SlideShare a Scribd company logo
1 of 21
SECURE ROUTING IN WIRELESS
SENSOR NETWORKS
ATTACKS AND COUNTERMEASURES
A.MUQEED
11011A0449
CONTENTS:
• Introduction
• Sensor Networks vs Ad-Hoc Networks
• Problem statement
• Attacks on sensor network routing
• Countermeasures
• Future Enhancements
• Conclusion
• References
Introduction
• Propose security goals for routing in wireless Sensor networks.
• Show how certain attacks against Ad-hoc networks and peer-to-peer
networks can be adapted into more powerful attacks against sensor
networks.
• Provide a list of attacks and their countermeasures.
• Sensor Network: Heterogeneous system consisting of tiny sensors and
actuators having some computing elements.
• When all the wireless sensor nodes are connected in a network, they form a
wireless sensor network.
• Hence, Wireless Sensor Networks are heterogeneous systems containing
many small devices called sensor nodes and actuators with general-purpose
computing elements.
• WSN’s facilitate monitoring and controlling of physical environments from
remote locations that could be difficult or dangerous to reach.
• Base Station:
– Point of centralized control
– Gateway to another network, powerful data processing unit, or point of
human interface
– More processing capability, memory & power
• Aggregation points: Node at which the messages are processed before
sending to base station.
Sensor N/w vs Ad-Hoc N/w
• Similarity: The dominant communication method in both is multi-hop
networking.
• Differences:
I. Ad-Hoc networks support routing between any pair of nodes, whereas
sensor networks support specialized communication pattern like Many-to-
one, One-to-many, Local communication.
II. Nodes in sensor networks are more resource constrained than Ad-Hoc
networks.
III. Higher level of trust relationship among sensor nodes. In-network
processing, aggregation, duplication elimination.
Problem Statement
• Before discussing about each attack on routing protocol and its
countermeasure a clear view about routing security problem is required.
• Network Assumptions:
-> Insecure radio links.
-> Malicious node collude to attack the system.
-> No tamper resistance on nodes.
-> Adversary can access all key material, data, and code stored on the
captured node.
• Trust Requirements:
-> Base stations are trustworthy.
-> Aggregation points not necessarily trustworthy.
• Threat Models : 2 types
-> Based on device capability
– Mote-class attacker  Access to few sensor nodes.
– Laptop-class attacker  Access to more powerful devices. Have more battery
power, better CPU, sensitive antenna, powerful radio Tx, etc.
-> Based on attacker type / attacker location
– Outside attacks  attacker external to the network.
– Inside attacks  Authorized node in the network is malicious/compromised.
• Security Goals
– Secure routing protocol should guarantee integrity, authenticity, availability
of messages in presence of adversaries.
– Secrecy of application data is must.
Attacks on sensor network routing
• By Spoofing, Altering, or Replaying
routing information:
-> Attacker can create loops, attract or
repel network traffic, generate false
message, partition network, induce delay,
etc.
• Selective forwarding:
-> Malicious node forwards only some
messages, drop others.
-> Attacker tries to be on the actual path
of data flow, if it’s a neighboring node,
then it causes collision on each forwarded
packet of interest in order to include itself
on data flow path.
• Sinkhole Attacks:
– Main Reason : Specialized communication
patterns supported by wsn; All packets
have same destination i.e. base station.
– Adversary tries to attract traffic from a
particular area to pass through a
compromised node, thereby creating
sinkhole with adversary at the center.
– A compromised node may be made to look
attractive to neighbors in some routing
algorithm
– Laptop class adversary provide a high
quality route to base station by
transmitting at high power which will cause
the neighboring nodes to forward packets
through the adversary.
• Sybil Attack:
-> Single node presents multiple identities to other
nodes.
-> Significantly affect fault-tolerance schemes like
distributed storage, multi-path routing, topology
maintenance.
-> Threat to geographical routing protocols.
• Wormholes:
-> Transfer of packets from sender to receiver occurs
through a low latency route formed by creation of
wormhole.
-> This poses a threat to routing protocols which rely
heavily on geographic locations and proximity.
-> Selective forwarding and sinkhole attacks can be
