cs 265 project secure routing in wireless sensor networks : directed diffusion a study ajay kalambur

17
CS 265 PROJECT CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

Post on 21-Dec-2015

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

CS 265 PROJECTCS 265 PROJECT

Secure Routing in Wireless Sensor Networks : Directed Diffusion a

study

Ajay Kalambur

Page 2: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

OutlineOutline

IntroductionDirected DiffusionAttacksCountermeasures

Page 3: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

IntroductionIntroduction

Array of sensors deployed to monitor real time events

The concepts derived from adhoc networks

Much more energy starved than adhoc networks

Sensor nodes limited battery and memory

Page 4: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

Introduction(contd)Introduction(contd)

Scalability Self Organization Data Collection , aggregation and

processing All protocols must be designed such

that they are energy efficient

Page 5: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

NETWORK ARCHITECTURE(My project)NETWORK ARCHITECTURE(My project)

CLUSTERS OF SENSOR NODES

LOCAL BASESTATION

LOCAL BASESTATION

Page 6: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

Sensor Node ArchitectureSensor Node Architecture

Power Unit(Battery)

Location finding system

TransceiverSensor ADC

SensingUnit

ProcessingUnit

Processor

Storage

Page 7: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

Directed DiffusionDirected Diffusion

Data centric , interest-based routing protocol

Base station or sink node disseminates interest

Gradient established in opposite direction for data flow

Positive and Negative Reinforcements possible

Interests also stored in interest cache at each node

Page 8: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

Diffusion (in molecules)Diffusion (in molecules)

Page 9: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

THE PICTURETHE PICTURE

Page 10: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

Example Interest from Base station Example Interest from Base station or sink nodeor sink node Type=toxin Interval=1s //send every second Duration=50 seconds //for next 50 seconds Rect=[-100,100,250,300]

Page 11: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

Response from sensor node Response from sensor node detecting the eventdetecting the event Type=toxin Instance=mercury Location=[120,225] Intensity=0.6 Confidence=0.7 Timestamp=03:14:45

Page 12: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

Attacks on Directed DiffusionAttacks on Directed Diffusion

Denial of Service -jammingModification and spoofing of

routing infoDropping or selective

forwarding of data

Page 13: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

Denial of ServiceDenial of Service

Page 14: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

Modification and Spoofing of Modification and Spoofing of routing inforouting info

Page 15: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

Dropping or selective forwarding Dropping or selective forwarding of dataof data Previous attack enables malicious node to

get into path of data flow The spoofed positive and negative

reinforcements and spoofed data, Selective forwarding is trivial to achieve

Dropping all packets- similar to node being non existent.

Selective forwarding is a more dangerous security issue

Page 16: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

COUNTERMEASURESCOUNTERMEASURES

Link layer security with each node sharing a unique key with base station

Efficient Symmetric key cryptographic schemes needed

Public key cryptography not possible Defense against internal attacks is very

challenging Routing protocol needs to be designed

carefully

Page 17: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur

ReferencesReferences

[1] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: A Scalable and Robust Communication paradigm for Sensor Networks,” Proc. ACM MobiCom, Boston, MA, pp. 42-49, 2000.

[2]. Chris Karlof and David Wagner, “Secure Routing in Wireless Sensor Networks,” Adhoc Networks, Volume1, Issues 2-3, pp: 293-315, September 2003.