security and privacy in wireless sensor networks

14
Based on a research paper by DI MA, UNIVERSITY OF MICHIGAN-DEARBORN GENE TSUDIK, UNIVERSITY OF CALIFORNIA, IRVINE PRESENTED BY : IMRAN AHMED KHAN University of Texas

Upload: imran-khan

Post on 05-Dec-2014

2.016 views

Category:

Technology


7 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Security and privacy in Wireless Sensor Networks

Based on a research paper byDI MA, UNIVERSITY OF MICHIGAN-DEARBORN

GENE TSUDIK, UNIVERSITY OF CALIFORNIA, IRVINE

PRESENTED BY : IMRAN AHMED KHANUniversity of Texas

Page 2: Security and privacy in Wireless Sensor Networks

Wireless communication is playing an increasingly important role in many spheres of society. It has become an essential means of communication. Recent advances in technology have motivated new application domains for wireless networks. The purpose of this article is to examine security and privacy issues in some new and emerging types of wireless networks, and attempt to identify directions for future research.

Page 3: Security and privacy in Wireless Sensor Networks

In this article we consider security and privacy issues in certain emerging wireless networks:

Wireless sensor networks (WSN) Vehicular ad hoc networks (VANET)

Page 4: Security and privacy in Wireless Sensor Networks

Wireless networks are inherently more vulnerable than their wired counterparts. Notable factors contributing to security problems include the following:

Channel - Wireless usually involve broadcast communication, which makes eavesdropping and jamming easier.

Mobility - If a wireless device is affiliated with a person, tracking the device reveals that person's location. Thus privacy become a important concern.

Page 5: Security and privacy in Wireless Sensor Networks

Resources – End host usually battery powered devices which limits computation, size of RAM and secondary storage. which open the door of denial of service attacks at battery depletion

Accessibility- Some devices are generally left unattended and are places in remote locations. which increases more chances for physical attacks.

Page 6: Security and privacy in Wireless Sensor Networks

The original motivation for WSN research stemmed from the vision of Smart Dust in the late 1990s

It consists of large number of small cheap resource constraint sensors and a sink or base stations

Easy to deploy Use in military , environmental, disaster

relief and homeland security

Page 7: Security and privacy in Wireless Sensor Networks
Page 8: Security and privacy in Wireless Sensor Networks

Constant presence of a sink Limited life span

To resolve above issues, two new WSN introduced:

Unattended WSN ( UWSN ) Radio frequency identification ( RFID )

Page 9: Security and privacy in Wireless Sensor Networks

Unattended WSNs operate without continuouspresence of (or supervision by) a sink. Instead,sensor-collected data is harvested by an itinerantsink that visits the network intermittently, with acertain upper bound on the interval betweensuccessive visits. Because sensors cannotCommunicate with the sink at will, they must

accumulate data in situ and wait for the sink. The

unattended nature of the network might be promoted

by some design requirements to avoid anycentral point of failure.

Page 10: Security and privacy in Wireless Sensor Networks

Data Protection at individual sensor - The main challenge is to protect the data on individual sensor from the attacker. To attained this encryption is used. So that even if the attacker get control on the sensor, it cannot decrypt the data. this is attained by periodically updating secret keys through One way function ( hash functions )

Data Survival - To acheive data survival sensor plays a hide & seek game by moving all of its data around the network. This is ultimately a losing game unless encryption is used.

Page 11: Security and privacy in Wireless Sensor Networks

Secrecy - The attackers aims to learns sensors secrets in order to decrypt its data later. One of the proposed solution allow sensor to recover from the compromise by simultaneously providing and obtaining help to/from peer sensors.

Authentication - Data obtain by each sensor is authenticated by the sink. So that it can identify that data is modified by any attacker or not. One of the proposed technique involves sensors to co-sign the data of their neighboring nodes. So that if any one of the co-signer is not compromised, sink can verify integrity and authenticity.

Page 12: Security and privacy in Wireless Sensor Networks

Sensors are based on the batteries. If battery runs out , sensor will die.

Rsensors and Rsink. Rsensors are also equipped with energy

harvesting means: solar thermal vibrational

Reduced size.

Page 13: Security and privacy in Wireless Sensor Networks

Presence of Rsink is necessary. Cryptographic operations. RFID Reader Collision Since RFID systems make use of the

electromagnetic spectrum They are relatively easy to jam using energy at the right frequency.

Page 14: Security and privacy in Wireless Sensor Networks

In this article we examine security and privacy issues in some new and emerging wireless networks. In surveying relevant literature, we tried to identify new security and privacy challenges as well as inadequacies of current approaches. Certain challenges arise from the unattended, intermittently connected, and possibly mobile network operation. Consequently, we need to anticipate threats arising from malicious exploitation of such network features and design appropriate security countermeasures. Also, since some emerging wireless networks are ad hoc in nature, infrastructure-independent security and privacy techniques are particularly suitable. Finally, emerging wireless devices such as RSensors motivate the development of new cryptographic primitives and protocols.