protocol mechnism for security ppt
Post on 25-Jul-2015
44 Views
Preview:
TRANSCRIPT
SEMINAR REPORT ON Protocols and
mechanisms for security
Presented by SANJAY . D .
DHANDARE
Guided by Prof. saniya ansari mam
10,oct,2014
DYPSOE PUNE
Department of
Electronics and telecommunication Engg.
CONTENT INTRODUCTION.
What is protocol.
What is protocol mechanism.
What is network security.
Fundamentals of network security.
What it means?
Attacks on security network.
Mechanism for security.
Protocols for security.
Conclusion.
References.
INTRODUCTION
What is a Sensor Network ?A heterogeneous system combining tiny sensors and
actuators with general-purpose computing elements. Most consisting of hundreds or thousands of low-power, low-cost nodes deployed to monitor and affect the environment.
What are they used for? Ocean and wildlife monitoring. Monitoring of manufactured machinery. Building safety. Earthquake monitoring. Variety of military applications. Medical monitoring and research.
What is protocol?
PROTOCOL
“set of rules commonly employ for proper communication in between sender and receiver in every wireless sensor network.
What is protocol mechanism?
The mechanism in which different
protocol performs their well defined
task for healthy communication in
the sensor network.
This is the key term used in every
network to protect from different
attacks.
What is network security?
Network security is nothing but the
collection of all policies,
mechanisms and services that
afford a network which required
protection from unauthorised
access.
Fundamentals of network security
The network is said to be secure if it have,
Confidentiality.
Integrity.
Availability.
What it means?
DATA CONFIDENTIALITY – data leakage to
neighboring networks must be prevent.
DATA INTEGRITY – transmission data cannot be
modified.
AVAILABILITY–network able to work at any
time.
DATA AUTHENTICATION – verification of
sender/receiver.
Attacks on security
Following are the different attacks on
security:
Denial-of-service.
Routing attacks.
Data aggregation attacks.
Privacy attacks.
Denial-of-service attacks
Attempt to stop network from proper functioning.
Disturbed the service provided by the network.
It may occur at various layer of protocol :
physical layer Dos.Data link layer Dos.
Routing attacks
What happen?Data is forwarded along one or more
routes.
EFFECT:
Traffic increases at node and as a result packets (data) can not reaches to destination.
Examples of routing attacks
Blackhole attack.
Rushing attacks.
Sinkhole attacks.
Sybil attack.
Wormhole attack
Data aggregation attacks.
Reducing frequency of operation.Reducing packets size.Replacing real measurement by fake
readings.
Privacy attacks
May introduce by accessing the data
store at node.
May occur at node which perform
more activity.
The traffic analysis can be used to
identify the important nodes.
Mechanism for security
Cryptography :Cryptography is a method of storing
and transmitting data in a particular form so that only those for whom it is intended can read and process.
The term plaintext is often used which means ordinary text sometimes referred as cipher text called as encryption and back again called decryption
Symmetric and public key cryptography
SYMMETRIC CRYPTOGRAPHY:A encryption system in which the
sender and receiver of a messages share a single key that is used to encrypt and descrypt the data.
PUBLIC KEY CRYPTOGRAPHY;
It uses two keys a public key to encrypt the massage and a private key to descrypt them.
Symmetric cryptography
Key management
It is nothing but reliable and secure establishment of shared keys among neighbouring nodes in a network.
In this approach every sensor shares different pairwise key with each other. Hence the sensor network can be represented as matrix with rows and column.
example
Defence again attacks
Dos attacks.
Aggregation attacks.
Routing attacks
Security protocols
Encryption protocol.
Same message is encrypted differently at each time.
tinySec protocol.
It supports two mechanism :
Authentication encryption.
Authentication only.
Localized encryption and Authentication protocol.
Localized encryption and Authentication protocol.
It provide four keying mechanism as follows,
Individual key .
Group key.
Cluster key.
Pairwise key.
*** CONCLUSION ***
from above discussion we conclude
that the security is a important issue
in a wireless sensor network and can
be introduced by using a standard
protocol and mechanism to prevent
unauthorised access.
References
Dargie w and poellabaur fundamentals of wireless sensor networks :theory and practise john wiley and sons 2010 .
Protocols and architectures for wireless sensor networks holger karl andreas willig 2007.
And E-journals .
ANY QUERIES…
THANK YOU
top related