Ad Hoc MODULE-5
Ad Hoc MODULE-5
2. Integrity:
Ensuring that data sent through the network is not altered or tampered with.
Example: In healthcare sensor networks, the data on a patient's vital signs should not
be tampered with.
3. Availability:
Ensuring that the network and its services are available when required, without
interruption due to attacks or failures.
Example: In smart home networks, it is important that devices like sensors and
security cameras remain operational at all times.
4. Authentication:
Ensuring that the entities (sensors or nodes) in the network can verify each other’s
identity before allowing communication.
Example: In a disaster recovery sensor network, it is important to ensure that data is
only received from trusted sensors.
5. Non-repudiation:
Ensuring that no sender can deny having sent a message. This is crucial for
accountability in networks.
Example: In a military communication network, ensuring that a message from a
command center is traceable.
● Replay Attacks:
Attackers intercept and replay messages in the network to trick nodes into thinking they
are receiving new data.
Example: A sensor node might receive old data as if it was freshly sent, leading to
wrong conclusions.
2. Passive Attacks
These attacks involve eavesdropping and monitoring the data without altering it. Examples
include:
● Eavesdropping:
Unauthorized nodes listen to the data being transmitted in the network, gaining sensitive
information.
Example: In a military sensor network, an attacker might eavesdrop to get strategic
information.
● Traffic Analysis:
Attackers observe traffic patterns and gain insight into the network's activity without
needing to decrypt the data.
Example: An attacker might track communication between nodes to predict the
network's behavior.
🔹 Security Mechanisms for Ad-Hoc and Sensor Networks
1. Encryption:
This technique is used to secure the data being transmitted by converting it into an
unreadable format. Only authorized parties can decrypt it.
Example: A smart city sensor network uses AES encryption to secure traffic data
from the sensors.
○ Cluster-based security.
● Denial of Service (DoS): Implement rate-limiting and flow control to mitigate flood
attacks.
● Eavesdropping: Encrypt all data using strong encryption algorithms like AES to ensure
confidentiality.
🔐 Data Integrity Guarantees that the data sent is not tampered with or altered.
🛡️ Network Availability Ensures that the network remains operational despite potential
attacks.
🎯 Conclusion
Security in Ad-hoc and Sensor Networks is essential to ensure the confidentiality, integrity,
and availability of data. By employing various encryption, authentication, and intrusion
detection techniques, the risks of attacks can be minimized. However, security often comes at
the cost of higher power consumption and computational overhead, making it a trade-off
that needs careful planning for real-world deployment.
____________________________________________________________________________
Active attacks involve altering the data being transmitted in the network. These attacks can
disrupt the normal functioning of the network.
● Definition: In a DoS attack, the attacker floods the network with excessive data packets,
preventing legitimate communication.
● Impact: Network resources like bandwidth and memory are exhausted, causing
network failure or disruption.
● Real-life Example: Imagine an attacker targeting a military sensor network with fake
requests, causing it to become unavailable when real-time enemy data is needed.
● Definition: In a MITM attack, the attacker intercepts and possibly alters the
communication between two nodes without them knowing.
● Impact: The attacker can read, modify, or inject messages into the network,
compromising the integrity and confidentiality of the data.
c) Sybil Attack
● Definition: In a Sybil attack, one malicious node illegitimately creates multiple fake
identities (or nodes) to disrupt the network’s routing or decision-making process.
● Impact: Trust is undermined in the network, and the routing protocols fail to differentiate
between real and fake nodes.
d) Wormhole Attack
● Definition: In a wormhole attack, the attacker captures data packets at one point and
tunnels them to another part of the network, possibly altering the path of communication.
● Impact: It can create routing loops, cause delays, or manipulate the network's routing
table.
e) Replay Attack
● Definition: The attacker intercepts and replays the messages in the network to mislead
or confuse the recipients.
● Impact: The nodes may process outdated or malicious information, which could result in
incorrect actions being taken.
● Real-life Example: An attacker might replay a supply chain sensor network’s data to
make it appear as if a shipment was delivered, even though it wasn't.
