication of command from controller<br />Integrity of the message received from its neighbors<br />
  14. 14. Solutions<br />Use of shared secrets between the controller and the individual sensor node<br />Distributing encrypted identities of sensor nodes within radio range of controller among the nodes that are beyond the radio range of controller by using pre-built headers as was in Forwarding.<br />
  15. 15. SELF ORGANIZATION<br /><ul><li>It requires that the WSN achieve organizational structure without human intervention.
  16. 16. It consists of three tasks:
  17. 17. Node discovery
  18. 18. Route establishment
  19. 19. Topology maintenance.
  20. 20. Node discovery is made by HELLO-REPLY message.
  21. 21. To ensure continuous connectivity, multiple routes between two nodes are discovered.
  22. 22. Here as new nodes are added or older ones exhaust, the topology is re configuared.</li></li></ul><li>Vulnerabilities<br /><ul><li>Previous attacks seen.
  23. 23. Flooding
  24. 24. Sinkhole attacks.</li></ul>SOLUTIONS<br /><ul><li>Routing information distributed throughout the WSN needs to be encrypted, by an anti-replay mechanism and authentication of source.
  25. 25. Moreover as a sensor contains cryptographic material, it needs to be configured so that tampering will erase the keys and leave the sensor inoperable.</li></li></ul><li>AGGREGATION<br /><ul><li>In previous protocols, the sensors transmit information to the collection point which performs large calculations due to thousands of data streams and causes it to be a bottleneck.
  26. 26. For controlling data streams, we aggregate data within the WSN and transmitting aggregate to the controller.
  27. 27. This results in a substantial energy savings in the WSN.
  28. 28. The operations can include MAX, MIN, AVG, SUM etc. For example, measuring a temperature.</li></li></ul><li>Vulnerabilities<br /><ul><li>Authentication of the downstream peers becomes a necessity.
  29. 29. Here the nodes trust each other. Hence a malicious node can get itself elected as an aggregation point.
  30. 30. The malicious node can throw the data leading to Black holes or corrupt the data and forward it.</li></ul>SOLUTIONS<br /><ul><li>Point to point security allows flexibility but is not scalable.
  31. 31. The only prevailing solution is to have a common key over the whole WSN, which is discussed later.</li></li></ul><li>KEY DISTRIBUTION TECHNIQUES FOR WSN<br /><ul><li>In sensor networks, key distribution is connected with initial communication establishment to bootstrap a secure communication infrastructure from a collection of deployed nodes.
  32. 32. This combined problem of key distribution and secure communication is called the bootstrapping problem.
  33. 33. This is a highly challenging problem due to the limitations of sensor network hardware and software.</li></li></ul><li>BOOTSRAPPING SECURITY IN SENSOR NETWORKS <br /><ul><li>A bootstrapping scheme for network needs to satisfy the following requirements:
  34. 34. Deployed nodes must be able to establish secure node to node communication.
  35. 35. Additional legitimate nodes deployed at a later time can form secure connections with already deployed nodes.
  36. 36. Unauthorized nodes should not be able to gain entry into the network, either through packet injection or masquerading as a legitimate node.
  37. 37. The scheme must work through prior knowledge of which nodes will come into communication range of each other.
  38. 38. The computational and storage requirement of the scheme must be robust to DoS attacks from out of network sources.</li></li></ul><li>EVALUATION METRICES<br /><ul><li>There are some criteria as under that represent desirable characteristics in a bootstrapping scheme for sensor network :
  39. 39. Resilience against node capture:Protection against the capture of node by an adversary.
  40. 40. Resistance against node replication:Whether the node can insert hostile nodes into the network after obtaining some secret information.
  41. 41. Revocation: Whether a misbehaving node can be dynamically removed from the system.
  42. 42. Scalability: As the number of nodes in network grows, the security characteristics mentioned above may be weakened.</li></li></ul><li>VARIOUS KEY DISTRIBUTION SCHEMES<br /><ul><li>USING A SINGLE NETWORK WIDE KEY.
  44. 44. USING PAIRWISE KEYS.</li></li></ul><li>SINGLE NETWORK WIDE KEY<br /><ul><li>Pre load a network with any neighboring nodes that also possess the shared network key.
  45. 45. This can be achieved simply by the encrypting all communications in the shared network-wide key and appending message authentication codes(MACs) to ensure integrity.</li></li></ul><li>PROPERTIES<br /><ul><li>Minimal memory storage required.
  46. 46. No additional protocol steps are necessary.
  47. 47. Resistant against DoS, packet injection.</li></ul>DRAWBACKS<br /><ul><li>If a single node is compromised entire network loses all its security properties.
  48. 48. Nodes are tamper resistant.
  49. 49. No new nodes are ever added to the system after deployment.</li></li></ul><li>ASYMMETRIC CRYPTOGRAPHY<br /><ul><li>Also known as public key methods.
  50. 50. Prior to deployment, a master public/private keypair is generated. Then for every node keypair is generated. Both keys stored in respective node along with master’s signature on nodes keypair.
  51. 51. Nodes can communicate by key exchanges and verification through master’s signature on them.
  52. 52. By this a symmetric link is generated.</li></li></ul><li>PROPERTIES<br /><ul><li>Perfectly resilient against node capture.
  53. 53. Possible to revoke known compromised keypairs.
  54. 54. Fully scalable</li></ul>DRAWBACKS<br /><ul><li>Dependence of asymmetric key cryptographic hardware or software.
  55. 55. Vulnerability to Denial-of-Service.
  56. 56. No resistance against node replication.</li></li></ul><li>PAIRWISE KEYS<br /><ul><li>In this approach, every node in the sensor network shares a unique symmetric key with every other node in the network.
  57. 57. Hence in a network of n nodes, there are a total nC2 unique keys.
  58. 58. Every node stores n-1 keys, one for each other node.
  59. 59. After deployment, nodes must perform key discovery to verify the identity of the node they are communicating with.</li></li></ul><li>PROPERTIES<br /><ul><li>Perfect resilience to node capture.
  60. 60. Compromised keys can be revoked.
  61. 61. Only uses symmetric cryptography.</li></ul>DRAWBACKS<br /><ul><li>Main drawback is poor scalability.
  62. 62. Number of keys to be stored in each node is proportional to number of nodes.
  63. 63. Eg. For 80 bit key and 100 nodes, each node requires 1kB memory.</li></li></ul><li>THANK You<br />