SlideShare a Scribd company logo
1 of 21
SECURITY IN WSN
By Gaurav Kumar
PROBLEMS APPLYING TRADITIONAL NETWORK SECURITY TECHNIQUES
• Sensor devices are limited in their energy, computation, and
communication capabilities
• Sensor nodes are often deployed in open areas, thus allowing
physical attack
• Sensor networks closely interact with their physical environments
and with peoples, posing new security problems.
WHY HIGH SECURITY LEVEL IS NEEDED?
• Have many applications in military and homeland.
• Could be deployed in hostile environments.
• Could be deployed in uncontrolled environment.
• Wireless communication facilitates eavesdropping.
• Often monitor their surroundings, so it is easy to deduce extra
unwanted information results in privacy violation.
WSN SECURITY CHALLENGES
• Conflicting between minimization of resource consumption
and maximization of security level.
• Advanced anti-jamming techniques are impossible due
to its complex design and high energy consumption. .
• Ad-hoc topology facilitates attackers of different types
and from different directions.
• Most current standard security protocols do not scale to
a large number of participants.
WSN SECURITY CHALLENGES
• Encryption requires extra processing, memory and
battery power.
• Although sensors location information are important
most of current proposal are suitable for static WSNs.
• Most existing time synchronization schemes are
vulnerable to several attacks.
TAXONOMY OF ATTACKS IN WSN.
1. BASED ON CAPABILITY OF THE ATTACKER
• Outsider versus insider attacks.
• Passive versus active attacks.
• Mote-class versus laptop-class attacks.
2. BASED ON ATTACKS ON INFORMATION IN
TRANSIT.
• Interruption.
• Interception.
• Modification.
• Fabrication.
3. BASED ON PROTOCOL STACK.
This protocol stack combines power and routing awareness.
3.1. PHYSICAL LAYER ATTACKS.
• Attacks:
1. Device Tampering.
2. Eavesdropping.
3. Jamming.
• Solutions:
1. Access Restriction
2. Encryption.
3.2. DATA LINK LAYER ATTACKS.
• Attacks:
1. Traffic Manipulation.
2. Identity Spoofing.
ex. Sybil attack.
• Solutions:
1. Misbehavior Detection.
2. Identity Protection
3.3. NETWORK LAYER ATTACKS.
• Attacks:
1. False Routing.
2. Black Hole.
3. Sinkhole
• Solutions:
1. Routing Access Restriction.
2. False Routing Information Detection.
3.4. TRANSPORT LAYER ATTACKS.
• Attacks:
1. Flooding.
2. De-synchronization Attacks.
Solutions:
1. Limit number of connections from a particular node.
2. Header or full packet authentication.
3.5. APPLICATION LAYER ATTACKS.
• Attacks:
1. Selective Message Forwarding.
2. Data Aggregation Distortion.
Solutions:
1. Data Integrity Protection.
2. Data Confidentiality Protection.
IEEE 802.15.4 SECURITY
• The IEEE 802.15.4 specification [1] defines MAC layer and physical
layer (PHY) targeted for the Low Rate Wireless Personal Area
Networks (LR-WPAN) using short distance applications with low
power consumption and low cost communication networks,
particularly for the short-range applications such as wireless
sensor networks, residential/industrial setting networks, etc.
• The IEEE 802.15.4 specification supports many applications with
MAC security requirements. If the networks are not secured,
confidentiality, privacy, and integrity could be compromised.
ZIG-BEE
ZigBee is a technological standard, based on IEEE 802.15.4
standard, which was created specifically for control and sensor
networks.
•ZigBee has been designed to transmit slowly. It has a data
rate of 250kbps (kilobits per second).
•Low in cost ,complexity & power consumption as compared to
competing technologies.
•Intended to network inexpensive devices
•Data rates touch 250Kbps for 2.45Ghz ,40 Kbps 915Mhz and
20Kbps for 868Mhz band.
ZIGBEE GENERAL CHARACTERISTICS
Data rates of 20 kbps and up to 250 kbps
• Star or Peer-to-Peer network topologies
• Support for Low Latency Devices
• CSMA-CA Channel Access
• Handshaking
• Low Power Usage consumption
• 3 Frequencies bands with 27 channels
• Extremely low duty-cycle (<0.1%)
WHAT DOES ZIGBEE DO?
• Designed for wireless controls and sensors
• Operates in Personal Area Networks (PAN’s)
and device-to-device networks
• Connectivity between small packet devices
• Control of lights, switches, thermostats,
appliances, etc.
ZIG-BEE DEVICE TYPES
There are three different types of ZigBee devices:
1. ZigBee coordinator (ZC): The most capable device, the coordinator forms the root
of the network tree and might bridge to other networks. There is exactly one ZigBee
coordinator in each network since it is the device that started the network originally.
It is able to store information about the network, including acting as the Trust
Centre & repository for security keys.
2. ZigBee Router (ZR): As well as running an application function, a router can act as
an intermediate router, passing on data from other devices.
3. ZigBee End Device (ZED): Contains just enough functionality to talk to the parent
node (either the coordinator or a router); it cannot relay data from other devices.
This relationship allows the node to be asleep a significant amount of the time
thereby giving long battery life. A ZED requires the least amount of memory, and
therefore can be less expensive to manufacture than a ZR or ZC.
CONCLUSION.
• WSN needs high level of security due to its harsh environment.
• This leads to intense security and survival requirements.
• WSN face attacks of different types.
• Limited resources of sensors make WSN faces a huge security
challenges.
• Some challenges are resolved and many haven’t resolved yet
or under studying.
BY GAURAV KUMAR

