overview on security and privacy issues in wireless sensor networks-2014

29
This project is funded by Structural Funds of the European Union (ESF) and state budget of the Czech Republic Overview on Security and Privacy Issues in Wireless Sensor Networks Dr. Tarek Gaber Computer Science Department, VSB-Technical University of Ostrava, Czech Faculty of Computers & Informatics Suez Canal University, Ismailia, Egypt

Upload: vsb-tecchnical-university-of-ostrava-ostrava-czech-republic

Post on 15-Jul-2015

814 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Overview on security and privacy issues in  wireless sensor networks-2014

This project is funded by Structural Funds of the European Union (ESF) and state budget of the Czech Republic

Overview on Security and Privacy Issues in Wireless Sensor

Networks Dr. Tarek Gaber

Computer Science Department,

VSB-Technical University of Ostrava, Czech

Faculty of Computers & Informatics

Suez Canal University, Ismailia, Egypt

Page 2: Overview on security and privacy issues in  wireless sensor networks-2014

Lecture Outlines

Why security is important in WSN

Algorithms to achieve security services

Why security is complex in WSN

Some Attacks to WSN

Trust and Reputation in WSN

Security, functionality, and ease of use

How to Stay Safe While using WiFi

Page 3: Overview on security and privacy issues in  wireless sensor networks-2014

Why Security is Important for WSN

• WSNs have many applications e.g.:

– military, homeland security

– assessing disaster zones

– Others.

• This means that such sensor networks have mission-critical tasks.

• Security is crucial for such WSNs deployed in these hostile environments.

Page 4: Overview on security and privacy issues in  wireless sensor networks-2014

Why Security is Important for WSN

• Moreover, wireless communication employed by WSN facilitates

– eavesdropping and

– packet injection by an adversary.

• These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.

Page 5: Overview on security and privacy issues in  wireless sensor networks-2014

Algorithms to achieve security services

Page 6: Overview on security and privacy issues in  wireless sensor networks-2014

Symmetric Encryption

Example: AES Algorithm

Page 7: Overview on security and privacy issues in  wireless sensor networks-2014

Asymmetric Encryption

Example: RSA Algorithm

Page 8: Overview on security and privacy issues in  wireless sensor networks-2014

Hash Function/Algorithm

Page 9: Overview on security and privacy issues in  wireless sensor networks-2014

Digital Signature

Page 10: Overview on security and privacy issues in  wireless sensor networks-2014

Why Security is Complex in WSN

• Because of WSNs Characteristics:

– Anti-jamming and physical temper proofing are impossible

• greater design complexity and energy consumption

– Denial-of-service (DoS) attack is difficult

• Sensor node constraints

– Sensor nodes are susceptible to physical capture

• Deploying in hostile environment.

– eavesdropping and injecting malicious message are easy

• Using wireless communication

Page 11: Overview on security and privacy issues in  wireless sensor networks-2014

Why Security is Complex in WSN • Because of WSNs Characteristics:

– maximization of security level is challenging

• Resource consumption

– asymmetric cryptography is often too expensive

• Node constraints

– centralized security solutions are big issue

• no central control and constraints, e.g. small memory capacity.

• Cost Issues

– Overall cost of WSN should be as low as possible.

Page 12: Overview on security and privacy issues in  wireless sensor networks-2014

Typical Attacks to WSN

Page 13: Overview on security and privacy issues in  wireless sensor networks-2014

Physical Attacks • Environmental

– Permanently destroy the node, e.g., crashing or stealing a node.

• Attacks at the Physical Layer – Jamming: transmission of a radio signal to interfere with WSN radio

frequencies. – Constant jamming: No message are able to be sent or received. – Intermittent jamming: Nodes are able to exchange messages periodically

Page 14: Overview on security and privacy issues in  wireless sensor networks-2014

Jamming Attack Countermeasure

• Most common defense against jamming attacks is to use spread-spectrum communication techniques • there are different channels to deliver the signal

Page 15: Overview on security and privacy issues in  wireless sensor networks-2014

Physical Attacks • Node Capture Attacks

– routing functionalities

• Countermeasure

– tamper-proof features • Expensive solution

– Self-Protection

– disable device when attack detected

Page 16: Overview on security and privacy issues in  wireless sensor networks-2014

Attacks on Routing • Sinkhole attack

– attacker tries to attract the traffic from a particular region through it

• Solution:

– Watchdog Nodes can start to trace the source of false routing information

Page 17: Overview on security and privacy issues in  wireless sensor networks-2014

Attacks on Routing • Sybil attack (Identity Spoofing)

– attacker claims to have multiple identities or locations

– provide wrong information for routing to launch false routing attacks

• Solutions: – Misbehavior Detection.

