Download - PROTOCOL MECHNISM FOR SECURITY ppt
![Page 1: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/1.jpg)
SEMINAR REPORT ON Protocols and
mechanisms for security
Presented by SANJAY . D .
DHANDARE
Guided by Prof. saniya ansari mam
10,oct,2014
DYPSOE PUNE
Department of
Electronics and telecommunication Engg.
![Page 2: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/2.jpg)
CONTENT INTRODUCTION.
What is protocol.
What is protocol mechanism.
What is network security.
Fundamentals of network security.
What it means?
Attacks on security network.
Mechanism for security.
Protocols for security.
Conclusion.
References.
![Page 3: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/3.jpg)
INTRODUCTION
What is a Sensor Network ?A heterogeneous system combining tiny sensors and
actuators with general-purpose computing elements. Most consisting of hundreds or thousands of low-power, low-cost nodes deployed to monitor and affect the environment.
What are they used for? Ocean and wildlife monitoring. Monitoring of manufactured machinery. Building safety. Earthquake monitoring. Variety of military applications. Medical monitoring and research.
![Page 4: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/4.jpg)
What is protocol?
PROTOCOL
“set of rules commonly employ for proper communication in between sender and receiver in every wireless sensor network.
![Page 5: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/5.jpg)
What is protocol mechanism?
The mechanism in which different
protocol performs their well defined
task for healthy communication in
the sensor network.
This is the key term used in every
network to protect from different
attacks.
![Page 6: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/6.jpg)
What is network security?
Network security is nothing but the
collection of all policies,
mechanisms and services that
afford a network which required
protection from unauthorised
access.
![Page 7: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/7.jpg)
Fundamentals of network security
The network is said to be secure if it have,
Confidentiality.
Integrity.
Availability.
![Page 8: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/8.jpg)
What it means?
DATA CONFIDENTIALITY – data leakage to
neighboring networks must be prevent.
DATA INTEGRITY – transmission data cannot be
modified.
AVAILABILITY–network able to work at any
time.
DATA AUTHENTICATION – verification of
sender/receiver.
![Page 9: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/9.jpg)
Attacks on security
Following are the different attacks on
security:
Denial-of-service.
Routing attacks.
Data aggregation attacks.
Privacy attacks.
![Page 10: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/10.jpg)
Denial-of-service attacks
Attempt to stop network from proper functioning.
Disturbed the service provided by the network.
It may occur at various layer of protocol :
physical layer Dos.Data link layer Dos.
![Page 11: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/11.jpg)
Routing attacks
What happen?Data is forwarded along one or more
routes.
EFFECT:
Traffic increases at node and as a result packets (data) can not reaches to destination.
![Page 12: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/12.jpg)
Examples of routing attacks
Blackhole attack.
Rushing attacks.
Sinkhole attacks.
Sybil attack.
Wormhole attack
![Page 13: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/13.jpg)
Data aggregation attacks.
Reducing frequency of operation.Reducing packets size.Replacing real measurement by fake
readings.
![Page 14: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/14.jpg)
Privacy attacks
May introduce by accessing the data
store at node.
May occur at node which perform
more activity.
The traffic analysis can be used to
identify the important nodes.
![Page 15: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/15.jpg)
Mechanism for security
Cryptography :Cryptography is a method of storing
and transmitting data in a particular form so that only those for whom it is intended can read and process.
The term plaintext is often used which means ordinary text sometimes referred as cipher text called as encryption and back again called decryption
![Page 16: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/16.jpg)
Symmetric and public key cryptography
SYMMETRIC CRYPTOGRAPHY:A encryption system in which the
sender and receiver of a messages share a single key that is used to encrypt and descrypt the data.
PUBLIC KEY CRYPTOGRAPHY;
It uses two keys a public key to encrypt the massage and a private key to descrypt them.
![Page 17: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/17.jpg)
Symmetric cryptography
![Page 18: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/18.jpg)
Key management
It is nothing but reliable and secure establishment of shared keys among neighbouring nodes in a network.
In this approach every sensor shares different pairwise key with each other. Hence the sensor network can be represented as matrix with rows and column.
![Page 19: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/19.jpg)
example
![Page 20: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/20.jpg)
Defence again attacks
Dos attacks.
Aggregation attacks.
Routing attacks
![Page 21: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/21.jpg)
Security protocols
Encryption protocol.
Same message is encrypted differently at each time.
tinySec protocol.
It supports two mechanism :
Authentication encryption.
Authentication only.
Localized encryption and Authentication protocol.
![Page 22: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/22.jpg)
Localized encryption and Authentication protocol.
It provide four keying mechanism as follows,
Individual key .
Group key.
Cluster key.
Pairwise key.
![Page 23: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/23.jpg)
*** CONCLUSION ***
from above discussion we conclude
that the security is a important issue
in a wireless sensor network and can
be introduced by using a standard
protocol and mechanism to prevent
unauthorised access.
![Page 24: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/24.jpg)
References
Dargie w and poellabaur fundamentals of wireless sensor networks :theory and practise john wiley and sons 2010 .
Protocols and architectures for wireless sensor networks holger karl andreas willig 2007.
And E-journals .
![Page 25: PROTOCOL MECHNISM FOR SECURITY ppt](https://reader030.vdocuments.site/reader030/viewer/2022032618/55b36833bb61ebc6798b45a6/html5/thumbnails/25.jpg)
ANY QUERIES…
THANK YOU