Security Issues in Distributed Sensor Networks - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

Security Issues in Distributed Sensor Networks

Description:

Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County – PowerPoint PPT presentation

Number of Views:106
Avg rating:3.0/5.0
Slides: 11
Provided by: arif156
Category:

less

Transcript and Presenter's Notes

Title: Security Issues in Distributed Sensor Networks


1
Security Issues in Distributed
Sensor Networks
  • Yi Sun
  • Department of Computer Science and Electrical
    Engineering
  • University of Maryland, Baltimore County
  • 2007. 10

2
Outline
  1. Introduction
  2. Security Criteria
  3. Vulnerabilities
  4. Attack types
  5. Security Schemes

3
1. Introduction
  • Explosive growth of mobile computing devices
  • laptops
  • personal digital assistants (PDAs)
  • handheld digital devices
  • Ubiquitous computing
  • Individual users utilize, at the same time,
    several electronic platforms through which they
    can access all the required information whenever
    and wherever they may be

4
2. Security Criteria
  • Availability
  • Provide all the designed services
  • Integrity
  • Malicious altering, accidental altering
  • Confidentiality
  • Accessible to authorized nodes
  • Authenticity
  • Prove identities

5
2. Security Criteria
  • Nonrepudiation
  • Cannot disavow sent or received a message
  • Authorization
  • Specifies the privileges and permissions
  • Anonymity
  • Privacy preserving

6
3. Vulnerabilities
  • Lack of secure boundaries
  • No need to gain the physical access to visit the
    network
  • Threats from compromised nodes inside the network
  • Behavioral diversity of different nodes,
    mobility
  • Lack of centralized management facility
  • Benign failures, trust management, cooperative
    algorithm
  • Restricted power supply
  • Battery, DoS, selfish node
  • Scalability
  • Efficient routing protocol, key management
    service

7
4. Attack types
  • Denial of Service (DoS)
  • Radio jamming, battery exhaustion
  • Impersonation
  • Compromised nodes join the network as normal
    nodes
  • Eavesdropping
  • Obtain confidential information during
    communication
  • Attacks against routing
  • Attacks on routing protocols, attacks on packet
    forwarding/delivery

8
5. Security Schemes
  • Intrusion Detection Techniques
  • Distributed and cooperative to meet with the
    needs of sensor networks
  • Secure Routing Techniques
  • Defend specific attacks and general attacks
  • Medium Access Control
  • Guaranteed or controlled access, random access
  • Key Management
  • Cryptography

9
  • Thanks!

10
References
  • Y. Zhang and W. Lee, Intrusion Detection in
    Wireless Ad-hoc Networks, in Proceedings of the
    6th International Conference on Mobile Computing
    and Networking (MobiCom 2000), pages 275283,
    Boston, Massachusetts, August 2000.
  • Jim Parker, Anand Patwardhan, and Anupam Joshi,
    Detecting Wireless Misbehavior through
    Cross-layer Analysis, in Proceedings of the IEEE
    Consumer Communications and Networking Conference
    Special Sessions (CCNC2006), Las Vegas, Nevada,
    2006.
  • Y. Hu, A. Perrig and D. Johnson, Rushing Attacks
    and Defense in Wireless Ad Hoc Network Routing
    Protocols, in Proceedings of ACM MobiCom Workshop
    - WiSe03, 2003.
  • Yi-an Huang and Wenke Lee, A Cooperative
    Intrusion Detection System for Ad Hoc Networks,
    in Proceedings of the 1st ACM Workshop on
    Security of Ad hoc and Sensor Networks, Fairfax,
    Virginia, 2003, pp. 135 147.
  • Panagiotis Papadimitraos and Zygmunt J. Hass,
    Securing Mobile Ad Hoc Networks, in Book The
    Handbook of Ad Hoc Wireless Networks (Chapter
    31), CRC Press LLC, 2003.
Write a Comment
User Comments (0)
About PowerShow.com