2. Passive Attacks
Passive attacks involve eavesdropping or monitoring the network traffic without altering the
data. While these attacks do not affect the functionality of the network directly, they can lead to
significant security breaches if sensitive data is intercepted.
a) Eavesdropping (Sniffing)
● Definition: The attacker listens to the communication between nodes to gather sensitive
information, such as private keys, data, or communication patterns.
b) Traffic Analysis
● Definition: In a traffic analysis attack, the attacker observes patterns of communication
to infer network activity without decrypting the data.
● Impact: Attackers can gain insight into the network’s traffic behavior, such as
communication intervals and node locations, which could lead to an attack.
● Real-life Example: In a smart home network, an attacker might infer when someone is
at home based on the time intervals of sensor communication.
● Definition: Attackers use eavesdropping to track the location of specific nodes or users,
violating their privacy.
● Impact: It compromises the privacy of the users, revealing their movements and
potentially dangerous information about their position.
Traffic Analysis Passiv Analyzing traffic patterns Data privacy breach, behavior
e inference
2. Authentication:
○ Example: Secure AODV (SAODV) ensures that no malicious nodes can disrupt
the route discovery process.
4. Intrusion Detection Systems (IDS):
○ IDS monitor network traffic to detect any unusual behavior indicating an attack.
🔐 Data Integrity Ensures the data remains unaltered and accurate throughout
transmission.
🛡️ Network Reliability Prevents malicious attacks that could disrupt network functionality
or availability.
🔑 Authentication Ensures that only authorized nodes can participate in the network.
🎯 Conclusion
Security attacks in Ad-Hoc and Sensor Networks pose serious threats to the functioning of
these systems. However, by employing effective encryption, authentication, and intrusion
detection systems, we can mitigate the risks. It's important to stay aware of the different active
and passive attacks to ensure that these networks remain secure and reliable in real-world
applications.
____________________________________________________________________________
🔑 Key Concepts
1. Key Distribution
● Importance: Without secure key distribution, any malicious node can easily intercept or
forge messages, compromising the security of the network.
2. Key Management
● Importance: Effective key management ensures that keys are not compromised and
that communication remains secure even as nodes join or leave the network.
● Definition: Symmetric key management uses a single key for both encryption and
decryption. All nodes in the network share the same key or have pairwise keys for
communication.
● Advantages:
● Disadvantages:
● Key Pre-distribution: Keys are distributed to all nodes before deployment, often stored
in the nodes' memory.
○ Example: In pre-deployed sensor networks, every node has the same key
stored beforehand.
● Key Agreement: Nodes exchange public information and agree on a common secret
key for encryption.
○ Example: Diffie-Hellman key exchange protocol is used to agree on a secret
key between two communicating nodes.
● Definition: Asymmetric key management uses public and private keys. Each node has
a pair of keys: a public key (shared with everyone) and a private key (kept secret).
● Real-life Example: In a military sensor network, each node uses its own public/private
key pair to authenticate messages securely and prevent unauthorized access.
● Advantages:
● Disadvantages:
● Public Key Infrastructure (PKI): Uses a centralized certificate authority (CA) to issue
and verify digital certificates that contain public keys.
○ Example: In IoT sensor networks, certificates can be issued to nodes by a
trusted authority to verify their identity.
● Elliptic Curve Cryptography (ECC): A more efficient asymmetric algorithm used for
secure key exchange and data transmission.
● Definition: Each node is pre-loaded with a set of keys or a key that it can use for
communication with other nodes.
● Example: In a smart grid sensor network, each sensor node is pre-configured with a
key that allows it to communicate securely with other nodes during the network's
deployment.
● Advantages:
● Disadvantages:
● Definition: Nodes are assigned a random set of keys, and keys are only shared if two
nodes share a common key.
● Example: In a mobile sensor network, nodes randomly choose a key from a set of
available keys and can communicate only with nearby nodes that share the same key.
● Advantages:
○ May lead to key sharing failures if nodes do not have common keys.
● Advantages:
● Disadvantages:
○ Single point of failure; if the trusted party is compromised, the entire network is
vulnerable.
○ Methods:
● Key Renewal:
○ Definition: The process of refreshing or replacing old keys with new keys at
regular intervals to maintain security.
○ As the network grows, the key management system should scale efficiently. For
example, in large-scale IoT sensor networks, distributing and managing keys
for thousands of nodes can be a challenge.