launched from wormhole.
• HELLO flood attack:
-> Some protocols require that nodes
broadcast ‘HELLO’ packets to advertise
themselves.
-> Laptop-class attacker can convince every
node that it is their neighbor by
transmitting at high power.
-> Target nodes attempts to reply, but the
adversary is out of range.
->This creates a state of confusion in the
network
Attack on LEACH protocol
• Low Energy Adaptive Clustering Hierarchy ("LEACH") is a TDMA-
based MAC protocol which is integrated with clustering in wireless sensor
networks (WSNs).
• The goal of LEACH is to lower the energy consumption required to create and
maintain clusters in order to improve the life time of a wireless sensor network.
• In LEACH nodes transmit to cluster heads, and the cluster heads aggregate and
compress the data and forward it to the base station(sink).
Attack:
• Since nodes choose a cluster-head based on received signal strength, an
adversary can disable the entire network by using HELLO flood attack.
• Every node will choose the adversary as its cluster head and the adversary now
can use selective forwarding attack to modify the node data.
• Simple countermeasure like changing the cluster-head for each round will easily
be compromised by Sybil attack.
Countermeasures
• Outsider attack and link layer security
-> Outside attackers can be reduced by link layer security and authentication using
a global shared key.
-> Sybil, Sinkhole, Selective forwarding attacks can be restricted as node doesn’t
accept identity of adversary and the adversary is prevented from joining
topology.
-> Ineffective against Insider attacks like wormhole, Hello flood attacks.
• Sybil attack
-> Every node shares a unique symmetric key with the base station.
-> Then two nodes generate pair-wise shared secret key between them (Needham
– Schroeder symmetric key exchange) for ‘Identity verification’
-> Limit the number of neighbors for a node  prevent adversary from
establishing shared keys with everyone.
• HELLO flood attack
-> Verification of bidirectionality of a link before taking meaningful action using Identity
verification protocol.
-> Nodes are connected to limited verified neighbors, so even with a high sensitive
adversary the compromise of nodes is not on a large segment of network.
• Wormhole and Sinkhole attacks
-> Very difficult to defend when two are used in combination as wormholes use out-of-
bound channels invisible to networks.
-> Whereas sinkholes are difficult to defend against protocols using advertising
information.
-> Good protocol design is required to avoid these attacks.
Eg: Geographic routing protocol can be used to avoid wormhole and sinkhole attacks as
it is a location based protocol.
>> Initiation is not from base station and the traffic is naturally routed towards physical
location of base station hence difficult to create a wormhole and sinkhole.
• Selective forwarding
-> Use Multipath Routing; messages routed over disjoint paths.
-> Messages routed on n disjoint paths protected against selective forwarding offer
probabilistic protection when over n nodes are compromised.
Future Enhancements
• This survey on attacks and countermeasures in wireless sensor network
routing protocols will help in better design of routing protocols at
development stage.
• If design of routing protocols satisfies the proposed security goals then
effective defending against adversaries will be achieved.
Conclusion
• Different security problems in sensor networks.
• Different types of attacks on the sensor networks from inside attackers
and outside attackers.
• Countermeasures to avoid the occurrence of these attacks.
• Hence, Protocols developed for routing in wireless sensor networks must
be designed with security features in view.
References:
1. Chris Karlof and David Wagner, Secure routing in wireless sensor networks:
Attacks and countermeasures, University of california, Berkeley, IEEE 2003.
2. K.Venkatraman, J.Vijay Daniel, G.Murugaboopathi, Various attacks in Wireless
Sensor network: Survey, VelTech group of institution, IJSCE, March 2013.
3. Aashima Singla, Ratika Sachdeva, Review on Security Issues and Attacks in
Wireless Sensor Networks, Department of CSE Sri Guru Granth Sahib World
University, IJARCSSE, April 2013.
4. J.Steffi Agino, Priyanka, S.Tephillah, A.M.Balamurugan, Attacks and
countermeasures in WSN, St. Joseph’s College of Engineering, Chennai, Tamil
Nadu, IPASJ, January 2014.
5. I. R. Uouceur, "The Sybil Attack:' in 1st lnternational Workshop on Peer-to-
Peer Systems (IPTPS '0202). March 2002.
THANKYOU