– Identity Protection

Page 18: Overview on security and privacy issues in  wireless sensor networks-2014

Privacy Attacks

• Attempts to obtain sensitive information collected and communicated in WSNs

– Eavesdropping

• made easy by broadcast nature of wireless networks

– Traffic analysis

• used to identify sensor nodes of interest (data of interest),

Page 19: Overview on security and privacy issues in  wireless sensor networks-2014

WSN Privacy Issues Cont.

Page 20: Overview on security and privacy issues in  wireless sensor networks-2014

WSN Privacy Issues Attack

Page 21: Overview on security and privacy issues in  wireless sensor networks-2014

Trust and reputation in WSN

Page 22: Overview on security and privacy issues in  wireless sensor networks-2014

WSN Traditional Security Techniques

• Cryptographic primitives and authentication mechanisms are not suitable for WSNs

– Asymmetric cryptography is often too expensive

– Node constraints

– power consumption

– centralized security administration

– Once the keys are leaked, security mechanisms may become ineffective

Page 23: Overview on security and privacy issues in  wireless sensor networks-2014

Trust and Reputation

• Examples of reputation systems:

– eBay reputation system, …

• Relationship between reputation and trust:

– Reputation can be used as an output in order to derive trust

Page 24: Overview on security and privacy issues in  wireless sensor networks-2014

• These systems can:

– identify malicious nodes,

– computes a trust rating of the node and

– exclude the nodes from the network

– offer a prediction of one's future behavior,

Trust Systems

Page 25: Overview on security and privacy issues in  wireless sensor networks-2014

Example of Trust in WSN • In order to find a secure route,

– Trust values will be evaluated

– the trust results will help to select the trustworthy next-hop node

– through the trusted nodes, the source node will forward data to the sink node

Page 26: Overview on security and privacy issues in  wireless sensor networks-2014

The Security, Functionality, and Ease of Use Triangle

Page 27: Overview on security and privacy issues in  wireless sensor networks-2014

How to Stay Safe While using WiFi

• Treat all public WiFi links with suspicion: It’s virtually impossible to tell the difference between a safe and an unsafe network.

• When using public WiFi, avoid doing anything sensitive: Don’t buy anything, login to your financial accounts, or even send email when accessing public WiFi networks. Wait until you get back home to your secure network to do those kinds of things. Better to be safe than sorry.

• Make sure you are using antivirus software: It’s not a foolproof solution, but antivirus software can help repel most known attacks.

• Think about using identity protection and monitoring services: This is a great way to protect yourself and your family from identity theft.

• Use a VPN: A VPN like PRIVATE WiFi allows you to use public WiFi networks as if they were private and secure. A VPN is a good solution to possible man-in-the-middle attacks if you must use public WiFi.

Page 28: Overview on security and privacy issues in  wireless sensor networks-2014

References • Dargie, Waltenegus, and Christian Poellabauer. Fundamentals

of wireless sensor networks: theory and practice. John Wiley & Sons, 2010.

• http://techathon.mytechlabs.com/web-application-security-testing/

• Kumar, Pardeep, and Hoon-Jae Lee. "Security issues in healthcare applications using wireless medical sensor networks: A survey." Sensors 12.1 (2011): 55-91.

• http://www.privatewifi.com/csid-recommends-using-a-vpn-to-stop-man-in-the-middle-attacks/

• http://techathon.mytechlabs.com/web-application-security-testing/

• http://en.kryptotel.net/encryption.html

Page 29: Overview on security and privacy issues in  wireless sensor networks-2014

Thank you

Dr. Tarek Gaber

Ostrava, ….. (04 December 2014)

This project is funded by Structural Funds of the European Union and state budget of the Czech Republic