security in sensor network1

Post on 14-Jun-2015

154 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Abstract 1. Introduction(sensor networks)2. Obstacles of Sensor Security3. Security Requirements4. Attacks5 Defensive Measures6. Conclusions

Introduction Uses tiny, in expensive sensor nodesvery low processing power and radio ranges permit very low energy consumption perform limited and specific monitoring and

sensing functions.

Application Agriculture and livestockOcean and wildlife monitoring, Manufacturing machinery performance

monitoring, Building safety and earthquake monitoring, Many military applications. Monitoring of highway traffic, pollution,

wildfires, building security, water quality , People’s heart rates.

key featuresscalability, security, reliability, self-healing, robustness

Obstacles of Sensor SecurityVery Limited ResourcesUnreliable CommunicationUnattended Operation

Very Limited ResourcesLimited Memory and Storage Space one common sensor type (TelosB) has an

16-bit, 8 MHz RISC CPU with only 10K RAM, 48K program memory and 1024K flash storage

Power Limitation

Unreliable Communication• Unreliable Transfer

- Conflicts - Latency

Unattended Operation • Exposure to Physical Attacks - Managed Remotely - No Central Management Point

Security RequirementsA sensor network is a special type of

network. It shares some commonalities with a typical computer network, but also poses unique requirements. Therefore, we can think of the requirements of a wireless sensor network as encompassing both the typical network requirements and the unique requirements suited solely to wireless sensor networks.

AttacksTypes of Denial of Service attacksThe Sybil attack Traffic Analysis AttacksNode Replication AttacksAttacks Against Privacy Physical Attacks

top related