○ If a node is compromised, the attacker could gain access to all the keys
associated with that node. Key revocation is essential to mitigate this risk.
○ When keys are updated or renewed, they must be synchronized across all
nodes, ensuring that all nodes use the latest keys.
2. Integrity:
○ Ensure that the keys are not altered during distribution. Digital signatures and
hashing can be used for integrity verification.
3. Authentication:
○ Ensure that the nodes requesting keys are legitimate. This can be done through
mutual authentication during key exchange.
🔹 Conclusion
Key Distribution and Management are crucial to maintaining the security of Ad-Hoc and
Sensor Networks. Effective key management ensures data confidentiality, integrity, and
authenticity while mitigating security risks. The use of symmetric, asymmetric, and hybrid
approaches for key management, along with protocols for key distribution, revocation, and
renewal, ensures secure communication in these dynamic, resource-constrained environments.
________________________________________________________________
🔐 Definition
Intrusion Detection refers to the process of monitoring and analyzing network traffic and node
behavior to identify security threats, such as unauthorized access, malicious actions, or
abnormal activities within the network.
3. Data Integrity and Confidentiality: Ensures the data exchanged between nodes
remains secure and private.
● Advantages:
● Disadvantages:
○ High false positive rate (legitimate traffic may also be flagged as abnormal).
2. Signature-Based IDS
● Example: If a known malware signature is detected in the data traffic between sensor
nodes in a military surveillance network, it is flagged as an intrusion.
● Advantages:
● Disadvantages:
3. Hybrid IDS
● Example: A hybrid IDS in a smart home sensor network might detect a DoS attack
(known signature) and also flag unusual traffic patterns as a potential zero-day
attack.
● Advantages:
● Disadvantages:
○ Advantages:
○ Disadvantages:
○ Definition: A centralized IDS relies on one central server or node to collect and
analyze all the data from the network nodes for potential intrusions.
○ Real-life Example: In smart grid networks, all data from individual nodes (like
energy meters) is sent to a centralized server for analysis.
○ Advantages:
○ Disadvantages:
○ Disadvantages:
○ Definition: This method focuses on monitoring the behavior of nodes and the
overall system. If a node behaves differently than expected (e.g., sending out
more data than usual or joining a different network), it could indicate an
intrusion.
○ Advantages:
○ Disadvantages:
● Secure Authentication:
Authenticating each node in the network ensures that only authorized nodes can join
and communicate, reducing the chances of intrusion.
● Collaborative Detection:
Nodes in the network can collaborate to share intrusion detection information,
increasing detection accuracy and resilience against attacks.
● Periodic Updates:
Constantly updating signatures or patterns in signature-based IDS ensures that the
system can detect new threats and adapt to changing attack strategies.
____________________________________________________________________________
Software-based anti-tamper techniques aim to protect the software itself, ensuring it remains in
its intended state even if an attacker gains physical access to a device.
🔐 Definition
Software-based anti-tamper techniques are security measures implemented at the software
level to detect, prevent, or respond to tampering attempts on the software of a system. These
techniques aim to preserve the integrity and authenticity of software code running on the
device, making it difficult for attackers to modify the software or gain unauthorized control.
🔹 Why is Anti-Tamper Important?
1. Preventing Unauthorized Access:
If an attacker gains access to the software of a sensor node, they could compromise the
entire network, steal data, or even manipulate its operation.
○ Advantages:
○ Disadvantages:
■ Increases complexity and may affect performance.
○ Definition: Control flow integrity ensures that the execution flow of a program
follows its intended path. Any deviation from the expected flow (such as jumping
to malicious code) is detected and prevented.
○ Advantages:
○ Disadvantages:
○ Definition: Encrypting the software code and using digital signatures ensures
that only authorized users can modify or load the software. Any tampering with
the software will cause the signature verification to fail.
○ Advantages:
○ Disadvantages:
■ Requires secure storage for encryption keys, which may not be feasible in
low-resource environments.
○ Definition: A checksum is a value calculated from the data in the software. The
checksum is stored securely, and during software execution, the system checks
whether the software code has been altered. If the checksum does not match,
tampering is detected.
