introduction to sensor networks

21
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University http://rabieramadan.org [email protected] 4

Upload: quasar

Post on 22-Feb-2016

26 views

Category:

Documents


0 download

DESCRIPTION

Introduction to Sensor Networks. Rabie A. Ramadan, PhD Cairo University http://rabieramadan.org [email protected] 4. Security in WSN. Security Requirements. Availability Authorization and Key Management Data Confidentiality Data Integrity Non-repudiation . - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Introduction to Sensor Networks

Introduction to Sensor Networks

Rabie A. Ramadan, PhDCairo University

http://rabieramadan.org [email protected]

4

Page 2: Introduction to Sensor Networks

Security in WSN

2

Page 3: Introduction to Sensor Networks

3

Security RequirementsAvailability Authorization and Key Management Data Confidentiality Data Integrity Non-repudiation

Page 4: Introduction to Sensor Networks

4

Security Solution Constraints Lightweight Decentralized Reactive Fault-tolerant

Page 5: Introduction to Sensor Networks

5

Challenges No infrastructure Peer-to-peer architecture with multi-

hop routing Mobile device physical vulnerability Stringent resource constraints Wireless medium Node mobility

Page 6: Introduction to Sensor Networks

6

WSN Security Research Fields Routing security Data forwarding security Link layer security Key management

Page 7: Introduction to Sensor Networks

Security issues in WSN The discussed applications require communication in WSN to be

highly secure Main security threats in WSN are:

• Radio links are insecure – eavesdropping / injecting faulty information is possible

• Sensor nodes are not temper resistant – if it is compromised attacker obtains all security information

Attacker types:• Mote-class: attacker has access to some number of nodes with

similar characteristics / laptop-class: attacker has access to more powerful devices

• Outside (discussed above) / inside: attacker compromised some number of nodes in the network

Page 8: Introduction to Sensor Networks

Attacks on WSN Main types of attacks on WSN are:

• Spoofed, altered, or replayed routing information• Selective forwarding • Sinkhole attack• Sybil attack• Wormholes• HELLO flood attacks• Acknowledgment spoofing

Page 9: Introduction to Sensor Networks

False routing information Injecting fake routing

control packets into the network, examples: attract / repeal traffic, generate false error messages.

Consequences: routing loops, increased latency, decreased lifetime of the network, low reliability

B A1

A3A2

A4

Example: captured node attracts traffic by advertising shortest path

to sink, high battery power, etc

Page 10: Introduction to Sensor Networks

Selective forwarding Multi hop paradigm is prevalent in WSN It is assumed that nodes faithfully forward received

messages Compromised node might refuse to forward

packets, however neighbors might start using another route

More dangerous: compromised node forwards selected packets

Page 11: Introduction to Sensor Networks

Sinkhole and Sybil attacks Sinkhole attack:

• Idea: attacker creates metaphorical sinkhole by advertising for example high quality route to a base station

• Laptop class attacker can actually provide this kind of route connecting all nodes to real sink and then selectively drop packets

• Almost all traffic is directed to the fake sinkhole• WSN are highly susceptible to this kind of attack because of the

communication pattern: most of the traffic is directed towards sink – single point of failure.

Sybil attack:• Idea: a single node pretends to be present in different parts of the

network. • Mostly affects geographical routing protocols

Page 12: Introduction to Sensor Networks

Wormholes Idea: tunnel packets

received on one part of the network to another

Well placed wormhole can completely disorder routing

Wormholes may convince distant nodes that they are close to sink. This may lead to sinkhole if node on the other end advertises high-quality route to sink

Page 13: Introduction to Sensor Networks

Wormholes (cont.) Wormholes can exploit routing race conditions which

happens when node takes routing decisions based on the first route advertisement

Attacker may influence network topology by delivering routing information to the nodes before it would really reach them by multi hop routing

Even encryption can not prevent this attack Wormholes may convince two nodes that they are

neighbors when on fact they are far away from each other Wormholes may be used in conjunction with sybil attack

Page 14: Introduction to Sensor Networks

HELLO flood attack Many WSN routing

protocols require nodes to broadcast HELLO packets after deployment, which is a sort of neighbor discovery based on radio range of the node

Laptop class attacker can broadcast HELLO message to nodes and then advertises high-quality route to sink

Page 15: Introduction to Sensor Networks

Acknowledgment spoofing Some routing protocols use

link layer acknowledgments Attacker may spoof acks Goals: convince that weak

link is strong or that dead node is alive.

Consequently weak link may be selected for routing; packets send through that link may be lost or corrupted

Page 16: Introduction to Sensor Networks

Overview of Countermeasures Link layer encryption prevents majority of attacks: bogus

routing information, Sybil attacks, acknowledgment spoofing, etc.

This makes the development of an appropriate key management architecture a task of a great importance

Wormhole attack, HELLO flood attacks and some others are still possible: attacker can tunnel legitimate packets to the other part of the network or broadcast large number of HELLO packets

Multi path routing, bidirectional link verification can also be used to prevent particular types of attacks like selective forwarding, HELLO flood

Page 17: Introduction to Sensor Networks

Key management: goals The protocol must establish a key between all sensor

nodes that must exchange data securely

Node addition / deletion should be supported

It should work in undefined deployment environment

Unauthorized nodes should not be allowed to establish communication with network nodes

Page 18: Introduction to Sensor Networks

Key management: constraints Sensor node constraints:

• Battery power • Computational energy consumption• Communication energy consumption

• Transmission range• Memory• Temper protection• Sleep pattern

Network constraints:• Ad-hoc network nature• Packet size

Page 19: Introduction to Sensor Networks

Key management: evaluation/comparison metrics

Resilience against node capture: how many node are to be compromised in order to affect traffic of not compromised nodes?

Addition: how complicated is dynamic node addition? Revocation: how complicated is dynamically node

revocation? Supported network size: what is the maximum possible

size of the network? Note: since WSN can be used in a lot of different ways it

is not reasonable to look for one key management approach to suite all needs: 20 000 node network deployed from the airplane over a battle field has quite different requirements from 10 node network installed to guard the perimeter of the house

Page 20: Introduction to Sensor Networks

Key management approaches classification

Page 21: Introduction to Sensor Networks

Main Solutions are ....Encryption, Authentication,and Identity verification.

By Eng. Ahmed Ezz-eldin