More Related Content

What's hot

Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Side channel attacks
Side channel attacksSide channel attacks
Side channel attacksStefan Fodor
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Ali Habeeb
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 

What's hot (20)

Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Side channel attacks
Side channel attacksSide channel attacks
Side channel attacks
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 

Similar to Security in Wireless Sensor Network

11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSijwmn
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509IJMER
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksJahan Zeb Xebi
 

Similar to Security in Wireless Sensor Network (20)

Wsn
WsnWsn
Wsn
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
D0961927
D0961927D0961927
D0961927
 
S04404116120
S04404116120S04404116120
S04404116120
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networks
 
Paper1
Paper1Paper1
Paper1
 

Recently uploaded

Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 

Recently uploaded (20)

Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 

Security in Wireless Sensor Network

  • 1. SECURITY IN WSN By Gaurav Kumar
  • 2. PROBLEMS APPLYING TRADITIONAL NETWORK SECURITY TECHNIQUES • Sensor devices are limited in their energy, computation, and communication capabilities • Sensor nodes are often deployed in open areas, thus allowing physical attack • Sensor networks closely interact with their physical environments and with peoples, posing new security problems.
  • 3. WHY HIGH SECURITY LEVEL IS NEEDED? • Have many applications in military and homeland. • Could be deployed in hostile environments. • Could be deployed in uncontrolled environment. • Wireless communication facilitates eavesdropping. • Often monitor their surroundings, so it is easy to deduce extra unwanted information results in privacy violation.
  • 4. WSN SECURITY CHALLENGES • Conflicting between minimization of resource consumption and maximization of security level. • Advanced anti-jamming techniques are impossible due to its complex design and high energy consumption. . • Ad-hoc topology facilitates attackers of different types and from different directions. • Most current standard security protocols do not scale to a large number of participants.
  • 5. WSN SECURITY CHALLENGES • Encryption requires extra processing, memory and battery power. • Although sensors location information are important most of current proposal are suitable for static WSNs. • Most existing time synchronization schemes are vulnerable to several attacks.
  • 7. 1. BASED ON CAPABILITY OF THE ATTACKER • Outsider versus insider attacks. • Passive versus active attacks. • Mote-class versus laptop-class attacks.
  • 8. 2. BASED ON ATTACKS ON INFORMATION IN TRANSIT. • Interruption. • Interception. • Modification. • Fabrication.
  • 9. 3. BASED ON PROTOCOL STACK. This protocol stack combines power and routing awareness.
  • 10. 3.1. PHYSICAL LAYER ATTACKS. • Attacks: 1. Device Tampering. 2. Eavesdropping. 3. Jamming. • Solutions: 1. Access Restriction 2. Encryption.
  • 11. 3.2. DATA LINK LAYER ATTACKS. • Attacks: 1. Traffic Manipulation. 2. Identity Spoofing. ex. Sybil attack. • Solutions: 1. Misbehavior Detection. 2. Identity Protection
