Security In Wireless Sensor Network - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

Security In Wireless Sensor Network

Description:

As WSNs can be data ... Section III Threats and Attacks in Wireless Sensor Networks Passive Information Gathering False Node insertion Sybil Attack Wormhole Attack ... – PowerPoint PPT presentation

Number of Views:118
Avg rating:3.0/5.0
Slides: 11
Provided by: Mick1163
Category:

less

Transcript and Presenter's Notes

Title: Security In Wireless Sensor Network


1
Security In Wireless Sensor Network
  • CHIA-LING YANG
  • CSCI 5235

2
Abstract
  • Wireless sensor networks are a device that can
    collect data and its size can range from a few
    hundred sensors to a few hundred thousand or
    possibly more 1. As WSNs can be data
    collection, coordinated analysis, and automated
    event correlation 2, they can be applied to a
    wide range of purposes such as temperature
    monitoring, vehicle monitoring, animal
    monitoringetc. These sensors, different from
    traditional networks, are deployed over our
    environment and it is more vulnerable to security
    attacks than wired networks, due to the broadcast
    communication 3. Therefore, security issues
    become extremely important. In this paper,
    different kinds of threats in WSN are introduced
    and it indicates that how they can be avoided and
    protected by security services in WSN.

3
Outline
  • Section I
  • Introduction
  • Section II
  • Wireless Sensor Networks
  • What is WSN?
  • Where can it be used for?
  • Section III
  • Threats and Attacks in Wireless Sensor Networks
  • Passive Information Gathering
  • False Node insertion
  • Sybil Attack
  • Wormhole Attack
  • Section IV
  • Security Goals in Wireless Sensor Networks
  • Data Confidentiality
  • Data authentication
  • Data Integrity
  • Data Freshness
  • Robustness
  • Section V
  • Security Method LEAP
  • Individual Key
  • Group Key
  • Cluster Key
  • Pairwise Shared Key
  • Section VI
  • Conclusion

4
Wireless Sensor Networks
From http//arri.uta.edu/acs/networks/WirelessSen
sorNetChap04.pdf
5
Threats and Attacks (1)
  • Passive Information Gathering
  • Physical location
  • Message
  • Use encryption to prevent it
  • False Node insertion
  • False data
  • Inject False Messages
  • Use authentication to prevent it

6
Threats and Attacks (2)
Sybil Attack
7
Threats and Attacks (3)
Wormhole Attack
From http//csie.npu.edu.tw/itaoi/6/B/6.pdf
8
Security Goals
  • Data Confidentiality
  • Data authentication
  • Data Integrity
  • Data Freshness
  • Robustness

9
Security Method LEAP
  • Localized Encryption and Authentication Protocol
  • Four types of keys
  • Individual key
  • Each node has a unique key shared with the base
    station
  • Cluster key
  • A node has the key shared with all of its
    neighboring nodes
  • Pairwise key
  • A node has the key shared with its immediate
    neighbors.
  • Group key
  • This is a globally shared key that is used by
    the base station for encrypting messages that are
    broadcast to the whole group.3

10
Reference
  • 1 Roberto Di Pietro, Luigi V. Mancini, and
    Alessandro Mei, Energy efficient node-to-node
    authentication and communication confidentiality
    in wireless sensor networks. Springer Science
    Business Media, LLC, 19 May 2006.
  • 2 Adrian Perrig, John Stankovic, and David
    Wagner, Security in Wireless Sensor Netoworks,
    Communications of The ACM, Vol. 47 No. 6, pp.
    53-57, June 2004.
  • 3 Xiuli Ren, Security Methods for Wireless
    Sensor Networks, in International Conference on
    Mechatronics and Automation, 2006, pp. 1925-1930.
  • 4 Eric Sabbah, Adnan Majeed, Kyoung-Don Kang,
    Ke Liu, and Nael Abu-Ghazaleh, An
    application-Driven Perspective on Wireless Sensor
    Network Security,
  • 5 F. L. LEWIS, Wireless Sensor Networks,
    http//arri.uta.edu/acs/networks/WirelessSensorNet
    Chap04.pdf.
Write a Comment
User Comments (0)
About PowerShow.com