○ Advantages:
■ Simple to implement.
○ Disadvantages:
○ Example: If an attacker injects code that alters the behavior of a sensor node in
an IoT-based agricultural monitoring system, self-modification detection would
catch this change.
○ Advantages:
○ Advantages:
○ Disadvantages:
4. Complexity:
Implementing multiple anti-tamper techniques in a resource-constrained environment
requires careful planning and may lead to a complex system.
____________________________________________________________________________
Let’s dive into watermarking techniques and their role in security and tamper detection.
🔐 Definition
Watermarking in Ad-hoc and Sensor Networks refers to the process of embedding a unique,
invisible code or data pattern into sensor data or transmissions. The goal is to track,
authenticate, or detect tampering with the data. If someone tries to alter the data (e.g., modify a
sensor reading), the watermark would reveal that the data has been tampered with.
○ Advantages:
○ Disadvantages:
○ Definition: This method embeds the watermark in the frequency domain of the
data. The data is first transformed (using techniques like Fourier or Wavelet
transforms), and the watermark is inserted into the transformed coefficients.
○ Advantages:
○ Disadvantages:
○ Definition: The Least Significant Bit (LSB) of data refers to the smallest bit of
information in a digital number. In LSB watermarking, the watermark is
embedded in the least significant bits of the data, making it invisible to the
human eye or unaided systems.
○ Example: In a military sensor network, where the data is highly sensitive, the
watermark could be hidden in the LSB of transmitted sensor values, ensuring that
unauthorized users can’t detect or alter the original data without leaving evidence
of tampering.
○ Advantages:
○ Disadvantages:
■ Susceptible to compression or noise, which may distort or remove the
watermark.
○ Advantages:
○ Disadvantages:
○ Definition: This involves embedding the watermark in temporal data that varies
with time, making it harder for attackers to detect or remove. This is often used in
time-series data collected by sensor networks.
○ Example: In a healthcare sensor network (e.g., for heart rate monitoring), the
watermark could be embedded into the time-series data stream of heart rate
readings, ensuring that if the data is modified or replaced, the watermark is
altered as well.
○ Advantages:
○ Disadvantages:
■ Potential for data drift making the watermark less effective over longer
time periods.
○ Even if an attacker gains access to a node, tampering with the watermark can be
detected, making it a robust mechanism for tamper resistance.
3. Resource-Efficient:
🔹 Disadvantages of Watermarking
1. Data Distortion:
📝 Memory Tips
1. Watermark = Hidden Mark:
Think of watermarking as a secret signature on your data — it’s invisible, but it proves
the data hasn’t been changed.
_______________________________________________________________
Routing attacks are one of the most serious threats to the security of Ad-hoc and Sensor
Networks. These attacks aim to disrupt the normal operation of the network by tampering with
or poisoning the routing process, which is responsible for the data transmission path between
nodes.
There are various methods to defend against routing attacks. Let's dive into the common
defense strategies and explain them in simple terms.
Before understanding the defenses, it's important to first know about the common routing
attacks that affect Ad-hoc and Sensor Networks:
○ A malicious node falsely advertises itself as the shortest path to the destination
and drops all the data packets that pass through it.
○ Two malicious nodes establish a tunnel between them and forward data through
it, causing disruption in the normal routing path.
3. Sybil Attack:
○ An attacker creates multiple fake identities to confuse the routing protocol and
cause misrouting.
○ A malicious node rushes to forward a route request, making it look like a valid
route while blocking other legitimate requests.
○ In this type of attack, the malicious node disrupts the route discovery process,
either by sending false route replies or incorrect path information.
● Definition: IDS are used to detect abnormal behavior in the network, such as unusual
routing behavior or suspicious packets, and alert the system or take corrective actions.
● Example: If a node detects that routing tables are being manipulated or unexpected
routes are being formed, it can alert other nodes to prevent further damage.
● Advantages:
● Disadvantages:
● Definition: Every node in the network can be authenticated, ensuring that only
authorized nodes participate in the routing process.
● Example: A sensor node can verify the identity of the neighboring nodes before
exchanging routing information. If a node is not authenticated, it will be ignored.
