/
Secure Routing in WSNs: Secure Routing in WSNs:

Secure Routing in WSNs: - PowerPoint Presentation

phoebe-click
phoebe-click . @phoebe-click
Follow
415 views
Uploaded On 2016-02-21

Secure Routing in WSNs: - PPT Presentation

Attacks amp Countermeasures Chris Karlof amp David Wagner UC Berkeley 1 st IEEE International Workshop on Sensor Network Protocols amp Applications 11 May 2003 Report by Jim Gaskell CS 577 Prof Kinicki Fall 11 ID: 225515

attacks amp wsns routing amp attacks routing wsns countermeasures secure nodes security protocol protocols issues data holes node network

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Secure Routing in WSNs:" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Secure Routing in WSNs:Attacks & Countermeasures

Chris Karlof & David Wagner, UC Berkeley

1

st

IEEE International Workshop on Sensor Network Protocols & Applications 11 May 2003

Report by Jim Gaskell

CS 577, Prof Kinicki, Fall '11Slide2

Secure Routing in WSNs: Attacks & Countermeasures

2

Overview

Intro to WSNs

Security Issues

Attacks

Countermeasures

Summary & ConclusionsSlide3

Secure Routing in WSNs: Attacks & Countermeasures

3

Intro

WSNs (Wireless Sensor Networks)

Low power xmits & fixed energy

Low computing power

Trusting environment

Future appears to lead to more sensors at less cost

Base Station configurationSlide4

Secure Routing in WSNs: Attacks & Countermeasures

4

Security Issues

WSNs not conducive to security

No popular protocol addresses issue

Sensors may lack physical security

Attackers can have vastly superior resourcesSlide5

Secure Routing in WSNs: Attacks & Countermeasures

5

Security Issues (cont)

Usages where security matters:

Burglar alarms

Building monitoring

Emergency response

Often lack of physical security

MILITARY & POLICE

DARPA in-part sponsored paperSlide6

Secure Routing in WSNs: Attacks & Countermeasures

6

General Message Types

Commands from the Base Station to the Nodes

Data from the Nodes to the Base Station

Communication between Nodes to establish routingSlide7

Secure Routing in WSNs: Attacks & Countermeasures

7

Physical Security

Maybe the best way to Attack a mesh:

Many Nodes distributed over a fairly wide area

Obtain one and take it apart

Compromise it and, perhaps, return it to the fieldSlide8

Secure Routing in WSNs: Attacks & Countermeasures

8

Protocols & their AttacksSlide9

Secure Routing in WSNs: Attacks & Countermeasures

9

Attacks

#1 - Aggregation issues

#2 - Sink Holes

#3 - Worm Holes

#4 - Sybil

#5 - ACK Spoofing

#6 - HELLO FloodingSlide10

Secure Routing in WSNs: Attacks & Countermeasures

10

#1 - Aggregation Issues

"Aggregation" definition

Selective forwarding

Other Nodes can be discouraged from sending dataSlide11

Secure Routing in WSNs: Attacks & Countermeasures

11

#2 - Sink Holes

Attacker looks attractive to other Nodes for relaying

May be far away

May be near to Nodes & far from BS

If another node, it's a "selfish" node

Selective ForwardingSlide12

Secure Routing in WSNs: Attacks & Countermeasures

12

#3 - Worm Holes

Messages from one area of the Network appear in a different area of the Network

Even encrypted Messages can be relocatedSlide13

Secure Routing in WSNs: Attacks & Countermeasures

13

#4 - Sybil

Have a single Node act as though it is many

Perhaps inducing bogus Routing infoSlide14

Secure Routing in WSNs: Attacks & Countermeasures

14

#5 - ACK Spoofing

Sends overheard ACKs to other Nodes (can be encrypted)

Keeps routes alive and/or redirects pathSlide15

Secure Routing in WSNs: Attacks & Countermeasures

15

#6 - HELLO Flooding

Attacker tells many Nodes that it's an excellent connection to the BS

Nodes then (attempt to) send their data to the Attacker – perhaps indirectly via hopsSlide16

Secure Routing in WSNs: Attacks & Countermeasures

16

Countermeasures

Public key protocol too costly for Nodes

Symmetric key protocol OK for Node data, but not for Routing (no cit.)

"Selfish" nodes can be dealt with by some protocols, but "Blackmailers" can still be used as an attack.Slide17

Secure Routing in WSNs: Attacks & Countermeasures

17

Countermeasures (cont)

SNEP (Sensor Network Encryption Protocol) has many security features

µTESLA is a reduced functionality off-shoot of a Workstation authentication protocolSlide18

Secure Routing in WSNs: Attacks & Countermeasures

18

Summary & Conclusions

This paper is at least 8 years old

It deals only in theory; not field tests

It deals only with protocols available at the time

By their very nature, current Nodes are not very robust against attacksSlide19

Secure Routing in WSNs: Attacks & Countermeasures

19

Conclusions (cont)

New protocols or hardware need only be compatible with other nodes in the mesh

Applications can vary markedly in their requirements; choosing hdwr & software must be done with care beginning at the start of the ProjectSlide20

Secure Routing in WSNs: Attacks & Countermeasures

20

Jim Gaskell

Questions?

or

Comments!