More Related Content

What's hot

Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksVarsha Anandani
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manetKunal Prajapati
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 

What's hot (18)

Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Ids presentation
Ids presentationIds presentation
Ids presentation
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 

Viewers also liked

Como ser um Hacker Ético Profissional
Como ser um Hacker Ético ProfissionalComo ser um Hacker Ético Profissional
Como ser um Hacker Ético ProfissionalStrong Security Brasil
 
Oracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesOracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesBrian Huff
 
Patent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignPatent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignYosuke Sakai
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação CyberpunkOrlando Simões
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Antivirus Evasion Techniques and Countermeasures
Antivirus  Evasion Techniques and CountermeasuresAntivirus  Evasion Techniques and Countermeasures
Antivirus Evasion Techniques and Countermeasuressecurityxploded
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogenswarwick_amr
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Jeremiah Grossman
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldJason Edelstein
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresAmerican Astronautical Society
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011International Atomic Energy Agency
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingpolichen
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaCampus Party Brasil
 

Viewers also liked (20)

Como ser um Hacker Ético Profissional
Como ser um Hacker Ético ProfissionalComo ser um Hacker Ético Profissional
Como ser um Hacker Ético Profissional
 
Oracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesOracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best Practices
 
Patent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignPatent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction Design
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Apresenta cyber (2)
Apresenta cyber (2)Apresenta cyber (2)
Apresenta cyber (2)
 
Formulario 3C
Formulario 3CFormulario 3C
Formulario 3C
 
Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação Cyberpunk
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Antivirus Evasion Techniques and Countermeasures
Antivirus  Evasion Techniques and CountermeasuresAntivirus  Evasion Techniques and Countermeasures
Antivirus Evasion Techniques and Countermeasures
 
Formulario 3C
Formulario 3CFormulario 3C
Formulario 3C
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogens
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
 

Similar to Secure routing in wsn-attacks and countermeasures

eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Unit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfUnit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfMathavan N
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networksPriya Kaushal
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkTarun Varshney
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networksProf. Dr. Noman Islam
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksJahan Zeb Xebi
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSVTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSvtunotesbysree
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSijwmn
 
A Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkA Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkIRJET Journal
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network securityaibad ahmed
 

Similar to Secure routing in wsn-attacks and countermeasures (20)

eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
Unit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfUnit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdf
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
D0961927
D0961927D0961927
D0961927
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Paper1
Paper1Paper1
Paper1
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networks
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSVTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
 
A Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkA Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc Network
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network security
 

Recently uploaded

Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 

Recently uploaded (20)

Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 

Secure routing in wsn-attacks and countermeasures

  • 1. SECURE ROUTING IN WIRELESS SENSOR NETWORKS ATTACKS AND COUNTERMEASURES A.MUQEED 11011A0449
  • 2. CONTENTS: • Introduction • Sensor Networks vs Ad-Hoc Networks • Problem statement • Attacks on sensor network routing • Countermeasures • Future Enhancements • Conclusion • References
  • 3. Introduction • Propose security goals for routing in wireless Sensor networks. • Show how certain attacks against Ad-hoc networks and peer-to-peer networks can be adapted into more powerful attacks against sensor networks. • Provide a list of attacks and their countermeasures.
  • 4. • Sensor Network: Heterogeneous system consisting of tiny sensors and actuators having some computing elements. • When all the wireless sensor nodes are connected in a network, they form a wireless sensor network. • Hence, Wireless Sensor Networks are heterogeneous systems containing many small devices called sensor nodes and actuators with general-purpose computing elements. • WSN’s facilitate monitoring and controlling of physical environments from remote locations that could be difficult or dangerous to reach.
  • 5. • Base Station: – Point of centralized control – Gateway to another network, powerful data processing unit, or point of human interface – More processing capability, memory & power • Aggregation points: Node at which the messages are processed before sending to base station.
  • 6. Sensor N/w vs Ad-Hoc N/w • Similarity: The dominant communication method in both is multi-hop networking. • Differences: I. Ad-Hoc networks support routing between any pair of nodes, whereas sensor networks support specialized communication pattern like Many-to- one, One-to-many, Local communication. II. Nodes in sensor networks are more resource constrained than Ad-Hoc networks. III. Higher level of trust relationship among sensor nodes. In-network processing, aggregation, duplication elimination.
  • 7.
  • 8. Problem Statement • Before discussing about each attack on routing protocol and its countermeasure a clear view about routing security problem is required. • Network Assumptions: -> Insecure radio links. -> Malicious node collude to attack the system. -> No tamper resistance on nodes. -> Adversary can access all key material, data, and code stored on the captured node. • Trust Requirements: -> Base stations are trustworthy. -> Aggregation points not necessarily trustworthy.
  • 9. • Threat Models : 2 types -> Based on device capability – Mote-class attacker  Access to few sensor nodes. – Laptop-class attacker  Access to more powerful devices. Have more battery power, better CPU, sensitive antenna, powerful radio Tx, etc. -> Based on attacker type / attacker location – Outside attacks  attacker external to the network. – Inside attacks  Authorized node in the network is malicious/compromised. • Security Goals – Secure routing protocol should guarantee integrity, authenticity, availability of messages in presence of adversaries. – Secrecy of application data is must.
  • 10. Attacks on sensor network routing • By Spoofing, Altering, or Replaying routing information: -> Attacker can create loops, attract or repel network traffic, generate false message, partition network, induce delay, etc. • Selective forwarding: -> Malicious node forwards only some messages, drop others. -> Attacker tries to be on the actual path of data flow, if it’s a neighboring node, then it causes collision on each forwarded packet of interest in order to include itself on data flow path.
  • 11. • Sinkhole Attacks: – Main Reason : Specialized communication patterns supported by wsn; All packets have same destination i.e. base station. – Adversary tries to attract traffic from a particular area to pass through a compromised node, thereby creating sinkhole with adversary at the center. – A compromised node may be made to look attractive to neighbors in some routing algorithm – Laptop class adversary provide a high quality route to base station by transmitting at high power which will cause the neighboring nodes to forward packets through the adversary.
  • 12. • Sybil Attack: -> Single node presents multiple identities to other nodes. -> Significantly affect fault-tolerance schemes like distributed storage, multi-path routing, topology maintenance. -> Threat to geographical routing protocols. • Wormholes: -> Transfer of packets from sender to receiver occurs through a low latency route formed by creation of wormhole. -> This poses a threat to routing protocols which rely heavily on geographic locations and proximity. -> Selective forwarding and sinkhole attacks can be launched from wormhole.
  • 13. • HELLO flood attack: -> Some protocols require that nodes broadcast ‘HELLO’ packets to advertise themselves. -> Laptop-class attacker can convince every node that it is their neighbor by transmitting at high power. -> Target nodes attempts to reply, but the adversary is out of range. ->This creates a state of confusion in the network
  • 14. Attack on LEACH protocol • Low Energy Adaptive Clustering Hierarchy ("LEACH") is a TDMA- based MAC protocol which is integrated with clustering in wireless sensor networks (WSNs). • The goal of LEACH is to lower the energy consumption required to create and maintain clusters in order to improve the life time of a wireless sensor network. • In LEACH nodes transmit to cluster heads, and the cluster heads aggregate and compress the data and forward it to the base station(sink). Attack: • Since nodes choose a cluster-head based on received signal strength, an adversary can disable the entire network by using HELLO flood attack. • Every node will choose the adversary as its cluster head and the adversary now can use selective forwarding attack to modify the node data. • Simple countermeasure like changing the cluster-head for each round will easily be compromised by Sybil attack.
  • 15. Countermeasures • Outsider attack and link layer security -> Outside attackers can be reduced by link layer security and authentication using a global shared key. -> Sybil, Sinkhole, Selective forwarding attacks can be restricted as node doesn’t accept identity of adversary and the adversary is prevented from joining topology. -> Ineffective against Insider attacks like wormhole, Hello flood attacks. • Sybil attack -> Every node shares a unique symmetric key with the base station. -> Then two nodes generate pair-wise shared secret key between them (Needham – Schroeder symmetric key exchange) for ‘Identity verification’ -> Limit the number of neighbors for a node  prevent adversary from establishing shared keys with everyone.
  • 16. • HELLO flood attack -> Verification of bidirectionality of a link before taking meaningful action using Identity verification protocol. -> Nodes are connected to limited verified neighbors, so even with a high sensitive adversary the compromise of nodes is not on a large segment of network. • Wormhole and Sinkhole attacks -> Very difficult to defend when two are used in combination as wormholes use out-of- bound channels invisible to networks. -> Whereas sinkholes are difficult to defend against protocols using advertising information. -> Good protocol design is required to avoid these attacks. Eg: Geographic routing protocol can be used to avoid wormhole and sinkhole attacks as it is a location based protocol. >> Initiation is not from base station and the traffic is naturally routed towards physical location of base station hence difficult to create a wormhole and sinkhole.
  • 17. • Selective forwarding -> Use Multipath Routing; messages routed over disjoint paths. -> Messages routed on n disjoint paths protected against selective forwarding offer probabilistic protection when over n nodes are compromised.
  • 18. Future Enhancements • This survey on attacks and countermeasures in wireless sensor network routing protocols will help in better design of routing protocols at development stage. • If design of routing protocols satisfies the proposed security goals then effective defending against adversaries will be achieved.
  • 19. Conclusion • Different security problems in sensor networks. • Different types of attacks on the sensor networks from inside attackers and outside attackers. • Countermeasures to avoid the occurrence of these attacks. • Hence, Protocols developed for routing in wireless sensor networks must be designed with security features in view.
  • 20. References: 1. Chris Karlof and David Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, University of california, Berkeley, IEEE 2003. 2. K.Venkatraman, J.Vijay Daniel, G.Murugaboopathi, Various attacks in Wireless Sensor network: Survey, VelTech group of institution, IJSCE, March 2013. 3. Aashima Singla, Ratika Sachdeva, Review on Security Issues and Attacks in Wireless Sensor Networks, Department of CSE Sri Guru Granth Sahib World University, IJARCSSE, April 2013. 4. J.Steffi Agino, Priyanka, S.Tephillah, A.M.Balamurugan, Attacks and countermeasures in WSN, St. Joseph’s College of Engineering, Chennai, Tamil Nadu, IPASJ, January 2014. 5. I. R. Uouceur, "The Sybil Attack:' in 1st lnternational Workshop on Peer-to- Peer Systems (IPTPS '0202). March 2002.