● Advantages:
● Disadvantages:
● Example: Secure AODV (Ad hoc On-demand Distance Vector) adds authentication
and encryption layers to prevent malicious modifications of routing tables.
● Advantages:
● Disadvantages:
● Definition: This involves encrypting routing messages to ensure they are not
tampered with, and performing integrity checks on the routing data.
● Example: If a route update message is encrypted, attackers cannot change the route
information without breaking the encryption.
● Advantages:
● Disadvantages:
E. Reputation-based Systems
● Definition: Nodes in the network give reputation scores to their neighbors based on
their behavior. Malicious nodes can be identified if they consistently fail to behave
properly.
● Example: If a node drops packets intentionally (like in a black hole attack), other nodes
will reduce its reputation over time, and eventually, it will be excluded from the routing
table.
● Advantages:
● Disadvantages:
F. Path Randomization
● Definition: In this approach, nodes randomly select routes to the destination rather
than always taking the same path, making it harder for attackers to predict the route.
● Example: In case of a wormhole attack, the attacker might not know which route to
intercept, as the paths are being randomized regularly.
● Advantages:
● Disadvantages:
G. Threshold Cryptography
● Example: If a node wants to send a secure routing message, it needs the cooperation of
k out of n nodes to decrypt the message or generate the encryption key.
● Advantages:
● Disadvantages:
____________________________________________________________________________
In Ad-hoc networks, where nodes dynamically form a network without any fixed infrastructure,
the security of the routing protocols is crucial. Ad-hoc networks are vulnerable to various
attacks like black hole attacks, wormhole attacks, Sybil attacks, and more. To combat these,
secure routing protocols are designed to ensure that only trusted nodes participate in the
communication process, and the network remains resilient against malicious actions.
● Key Features:
○ Secure Route Discovery: Encrypts the route request and response to prevent
tampering.
● Real-life Example: Think of SAODV as a secure email system where each message
sent requires a digital signature, ensuring that the sender is legitimate and the content
has not been altered in transit.
● Advantages:
● Disadvantages:
○ Route Signature: Ensures that the route in the route request is valid and
originates from a legitimate source.
○ Route Integrity: Prevents malicious nodes from tampering with the route
information.
● Real-life Example: Secure DSR is like an official document where every route is
digitally signed, ensuring the authenticity of the sender and preventing tampering of
information.
● Advantages:
○ Provides route verification to ensure that the route data is not modified.
● Disadvantages:
C. Ariadne
● Key Features:
● Real-life Example: Ariadne acts like a secure bank transaction system, ensuring that
only verified and authorized users can participate in the routing process, just like how
only authenticated bank users can access their accounts.
● Advantages:
○ Resistant to black hole attacks where malicious nodes try to absorb data
packets.
● Disadvantages:
● Key Features:
○ Efficient Security: Low overhead compared to other secure protocols due to its
lightweight cryptographic approach.
● Real-life Example: SEAD is like a bank vault where every update or transaction is
logged securely, preventing attackers from altering the records.
● Advantages:
● Disadvantages:
○ Vulnerable to some attacks (like wormhole or Sybil) due to the lack of node
authentication.
3. Comparison of Secure Routing Protocols
5. Conclusion
Secure ad-hoc routing protocols provide essential protection against various attacks that aim to
disrupt the routing process in ad-hoc and sensor networks. By implementing cryptographic
methods, authentication, and integrity checking, these protocols ensure that only legitimate
nodes are part of the network and can communicate effectively without being compromised.
Understanding the various security mechanisms and their advantages and disadvantages will
help you choose the most suitable protocol based on your specific network needs.
Broadcast authentication aims to verify the identity of the sender, protect against malicious
node behavior, and ensure that the messages are not altered during transmission.
1. Why Broadcast Authentication is Important in WSNs?
● Resource Constraints: Sensor nodes are typically low-powered and have limited
memory, processing capacity, and battery life. This makes it difficult to use
traditional, heavy cryptographic techniques.
1. Authentication: Verifying the source of the message. Only trusted nodes should be
able to send messages to the network.
2. Integrity: Ensuring that the broadcast messages are not altered during transmission,
preventing attackers from modifying the data.
3. Efficiency: Since sensor nodes have limited resources, broadcast authentication
schemes should be lightweight and energy-efficient.
