Скачать презентацию Security Issues in Distributed Sensor Networks Yi Sun Скачать презентацию Security Issues in Distributed Sensor Networks Yi Sun

93b35270b967dce764aee9ae35c71c95.ppt

  • Количество слайдов: 10

Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County 2007. 10

Outline 1. 2. 3. 4. 5. Introduction Security Criteria Vulnerabilities Attack types Security Schemes Outline 1. 2. 3. 4. 5. Introduction Security Criteria Vulnerabilities Attack types Security Schemes 2

1. Introduction l Explosive growth of mobile computing devices laptops personal digital assistants (PDAs) 1. Introduction l Explosive growth of mobile computing devices laptops personal digital assistants (PDAs) handheld digital devices … l Ubiquitous computing Individual users utilize, at the same time, several electronic platforms through which they can access all the required information whenever and wherever they may be 3

2. Security Criteria l Availability Provide all the designed services l Integrity Malicious altering, 2. Security Criteria l Availability Provide all the designed services l Integrity Malicious altering, accidental altering l Confidentiality Accessible to authorized nodes l Authenticity Prove identities 4

2. Security Criteria l Nonrepudiation Cannot disavow sent or received a message l Authorization 2. Security Criteria l Nonrepudiation Cannot disavow sent or received a message l Authorization Specifies the privileges and permissions l Anonymity Privacy preserving 5

3. Vulnerabilities l Lack of secure boundaries No need to gain the physical access 3. Vulnerabilities l Lack of secure boundaries No need to gain the physical access to visit the network l Threats from compromised nodes inside the network Behavioral diversity of different nodes, mobility l Lack of centralized management facility Benign failures, trust management, cooperative algorithm l Restricted power supply Battery, Do. S, selfish node l Scalability Efficient routing protocol, key management service 6

4. Attack types l Denial of Service (Do. S) Radio jamming, battery exhaustion l 4. Attack types l Denial of Service (Do. S) Radio jamming, battery exhaustion l Impersonation Compromised nodes join the network as normal nodes l Eavesdropping Obtain confidential information during communication l Attacks against routing Attacks on routing protocols, attacks on packet forwarding/delivery 7

5. Security Schemes l Intrusion Detection Techniques Distributed and cooperative to meet with the 5. Security Schemes l Intrusion Detection Techniques Distributed and cooperative to meet with the needs of sensor networks l Secure Routing Techniques Defend specific attacks and general attacks l Medium Access Control Guaranteed or controlled access, random access l Key Management Cryptography 8

Thanks! 9 Thanks! 9

References l Y. Zhang and W. Lee, Intrusion Detection in Wireless Ad-hoc Networks, in References l Y. Zhang and W. Lee, Intrusion Detection in Wireless Ad-hoc Networks, in Proceedings of the 6 th International Conference on Mobile Computing and Networking (Mobi. Com 2000), pages 275– 283, Boston, Massachusetts, August 2000. l Jim Parker, Anand Patwardhan, and Anupam Joshi, Detecting Wireless Misbehavior through Cross-layer Analysis, in Proceedings of the IEEE Consumer Communications and Networking Conference Special Sessions (CCNC’ 2006), Las Vegas, Nevada, 2006. l Y. Hu, A. Perrig and D. Johnson, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, in Proceedings of ACM Mobi. Com Workshop - Wi. Se’ 03, 2003. l Yi-an Huang and Wenke Lee, A Cooperative Intrusion Detection System for Ad Hoc Networks, in Proceedings of the 1 st ACM Workshop on Security of Ad hoc and Sensor Networks, Fairfax, Virginia, 2003, pp. 135 – 147. l Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31), CRC Press LLC, 2003. 10