secure systems research group - fau introduction to wireless sensor networks and its security...
TRANSCRIPT
Secure Systems Research Group - FAU
Introduction to
Wireless Sensor Networks and its Security Concerns
8/20/2009
Anupama Sahu
Secure Systems Research Group - FAU
Wireless Sensor Networks (WSNs)
Outline• Definition• Characteristics• Applications• Components of a Sensor node• WSN architecture• Operations in WSN• Security Concerns
Secure Systems Research Group - FAU
Definition of WSN
A WSN is a deployment of massive number of small, inexpensive, self-powered devices that can sense, compute, and communicate with other devices for the purpose of gathering local information to make global decisions about a physical environment.
These self-powered devices are called sensors.
In WSN the position of sensor nodes need not be engineered or predetermined. Hence random deployment in inaccessible terrains is possible.
Secure Systems Research Group - FAU
Characteristics of WSN
Sensors are small and inexpensive. Sensor nodes are densely deployed Can monitor and control the physical location
remotely Have limited resources:
• CPU: 1 ~ 8 MHz• Radio: 40 – 250 kbps• Memory: 48 – 124 KB• Battery life • Radio more expensive
Easy to deploy
Secure Systems Research Group - FAU
Characteristics of WSN
Can operate in harsh conditions They are autonomous in nature.
• Self-configuring• Self-calibrating• Self-identifying• Self-reorganizing
Low maintenance Have dynamic topology Easy to upgrade Sensor nodes mainly use a broadcast communication
paradigm
Secure Systems Research Group - FAU
Applications of WSN
Military Applications:• battlefield surveillance, target detection & recognition
Ocean bottom surveillance: • detect & track submarines,• monitor events, e.g. seismic and animal activity
Environment and habitat monitoring:• Environment sensors used to study vegetation response
to climate• trends and diseases• Acoustic and imaging sensors can identify, track and
measure the population of birds and other species
Secure Systems Research Group - FAU
Applications of WSN
Traffic Control:• Intersections use sensors to detect vehicles and control traffic lights• Sensors can be attached to vehicles; during movement, vehicles can exchange information on traffic jams, speed and density of traffic (VANET)
Infrastructure security and counterterrorism:• Networks of video, acoustic, and other sensors deployed around critical buildings and facilities like burglar alarm systems is museums and fire alarms in hotels
Secure Systems Research Group - FAU
Applications of WSN Industrial sensing:
• insertion of sensors into regions inaccessible by humans e.g. Oil refinery has sensors to measure pressure and temperature in pipes
• lowering cost and improving machine performance and maintainability e.g. chemical manufacturing plant and semiconductor manufacturing plant
Disaster recovery:• densely deploy sensors in a disaster area
• help locate survivors and find safe evacuation paths,
• alert nearest emergency response team Inventory:
• items have attached tags, stick-on sensors attached to walls or embedded in floors and ceilings to track the location history and use of items
Secure Systems Research Group - FAU
Applications of WSN
Health care:• patient monitoring at home, in-hospital communication, out-
hospital monitoring • e.g. CodeBlue [4] is a wireless infrastructure intended for
deployment in emergency medical care, integrating low-power, wireless vital sign sensors, personal digital assistants (PDAs), and PC-class systems.
• e.g. Scalable Medical Alert Response Technology (SMART) [5] is a system for patient tracking and monitoring that begins at the emergency site and continues through transport, triage, stabilization, and transfer between external sites and healthcare facilities, as well as within a healthcare facility.
Secure Systems Research Group - FAU
WSN Architecture
Basic architecture: • This includes one BS, many sensors and data is collected at the BS• Each sensor node has dual role: data collector + router• The main task of a sensor node is to detect events, perform quick local data processing and transmit data
Secure Systems Research Group - FAU
WSN Architecture
Clustered Architecture:• data is transmitted from sensors to
cluster heads and from cluster heads
to the base station• the cluster heads alternate in time
Heterogeneous Architecture:• Network elements have different capabilities• This is used to increase network
lifetime and reliability as well as
decrease end-to-end latency
Secure Systems Research Group - FAU
WSN Architecture
Wireless sensor and actor (actuator) networks (WSAN):• Sensors gather information about the physical world and
actuators take decisions and then perform appropriate actions on the environment
• e.g. water sprinklers in buildings and agricultural lands
Secure Systems Research Group - FAU
Operations in WSN
Data/interest dissemination:• Sinks broadcast the interest to or query the sensors, or• Sensors broadcast an advertisement for the available data
and wait for request from interested nodes• Flooding, gossiping, rumor routing, directed diffusion are
some of the available methods Data gathering:
• Base station (BS) is fixed and located far from the sensors• Transmit or gather sensed data from each sensor node to the
sink or BS• Data reporting could be periodic or event based• Data gathering is organized in rounds • LEACH (Low-Energy Adaptive Clustering Hierarchy) is a
clustering based data gathering protocol.