4. Scalability: As WSNs can consist of hundreds or thousands of nodes, the broadcast
authentication protocol must work effectively in large-scale networks.
5. Minimal Overhead: The protocol should add minimal communication overhead,
ensuring that the network resources are not overly burdened.
3. Broadcast Authentication Techniques in WSNs
There are several methods used for broadcast authentication in WSNs. The primary goal of
these techniques is to protect the network from attackers while preserving node resources.
In symmetric key-based broadcast authentication, all nodes in the network share a common
secret key or have pairwise shared keys with each other. This shared key is used to encrypt
and authenticate the messages.
● Key Features:
○ Receiver nodes can verify the authenticity of the message using the MAC and
the common secret key.
○ If the message is tampered with, the MAC will not match, indicating the
message’s lack of integrity.
● Advantages:
● Disadvantages:
● Key Features:
○ The public key can be used by the receiver nodes to verify the signature.
○ Digital signatures are used to authenticate the message and verify its integrity.
● Advantages:
● Disadvantages:
● Key Features:
○ Lower level nodes send data to a higher level node for authentication.
○ These high-level nodes sign the messages and then broadcast them to
lower-level nodes.
● Real-life Example: This can be compared to how a central server authenticates and
approves requests before they are sent out to a larger network, like a website
verification system where only the trusted server handles sensitive transactions.
● Advantages:
● Disadvantages:
● Replay Attacks: Malicious nodes may capture broadcast messages and replay them
later. Mechanisms like timestamps or nonce values can be added to prevent such
attacks.
● Malicious Nodes: Nodes that do not follow the protocol can broadcast false or altered
messages. Ensuring node authentication and message integrity is key to preventing
this.
○ BM utilizes hash chains and sequential keys for authentication, providing low
communication overhead while ensuring message integrity.
● "LEAP = Efficient Local Keying": LEAP is all about local encryption with shared
keys, making it lightweight but still secure.
Conclusion
Broadcast authentication is essential for ensuring the security, integrity, and authenticity of
messages in Wireless Sensor Networks (WSNs). By employing methods like symmetric key
authentication, public key infrastructure, and hierarchical systems, WSNs can safeguard
against common attacks while maintaining efficiency. Understanding the trade-offs in terms of
computation, communication overhead, and scalability will help in choosing the right
authentication method for a given WSN deployment.
__________________________________________________________________________
TESLA is used to secure broadcast communications by ensuring that nodes can verify the
source of a message and its integrity, even in situations where the network is vulnerable to
attackers trying to inject malicious or altered data.
○ TESLA is designed for networks with limited resources (like WSNs), where
conventional methods like public-key cryptography would be too costly in terms
of both computation and energy.
2. Time-based Key Disclosure:
○ TESLA is optimized for streaming data, where continuous data (e.g., sensor
readings) is being transmitted, and the protocol allows for the efficient
authentication of each message in the stream.
5. Loss-Tolerant:
○ The sender node generates a key chain of secret keys. These keys are
generated in a sequential manner, where each key is derived from the previous
one.
○ For example, if the key chain consists of keys K1,K2,K3,…K_1, K_2, K_3, \dots,
the sender will start with K1K_1 and keep generating subsequent keys
K2,K3,…K_2, K_3, \dots until the last key.
○ The receiver node cannot authenticate the message immediately because the
next key in the chain (e.g., K2K_2) is required for verification, but it is not
disclosed yet.
○ After a predefined time period, the sender node reveals the next key in the key
chain (e.g., K2K_2). This key allows the receivers to verify the authenticity of the
previous messages that were sent.
○ When a node receives a message, it waits for the appropriate key (revealed at
the next time step) to authenticate the message. Once the key is disclosed by the
sender, the receiver can verify the authenticity of the message using that key.
○ After the key K1K_1 is used to authenticate a message, the next key K2K_2 in
the chain is revealed for use in authenticating the following message. This
process continues in a timed sequence.
3. Advantages of TESLA
1. Efficient:
5. Scalability:
○ TESLA can be effectively scaled for large networks of sensor nodes, making it
suitable for massive deployments.
