1 / 10

Security Issues in Distributed Sensor Networks

Security Issues in Distributed Sensor Networks. Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County 2007. 10. Outline. Introduction Security Criteria Vulnerabilities Attack types Security Schemes. 1. Introduction.

myrrh
Télécharger la présentation

Security Issues in Distributed Sensor Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County 2007. 10

  2. Outline • Introduction • Security Criteria • Vulnerabilities • Attack types • Security Schemes

  3. 1. Introduction • Explosive growth of mobile computing devices laptops personal digital assistants (PDAs) handheld digital devices … • Ubiquitous computing Individual users utilize, at the same time, several electronic platforms through which they can access all the required information whenever and wherever they may be

  4. 2. Security Criteria • Availability Provide all the designed services • Integrity Malicious altering, accidental altering • Confidentiality Accessible to authorized nodes • Authenticity Prove identities

  5. 2. Security Criteria • Nonrepudiation Cannot disavow sent or received a message • Authorization Specifies the privileges and permissions • Anonymity Privacy preserving

  6. 3. Vulnerabilities • Lack of secure boundaries No needto gain the physical access to visit the network • Threats from compromised nodes inside the network Behavioral diversity of different nodes, mobility • Lack of centralized management facility Benign failures, trust management, cooperative algorithm • Restricted power supply Battery, DoS, selfish node • Scalability Efficient routing protocol, key management service

  7. 4. Attack types • Denial of Service (DoS) Radio jamming, battery exhaustion • Impersonation Compromised nodes join the network as normal nodes • Eavesdropping Obtain confidential information during communication • Attacks against routing Attacks on routing protocols, attacks on packet forwarding/delivery

  8. 5. Security Schemes • Intrusion Detection Techniques Distributed and cooperative to meet with the needs of sensor networks • Secure Routing Techniques Defend specific attacks and general attacks • Medium Access Control Guaranteed or controlled access, random access • Key Management Cryptography

  9. Thanks!

  10. References • Y. Zhang and W. Lee, Intrusion Detection in Wireless Ad-hoc Networks, in Proceedingsof the 6th International Conference on Mobile Computing and Networking (MobiCom2000), pages 275–283, Boston, Massachusetts, August 2000. • Jim Parker, Anand Patwardhan, and Anupam Joshi, Detecting Wireless Misbehavior through Cross-layer Analysis, in Proceedings of the IEEE Consumer Communications and Networking Conference Special Sessions (CCNC’2006), Las Vegas, Nevada, 2006. • Y. Hu, A. Perrig and D. Johnson, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, in Proceedings of ACM MobiCom Workshop - WiSe’03, 2003. • Yi-an Huang and Wenke Lee, A Cooperative Intrusion Detection System for Ad Hoc Networks, in Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, Fairfax, Virginia, 2003, pp. 135 – 147. • Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31), CRC Press LLC, 2003.

More Related