  • 12. 3.3. NETWORK LAYER ATTACKS. • Attacks: 1. False Routing. 2. Black Hole. 3. Sinkhole • Solutions: 1. Routing Access Restriction. 2. False Routing Information Detection.
  • 13. 3.4. TRANSPORT LAYER ATTACKS. • Attacks: 1. Flooding. 2. De-synchronization Attacks. Solutions: 1. Limit number of connections from a particular node. 2. Header or full packet authentication.
  • 14. 3.5. APPLICATION LAYER ATTACKS. • Attacks: 1. Selective Message Forwarding. 2. Data Aggregation Distortion. Solutions: 1. Data Integrity Protection. 2. Data Confidentiality Protection.
  • 15. IEEE 802.15.4 SECURITY • The IEEE 802.15.4 specification [1] defines MAC layer and physical layer (PHY) targeted for the Low Rate Wireless Personal Area Networks (LR-WPAN) using short distance applications with low power consumption and low cost communication networks, particularly for the short-range applications such as wireless sensor networks, residential/industrial setting networks, etc. • The IEEE 802.15.4 specification supports many applications with MAC security requirements. If the networks are not secured, confidentiality, privacy, and integrity could be compromised.
  • 16. ZIG-BEE ZigBee is a technological standard, based on IEEE 802.15.4 standard, which was created specifically for control and sensor networks. •ZigBee has been designed to transmit slowly. It has a data rate of 250kbps (kilobits per second). •Low in cost ,complexity & power consumption as compared to competing technologies. •Intended to network inexpensive devices •Data rates touch 250Kbps for 2.45Ghz ,40 Kbps 915Mhz and 20Kbps for 868Mhz band.
  • 17. ZIGBEE GENERAL CHARACTERISTICS Data rates of 20 kbps and up to 250 kbps • Star or Peer-to-Peer network topologies • Support for Low Latency Devices • CSMA-CA Channel Access • Handshaking • Low Power Usage consumption • 3 Frequencies bands with 27 channels • Extremely low duty-cycle (<0.1%)
  • 18. WHAT DOES ZIGBEE DO? • Designed for wireless controls and sensors • Operates in Personal Area Networks (PAN’s) and device-to-device networks • Connectivity between small packet devices • Control of lights, switches, thermostats, appliances, etc.
  • 19. ZIG-BEE DEVICE TYPES There are three different types of ZigBee devices: 1. ZigBee coordinator (ZC): The most capable device, the coordinator forms the root of the network tree and might bridge to other networks. There is exactly one ZigBee coordinator in each network since it is the device that started the network originally. It is able to store information about the network, including acting as the Trust Centre & repository for security keys. 2. ZigBee Router (ZR): As well as running an application function, a router can act as an intermediate router, passing on data from other devices. 3. ZigBee End Device (ZED): Contains just enough functionality to talk to the parent node (either the coordinator or a router); it cannot relay data from other devices. This relationship allows the node to be asleep a significant amount of the time thereby giving long battery life. A ZED requires the least amount of memory, and therefore can be less expensive to manufacture than a ZR or ZC.
  • 20. CONCLUSION. • WSN needs high level of security due to its harsh environment. • This leads to intense security and survival requirements. • WSN face attacks of different types. • Limited resources of sensors make WSN faces a huge security challenges. • Some challenges are resolved and many haven’t resolved yet or under studying.