4. Disadvantages of TESLA
○ Since keys are revealed after a delay, there is a time gap between when the
message is sent and when it can be authenticated. This can introduce latency.
○ TESLA may be vulnerable to replay attacks if keys are not updated frequently or
if an attacker intercepts and replays old messages. This can be mitigated by
using timestamps or sequence numbers.
○ If the sender’s key chain is compromised, the entire chain becomes vulnerable,
leading to potential security breaches.
5. Real-Life Example of TESLA
● TESLA can be used to ensure that the data received at the base station is authentic
and has not been tampered with, even if some of the sensor nodes are located in remote
or insecure locations.
6. Applications of TESLA
● "Time is Key": TESLA relies on the timed disclosure of keys. Remember that the key
you receive to authenticate a message is revealed after a certain time.
● "Delayed Authentication": The authentication is delayed until the next key in the chain
is disclosed. So, time-based delays in key disclosure are a key characteristic of TESLA.
● "Key Chain = Secure Messages": TESLA’s security is based on the key chain: each
key is linked to the next, ensuring secure transmission of data.
Conclusion
___________________________________________________________________________
The Biba Security Model is a formal security model focused on maintaining data integrity. It
was designed to prevent data from being modified inappropriately by unauthorized users or
processes. Unlike models that emphasize confidentiality (like Bell-LaPadula), the Biba model
is focused on ensuring that data is not altered in an unauthorized or accidental manner.
1. Key Features of Biba
1. Integrity-Focused:
○ Biba prioritizes data integrity rather than confidentiality. The goal is to prevent
unauthorized users from modifying or tampering with data.
○ The No Write Down (NWD) policy prevents users from writing data to a lower
integrity level (e.g., writing high-level data to low-level classified areas).
○ The No Read Up (NRU) policy ensures that users at a lower integrity level
cannot read data from a higher integrity level, which might be considered to be
more trustworthy.
○ In the Biba model, each subject (user, process) and object (data) in the system is
assigned an integrity level. These levels determine how subjects can interact
with objects.
2. Working Principle of Biba Model
○ Example: If a user with a low integrity level (like a regular user) tries to write to a
highly secure or trusted system (like a database containing critical data), this is
not allowed.
○ A subject at a higher integrity level cannot read data from an object at a lower
integrity level. This is called No Read Down (NRD).
○ Example: A highly trusted user (like a system administrator) cannot access data
that is considered untrustworthy or corrupted (low integrity level), as reading
such data could lead to incorrect processing or decisions.
○ A subject cannot write to an object at a lower integrity level, ensuring that data
cannot be downgraded by a less trusted user.
○ A subject’s integrity level is the highest integrity level it has ever been granted.
○ The model enforces strict rules for reading and writing data, ensuring that only
authorized users can modify or view data at certain levels.
○ Implementing Biba can be complex, especially in systems where there are many
levels of integrity and access control rules.
○ The Biba model does not address data confidentiality, so it cannot protect
against unauthorized data disclosure. For confidentiality, another model (like
Bell-LaPadula) would be required.
○ In a banking application, it's crucial that no one with low-level access (such as
a cashier) can tamper with the account balance of a high-level account (like that
of a manager or director). Using the Biba model, cashiers (low integrity) cannot
write to or alter the high-level account balances. Moreover, managers (high
integrity) cannot accidentally access or alter low-level data (like routine
customer records).
○ Biba is commonly used in systems where data integrity is the highest priority,
like financial systems, medical records, or legal documents.
○ The Biba model can be used in military applications to ensure that lower-level
users do not alter or corrupt classified information.
Ensures that users cannot tamper with or Ensures that sensitive data is not disclosed
corrupt data. to unauthorized users.
Does not address data confidentiality. Does not address data integrity.
○ The Biba model is all about ensuring that data remains uncorrupted, and no
unauthorized user can change it.
○ The simple rules: Users can’t write to a higher level, and they can’t read from a
lower level. Write Up and Read Down are key restrictions.
○ The higher the integrity level, the more trusted the data and the user interacting
with it.
Conclusion
The Biba Security Model provides a strong foundation for ensuring data integrity by enforcing
rules that prevent unauthorized modification of data. It is especially useful in systems where
trustworthiness and accuracy of data are paramount. While it does not address
confidentiality, it plays a critical role in securing data from corruption or tampering, particularly
in industries like banking, government, and healthcare.
