WSN Security Issues

    Published: October 11, 2018

    Why high-security level is needed?


    WSN Security Issues

    • 1. Slide19 WSN Security Issues
    • 2. Slide20 Introduction High level of security is needed in WSN. This leads to need of extra resources. WSN resources are very limited. Current researches haven’t treat this conflict yet. BUT SO Special security requirements are needed. WSN security faces a lot of challenges. A lot of research points in this area is open.
    • 3. Slide21 Agenda Why high security level is needed? Security AND survivability requirements Taxonomy of attacks. WSN security challenges. Conclusion.
    • 4. Slide22 Why high security level is needed? •Have many applications in military and homeland. •Could be deployed in hostile environments. •Could be deployed in uncontrolled environment. •Wireless communication facilitates eavesdropping. •Often monitor their surroundings, so it is easy to deduce extra unwanted information results in privacy violation.
    • 5. Slide23 WSN security AND survivability requirements Security in a WSN is extremely important. Moreover, it should be reliably without interruption. Security requirements: Confidentiality Authentication Non-repudiation Integrity Freshness Forward and Backward secrecy Survivability requirements: Reliability Availability Energy efficiency
    • 6. Slide24 Taxonomy of attacks BASED ON Capability of the attacker Attacks on information in transit Protocol stack
    • 7. Slide25 WSN security challenges (1/3) Conflicting between minimization of resource consumptio and maximization of security level. Advanced anti-jamming techniques are impossible due to its complex design and high energy consumption. . Ad-hoc topology facilitates attackers of different types and from different directions. Most current standard security protocols do not scale to a large number of participants.
    • 8. Slide26 WSN security challenges (2/3) Encryption requires extra processing, memory and battery power. Secure asymmetric key needs more computations. Although sensors location information are important most of current proposal are suitable for static WSNs.
    • 9. Slide27 WSN security challenges (3/3) Most existing time synchronization schemes are vulnerable to several attacks. Their low costs impedes use of expensive tamperresistant hardware. Little research has been done in code attestation.
    • 10. Slide28 1. Based on capability of the attacker Outsider versus insider attacks. Passive versus active attacks. Mote-class versus laptop-class attacks.
    • 11. Slide29 2. Based on attacks on information in transit. Outsider versus insider attacks. Passive versus active attacks. Mote-class versus laptop-class attacks.
    • 12. Slide30 3. Based on protocol stack. This protocol stack combines power and routing awareness WSN protocol stack
    • 13. Slide31 3.1. Physical layer attacks. oAttacks: •Device Tampering. •Eavesdropping. •Jamming. oSolutions: •Access Restriction •Encryption.
    • 14. Slide32 3.2. Data link layer attacks.  Attacks:  Traffic Manipulation.  Identity Spoofing. ØSolutions: ØMisbehavior Detection. ØIdentity Protection
    • 15. Slide33 3.3. Network layer attacks.  Attacks:  False Routing.  Black Hole.  Solutions:  Routing Access Restriction.  False Routing Information Detection.
    • 16. Slide34 3.3. Transport layer attacks. Attacks: Flooding. De-synchronization Attacks. Solutions: Limit number of connections from a particular node. Header or full packet authentication.
    • 17. Slide35 3.3. Application layer attacks. Attacks: Selective Message Forwarding. Data Aggregation Distortion Solutions: Data Integrity Protection. Data Confidentiality Protection.
    • 18. Slide36 Conclusion. WSN needs high level of security due to its harsh environment. This leads to intense security and survival requirements. WSN face attacks of different types. Limited resources of sensors make WSN faces a huge security challenges. Some challenges are resolved and many haven’t resolved yet or under studying.