140 likes | 328 Views
Security In Wireless Sensor Network. CHIA-LING YANG CSCI 5235. Abstract .
E N D
Security In Wireless Sensor Network CHIA-LING YANG CSCI 5235
Abstract • Wireless sensor networks are a device that can collect data and its size can range from a few hundred sensors to a few hundred thousand or possibly more [1]. As WSNs can be data collection, coordinated analysis, and automated event correlation [2], they can be applied to a wide range of purposes such as temperature monitoring, vehicle monitoring, animal monitoring…etc. These sensors, different from traditional networks, are deployed over our environment and it is more vulnerable to security attacks than wired networks, due to the broadcast communication [3]. Therefore, security issues become extremely important. In this paper, different kinds of threats in WSN are introduced and it indicates that how they can be avoided and protected by security services in WSN.
Outline • Section I Introduction • Section II Wireless Sensor Networks • What is WSN? • Where can it be used for? • Section III Threats and Attacks in Wireless Sensor Networks • Passive Information Gathering • False Node insertion • Sybil Attack • Wormhole Attack • Section IV Security Goals in Wireless Sensor Networks • Data Confidentiality • Data authentication • Data Integrity • Data Freshness • Robustness • Section V Security Method: LEAP • Individual Key • Group Key • Cluster Key • Pairwise Shared Key • Section VI Conclusion
Wireless Sensor Networks From: http://arri.uta.edu/acs/networks/WirelessSensorNetChap04.pdf
Threats and Attacks (1) • Passive Information Gathering • Physical location • Message • Use encryption to prevent it • False Node insertion • False data • Inject False Messages • Use authentication to prevent it
Threats and Attacks (2) • Sybil Attack
Threats and Attacks (3) • Wormhole Attack From: http://csie.npu.edu.tw/itaoi/6/B/6.pdf
Security Goals • Data Confidentiality • Data authentication • Data Integrity • Data Freshness • Robustness
Security Method: LEAP • Localized Encryption and Authentication Protocol • Four types of keys • Individual key • Each node has a unique key shared with the base station • Cluster key • A node has the key shared with all of its neighboring nodes • Pairwise key • A node has the key shared with its immediate neighbors. • Group key • “This is a globally shared key that is used by the base station for encrypting messages that are broadcast to the whole group.”[3]
Reference • [1] Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei, Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Springer Science + Business Media, LLC, 19 May 2006. • [2] Adrian Perrig, “John Stankovic, and David Wagner, Security in Wireless Sensor Netoworks,” Communications of The ACM, Vol. 47 No. 6, pp. 53-57, June 2004. • [3] Xiuli Ren, “Security Methods for Wireless Sensor Networks,” in International Conference on Mechatronics and Automation, 2006, pp. 1925-1930. • [4] Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu, and Nael Abu-Ghazaleh, An application-Driven Perspective on Wireless Sensor Network Security, • [5] F. L. LEWIS, Wireless Sensor Networks, http://arri.uta.edu/acs/networks/WirelessSensorNetChap04.pdf.