____________________________________________________________________________
Wireless Sensor Networks (WSNs) are deployed in various applications like military
surveillance, environment monitoring, and smart cities. Due to the sensitive nature of the
data they collect and transmit, security is a crucial concern in these networks. Sensor networks
face several challenges such as limited computational resources, energy constraints, and
unreliable communication. Thus, security protocols in sensor networks must be designed to
ensure data confidentiality, integrity, and availability while being energy-efficient.
1. Confidentiality:
○ Ensures that sensitive information collected by the sensor nodes is not exposed
to unauthorized entities.
2. Integrity:
3. Authentication:
○ Ensures that the nodes communicating in the network are legitimate and trusted.
4. Availability:
○ Ensures that the sensor network remains operational and that data can be
accessed when needed.
○ Symmetric encryption (e.g., AES) and asymmetric encryption (e.g., RSA) are
commonly used.
○ Example: TinySec (an end-to-end security protocol for sensor networks) uses
symmetric encryption for efficient and low-latency communication.
○ These protocols help verify the identity of the nodes and ensure that only
authorized nodes can participate in the communication.
○ These protocols are responsible for securely distributing and managing keys
between sensor nodes to ensure secure communication.
○ Routing protocols ensure that data is transmitted securely from one node to
another.
○ They prevent attacks such as black hole attacks (where malicious nodes drop
or alter data) and selective forwarding attacks.
○ It allows sensor nodes to share keys efficiently and securely with their neighbors
without requiring a global key management scheme.
○ Key Features:
■ Efficient authentication.
3. TinySec:
○ It operates at the data link layer and uses symmetric encryption (such as
AES) to secure the data.
2. Scalability:
○ As the number of sensor nodes in the network increases, security protocols must
be able to scale effectively without causing significant overhead.
TinySec Operates at the link layer, reducing Not suitable for networks with high-speed
the need for high-level encryption. data transmission.
Conclusion
Security in Wireless Sensor Networks (WSNs) is critical for ensuring the integrity,
confidentiality, and authenticity of the data transmitted across the network. Given the limited
resources of sensor nodes, security protocols must be efficient and lightweight. Protocols like
SPINS, LEAP, TinySec, and SEAD provide effective security solutions for WSNs by addressing
key concerns such as key management, encryption, and secure routing. However,
challenges such as resource limitations, scalability, and physical security need to be
considered when designing and implementing these protocols.
____________________________________________________________________________
○ How it works:
■ Confidentiality: Encrypts the data being sent over the network using a
shared symmetric key.
○ How it works:
■ The nodes in the network authenticate messages after they have been
sent, ensuring that messages are genuine and not altered by an attacker.
Advantages of SPINS
○ Both protocols together ensure that the data is not tampered with, and only
legitimate nodes can participate in the network.
3. Scalable:
SPINS scales well in terms of its ability to securely manage communication between
large numbers of sensor nodes, as it doesn’t require a centralized management
system and works on a distributed key management scheme.
Disadvantages of SPINS
○ Each node in the WSN is pre-configured with a shared key with neighboring
nodes for secure communication.
○ Keys are distributed during the deployment of the network, and each node can
only communicate securely with those to which it shares a key.
○ The recipient node verifies the message by checking the MAC and decrypting
the message using the shared key.
○ When a node broadcasts a message, the μTESLA protocol ensures the integrity
and authenticity of the message. The sender uses a key chain and shares a
series of keys with future disclosure to prove the authenticity of the broadcast
message.
○ The receiving node can authenticate the message by checking the integrity and
verifying the authenticity of the key chain.
Conclusion
SPINS is a robust and energy-efficient security protocol designed to ensure data
confidentiality, authentication, and integrity in Wireless Sensor Networks (WSNs). By
using lightweight encryption techniques and efficient broadcast authentication, it addresses the
challenges posed by the resource-constrained nature of sensor nodes. While it does have
limitations such as key distribution overhead and delayed authentication (μTESLA), it
remains a suitable solution for securing sensor networks in applications like environmental
monitoring, military surveillance, and healthcare systems.