lec-12-sensor

lec-12-sensor - SensorNetworksSecurity ShambhuUpadhyaya

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Shambhu Upadhyaya 1 Sensor Networks Security Sensor Networks Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 12)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shambhu Upadhyaya 2 Outline Motivation Challenges Threat and trust model Overview of security solutions DoS attack case study for sensor networks - Physical layer - Link layer - Transport layer Protocol vulnerabilities
Background image of page 2
Shambhu Upadhyaya 3 Motivation Sensor networks – promising approach Monitoring wildlife, machinery performance  monitoring, earthquake monitoring, military  application, highway traffic etc. Perform in-network processing - Data aggregation and forwarding summaries Critical to protect it - Traditional security techniques cannot be applied - Deployed in accessible areas – subject to physical  attacks - Close to people – poses additional problems
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shambhu Upadhyaya 4 Sensor Networks Vulnerabilities Military Applications Military can use sensor networks for a host of purposes like  detecting the movement of troops etc. Disasters It may be necessary to protect the location and status of casualties  from unauthorized disclosure Public Safety  False alarms about chemical, biological, or environmental threats  could cause panic or disregard for warning systems. An attack on  the system’s availability could precede a real attack on the protected  resource Home HealthCare Because protecting privacy is paramount, only authorized users  should be able to query or monitor the network
Background image of page 4
Shambhu Upadhyaya 5 Challenges Challenges in sensor networks - Resource constrained environments - Large scale ad-hoc distribution - High fault tolerance requirement - Large range of operating environments - Limited Bandwidth Security challenges - Key establishment - Secrecy, authentication, privacy, robustness against DoS  attacks - Secure routing - Node capture
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shambhu Upadhyaya 6 Threat and Trust Model Outsider attacks - Eavesdropping passive attacks - Alter or spoof packets or inject interfering wireless signals to  jam network - Disable sensor nodes by injecting useless packets and drain  battery Insider attacks - Node compromise (capture and reprogram) - Possess the keys and participate in the secret  communications Base station as a point of trust - Scalability becomes a problem - Base station becomes a bottleneck
Background image of page 6
7 Security Solutions Secrecy and authentication - Key establishment and management - PKI is expensive and subject to DoS attacks (bogus  messages to initiate signature verification) - Multicast authentication using mTesla Availability - Jamming and packet injection (use spread spectrum,  authentication etc. to counter attack) - Routing attacks (use multi-path routing) Stealth attacks
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/16/2011 for the course CSE 566 taught by Professor Dr.shamboo during the Fall '10 term at SUNY Buffalo.

Page1 / 36

lec-12-sensor - SensorNetworksSecurity ShambhuUpadhyaya

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online