Secure Systems Research Group - FAU
Operations in WSN
• PEGASIS (Power-Efficient Gathering in Sensor Information Systems) is a proactive data gathering protocol
• Directed Diffusion is a reactive routing technique which means that routes are established on-demand
Data aggregation / data fusion:• Data coming from multiple sensor nodes can be aggregated
or combined into a set of meaningful information, if they are related to the same attribute of the phenomenon
• Solve implosion (duplicate message sent to the same node) and overlap (close nodes sense and report the same parameters) problems
Secure Systems Research Group - FAU
Operations in WSN
Data storage:• External storage: In this, a centralized server, outside the
sensor network is used for collecting and storing sensed data
• Data-centric storage: In this, the data is stored at nodes in the network, depending on the event type
• Local storage (e.g. directed diffusion): In this a source sends data to the sink only when the sink has queried the data
• Index-based data storage: In this, information about storing nodes is maintained at index nodes, based on the event type
Secure Systems Research Group - FAU
Security concerns and attacks in WSN
Security goals: authentication, authorization, confidentiality, data integrity, accountability, data availability and freshness, controlled access
WSNs consist of small nodes that are spread over a possibly hostile area
Constraints in memory and computational capabilities are a serious obstacle for implementing cryptographic algorithms
The nodes might be physically accessed by attackers, could be invasive or non-invasive e.g. node capture
Finite energy of sensor nodes is a concern as there are attacks that force sensors to exhaust their energy quickly and to die otherwise known as battery drainage attacks
Denial of service attacks Node replication attacks Man-in-the-middle attack: read, replay, block, modify
Secure Systems Research Group - FAU
Security concerns and attacks in WSN
Attacks on Network Communication Stack:• Physical layer: jamming is the interference with the RF
used by nodes to communicate in the network• Link layer: causing collisions with the packets in
transmission
• Network and Routing layer: Black Holes: This attack is launched against distance
vector routing protocols. A compromised node advertises a zero or a very low cost to its neighbors so that large number of packets get routed towards it.
Wormhole attack: in this attack the adversary node tunnels the messages to another part of the network through a low latency link, and then replays them.
Secure Systems Research Group - FAU
Security concerns and attacks in WSN
Spoofed, altered, replayed packets: This attack targets the routing information used by nodes which could lead to creating routing loops and increase the end to end delay
Selective forwarding: in this attack the compromised node only forwards a fraction of the packets it receives and drops the rest
Sinkhole attack: in this attack the adversary tries to attract most of the traffic toward the compromised nodes.
• Transport layer: Flooding attack results in sending duplicate messages to the same node and overlapping
Sybil attack refers to the scenario when a malicious node pretends to have multiple identities. The malicious node can claim false identities (fabricated identities) or impersonate other legitimate nodes in the network (stolen identities).
Secure Systems Research Group - FAU
Importance of security in WSN Unsecure hotel sensor network simply sends all sensed
information over wireless network to base station, without using encryption
• Outcome: Gives attacker an idea of the occupancy of the hotel
Unsecured WSN in chemical plants and oil refineries• Outcome: Attacker could forge pressure/temperature
readings. The control center would then process fake data and perform incorrect operation which might lead to accidents.
Unsecured WSN in Manufacturing applications• Outcome: Competitors can detect production volumes
and manufacturing defects. Unsecured WSN in Power grid surveillance
• Outcome: Malicious data injection Unsecured WSN in Health care applications
• Outcome: patient privacy is compromised, patient data tampering can lead to wrong medication
Secure Systems Research Group - FAU
References
[1] Wireless Networks Design and Optimization class notes
[2] H S Ng, M L Sim and C M Tan, “Security issues of wireless sensor networks in healthcare applications”, BT Technology Journal, Vol 24 No.2, April 2006
[3] http://www.truststc.org/pubs/231/SIRI2006.pdf
[4] Lorincz K, Malan D J, Fulford-Jones T R F, Nawoj A, Clavel, Shnayder V, Mainland G, Welsh M and Moulton S: ‘Sensor networks for emergency response: challenges and opportunities’, Pervasive Computing, IEEE, 3, pp 16—23 (2004).
[5] Waterman J, Curtis D, Goraczko M, Shih E, Sarin P, Pino E, Ohno- Machado L, Greenes R, Guttag J and Stair T: Demonstration of SMART (Scalable Medical Alert Response Technology)’, in AMIA 2005 Annual Symposium, Washington DC, American Medical Informatics Association (2005).