Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Wireless sensor network security issues

11,440 views

Published on

Published in: Technology
  • If you need your papers to be written and if you are not that kind of person who likes to do researches and analyze something - you should definitely contact these guys! They are awesome ⇒⇒⇒WRITE-MY-PAPER.net ⇐⇐⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • I’ve personally never heard of companies who can produce a paper for you until word got around among my college groupmates. My professor asked me to write a research paper based on a field I have no idea about. My research skills are also very poor. So, I thought I’d give it a try. I chose a writer who matched my writing style and fulfilled every requirement I proposed. I turned my paper in and I actually got a good grade. I highly recommend ⇒ www.HelpWriting.net ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Get the best essay, research papers or dissertations. from ⇒ www.WritePaper.info ⇐ A team of professional authors with huge experience will give u a result that will overcome your expectations.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • How To Pick Out The Best Battery For a Solar Panel System, Battery Bank, or Off-Grid System ➤➤ http://t.cn/AiFAbuQp
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Sex in your area is here: ❤❤❤ http://bit.ly/36cXjBY ❤❤❤
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Wireless sensor network security issues

  1. 1. WSN security issues Presented by: Maha Saad Mohamed
  2. 2. Introduction High level of security is needed in WSN. This leads to need of extra resources.   BUT WSN resources are very limited. Current researches haven’t treat this conflict yet.   SO Special security requirements are needed. WSN security faces a lot of challenges. A lot of research points in this area is open.    2 Sensor network
  3. 3. Agenda Why high security level is needed? Security AND survivability requirements. Taxonomy of attacks. WSN security challenges. Conclusion. 3 Sensor network
  4. 4. Why high security level is needed?  Have many applications in military and homeland.  Could be deployed in hostile environments.  Could be deployed in uncontrolled environment.  Wireless communication facilitates eavesdropping.  Often monitor their surroundings, so it is easy to deduce extra unwanted information results in privacy violation. 4 Sensor network
  5. 5. WSN security AND survivability requirements. run Security in a WSN is extremely important. Moreover, it should be reliably without interruption. Security requirements:        Confidentiality. Authentication. Non-repudiation . Integrity. Freshness Forward and Backward secrecy Survivability requirements:     5 Reliability Availability. Energy efficiency. Sensor network
  6. 6. Taxonomy of attacks. BASED ON Capability of the attacker 6 Attacks on information in transit Sensor network Protocol stack
  7. 7. 1. Based on capability of the attacker  Outsider versus insider attacks.  Passive versus active attacks.  Mote-class versus laptop-class attacks. 7 Sensor network
  8. 8. 2. Based on attacks on information in transit.  Interruption.  Interception.  Modification.  Fabrication. 8 Sensor network
  9. 9. 3. Based on protocol stack. This protocol stack combines power and routing awareness. WSN protocol stack 9 Sensor network
  10. 10. 3.1. Physical layer attacks.  Attacks:     Device Tampering. Eavesdropping. Jamming. Solutions:   10 Access Restriction Encryption. Sensor network
  11. 11. 3.2. Data link layer attacks.  Attacks:   Traffic Manipulation. Identity Spoofing. ex. Sybil attack  Solutions:   11 Misbehavior Detection. Identity Protection Sensor network
  12. 12. 3.3. Network layer attacks.  Attacks:    False Routing. Black Hole.  Sinkhole Solutions:   12 Routing Access Restriction. False Routing Information Detection. Sensor network
  13. 13. 3.3. Transport layer attacks.  Attacks:    Flooding. De-synchronization Attacks. Solutions:   13 Limit number of connections from a particular node. Header or full packet authentication. Sensor network
  14. 14. 3.3. Application layer attacks.  Attacks:    Selective Message Forwarding. Data Aggregation Distortion Solutions:   14 Data Integrity Protection. Data Confidentiality Protection. Sensor network
  15. 15. WSN security challenges (1/3).  Conflicting between minimization of resource consumption and maximization of security level.  Advanced anti-jamming techniques are impossible due to its complex design and high energy consumption. .  Ad-hoc topology facilitates attackers of different types and from different directions.  Most current standard security protocols do not scale to a large number of participants. 15 Sensor network
  16. 16. WSN security challenges (2/3).  Encryption requires extra processing, memory and battery power.  Secure asymmetric key needs more computations.  Although sensors location information are important most of current proposal are suitable for static WSNs. 16 Sensor network
  17. 17. WSN security challenges (3/3).  Most existing time synchronization schemes are vulnerable to several attacks.  Their low costs impedes use of expensive tamperresistant hardware.  Little research has been done in code attestation. 17 Sensor network
  18. 18. Conclusion.  WSN needs high level of security due to its harsh environment.  This leads to intense security and survival requirements.  WSN face attacks of different types.  Limited resources of sensors make WSN faces a huge security challenges.  Some challenges are resolved and many haven’t resolved yet or under studying. 18 Sensor network
  19. 19. References.  T.Kavitha and D.Sridharan, “Security Vulnerabilities In Wireless Sensor Networks: A Survey”, Journal of Information Assurance and SecurityVol. 5, No. 1 pp. 31– 44, 2010.  Yi Qian and Kejie Lu and David Tipper, “A Design For Secure And Survivable Wireless Sensor Networks”, IEEE Wireless Communications , pp. 30 - 37, October 2007.  K. Xing, S. Srinivasan, M. Rivera, J. Li, and X. Cheng, Attacks and Countermeasures in Sensor Networks: A Survey, The George Washington University Technical Report GWU-CSTR-010-05, 2005. 19 Sensor network
  20. 20. Questions 20 Sensor network
  21. 21. 21 Sensor network

×