security issues

21
SECURITY ISSUES IN WIRELESS SENSOR NETWORK

Upload: isaaq-mohammed

Post on 19-Jan-2015

422 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Security issues

SECURITY ISSUES IN WIRELESS SENSOR NETWORK

Page 2: Security issues

CONTENTSIntroduction Feasibility Of Basic Security

Schemes In Wireless Security networking 

Security Threats And Issues In Wireless Security networking

Proposed Security Schemes and Related work

Conclusion References

Page 3: Security issues

1. INTRODUCTION1.1 What is Wireless Sensor Network?

A wireless sensor network (WSN) consists of distributed autonomous sensors to closely monitor physical or environmental conditions( such as temperature, sound, vibration, pressure, motion or pollutants). The applications supported by WSNs vary from monitoring, tracking to controlling.

Page 4: Security issues

2.Feasibility of Basic Security Schemes in Wireless Sensor Networks

2.1 Cryptography2.2 Steganography2.3 Physical layer Secure Access

Page 5: Security issues

CryptographyThe encryption-decryption techniques

devised for the traditional wired networks are not feasible to be applied directly for the wireless networks and in particular for wireless sensor networks .

Applying the security mechanisms such as encryption could also increase delay, jitter and packet loss in wireless sensor networks

Page 6: Security issues

SteganographySteganography aims at hiding the

existence of the message. Steganography is the art of covert

communication by embedding a message into the multimedia data (image, sound, video, etc.).

Page 7: Security issues

Physical layer Secure AccessPhysical layer secure access in wireless

sensor networks could be provided by using frequency hopping.

Important points in physical layer secure access are the efficient design so that the hopping sequence is modified in less time than is required to discover it and for employing this both the sender and receiver should maintain a synchronized clock.

Page 8: Security issues

3. Security Threads and Issues in Wireless Sensor Networks3.1 Attacks in Wireless Sensor Networks

3.1.1 Danial of Service 3.1.2 Attacks on Information in Transit 3.1.3 Sybil Attack 3.1.4 Blackhole/Sinkhole Attack 3.1.5 Helloflood Attack 3.1.6 Wormhole Attack

Page 9: Security issues

Attacks in Wireless Sensor NetworksSecurity attack is a concern for wireless

sensor networks because: Usage of minimal capacity devices in parts of the

systems Physical accessibility to sensor and actuator

devices Wireless communication of the system devices

Page 10: Security issues

3.1.1 Danial of Service Denial of Service (DoS) is produced

by the unintentional failure of nodes or malicious action.

The simplest DoS attack tries to exhaust the resources available to the victim node, by sending extra unnecessary packets and thus prevents legitimate network users from accessing services or resources to which they are entitled

Page 11: Security issues

3.1.2 Attacks on Information in Transit

In a sensor network, sensors monitor the changes of specific parameters or values and report to the sink according to the requirement.

While sending the report, the information in transit may be altered, spoofed, replayed again or vanished.

Page 12: Security issues

3.1.3 Sybil AttackIn many cases, the sensors in a wireless

sensor network might need to work together to accomplish a task, hence they can use distribution of subtasks and redundancy of information.

Page 13: Security issues

3.1.4 Blackhole/Sinkhole attacksIn this attack, a malicious node acts as a

blackhole to attract all the traffic in the sensor network.

Page 14: Security issues

3.1.5 Hello Flood AttackHello Flood Attack is introduced in this

attack uses HELLO packets as a weapon to convince the sensors in WSN

Page 15: Security issues

3.1.6 Wormhole AttackWormhole attack is a critical attack in

which the attacker records the packets (or bits) at one location in the network and tunnels those to another location. The tunneling or retransmitting of bits could be done selectively.

Page 16: Security issues

4.Proposed Security Schemes and Related Work

4.1 Security Schemes for Wireless Sensor Networks

4.2 Holistic Security in Wireless Sensor Networks

Page 17: Security issues

4.1. Security Schemes for Wireless Sensor Networks

Gives an analysis of secure routing in wireless sensor networks. Studies how to design secure distributed sensor networks with multiple supply voltages to reduce the energy consumption on computation and therefore to extend the network’s life time.

Page 18: Security issues

4.2. Holistic Security in Wireless Sensor Networks

A holistic approach aims at improving the performance of wireless sensor networks with respect to security, longevity and connectivity under changing environmental conditions.

Page 19: Security issues

ConclusionMost of the attacks against security in

wireless sensor networks are caused by the insertion of false information by the compromised nodes within the network.

Many of today’s proposed security schemes are based on specific network models.

Even if holistic security could be ensured for wireless sensor networks, the cost-effectiveness and energy efficiency to employ such mechanisms

Page 20: Security issues

References [1]”Wireless Sensor Networks :Issues and challenges”

Department of Computer Engg. Kyung Hee University, Korea www.arxiv.org/pdf/0712.4169&embedded=true

[2] “Security Issues in Wireless Sensor Networks” By:Zoran S. Bojkovic, Bojan M. Bakmaz, and Miodrag R. Bakmazwww.cs.odu.edu/~mukka/cs772f11/Lectures/day9/c-41.pdf

[3]” Journal of Theoretical and Applied Information Technology“www.jatit.org/volumes/research-papers/Vol13No1/3Vol13No1.pdf

[4]” STUDY OF SECURITY ISSUES IN WIRELESS SENSOR NETWORK”By: MANJU.V.C Kerala University, Thiruvananthapuram ,Keralawww.ijest.info/docs/IJEST11-03-10-191.pdf

[5]”Jitter in Networking” en.wikipedia.org/wiki/Jitter

[6] “Wireless Sensor Network”en.wikipedia.org/wiki/Wireless_sensor_network

Page 21: Security issues