0% found this document useful (0 votes)
57 views21 pages

Security Issues in Wireless Sensor Network

This document discusses security issues in wireless sensor networks. It introduces wireless sensor networks and describes some basic security schemes like cryptography, steganography, and physical layer access. It then outlines several common security threats to wireless sensor networks like denial of service attacks, Sybil attacks, and wormhole attacks. The document also reviews some proposed security schemes to improve security in wireless sensor networks, including holistic approaches that aim to enhance performance with respect to security, longevity, and connectivity over time. It concludes that most attacks compromise nodes to inject false information and that future schemes must balance security with energy efficiency.

Uploaded by

Vikas Ps
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views21 pages

Security Issues in Wireless Sensor Network

This document discusses security issues in wireless sensor networks. It introduces wireless sensor networks and describes some basic security schemes like cryptography, steganography, and physical layer access. It then outlines several common security threats to wireless sensor networks like denial of service attacks, Sybil attacks, and wormhole attacks. The document also reviews some proposed security schemes to improve security in wireless sensor networks, including holistic approaches that aim to enhance performance with respect to security, longevity, and connectivity over time. It concludes that most attacks compromise nodes to inject false information and that future schemes must balance security with energy efficiency.

Uploaded by

Vikas Ps
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 21

SECURITY ISSUES IN WIRELESS

SENSOR NETWORK
CONTENTS
Introduction
Feasibility Of Basic Security Schemes In
Wireless Security networking
Security Threats And Issues In Wireless
Security networking
Proposed Security Schemes and Related
work
Conclusion
References
1. INTRODUCTION
1.1 What is Wireless Sensor Network?
A wireless sensor network (WSN) consists of
distributed autonomous sensors to closely
monitor physical or environmental conditions(
such as temperature, sound, vibration,
pressure, motion or pollutants). The
applications supported by WSNs vary from
monitoring, tracking to controlling.
2.Feasibility of Basic Security
Schemes in Wireless Sensor
Networks
 2.1 Cryptography
 2.2 Steganography
 2.3 Physical layer Secure Access
Cryptography
 The encryption-decryption techniques devised
for the traditional wired networks are not feasible
to be applied directly for the wireless networks and
in particular for wireless sensor networks .
 Applying the security mechanisms such as
encryption could also increase delay, jitter and
packet loss in wireless sensor networks
Steganography
 Steganography aims at hiding the existence of the
message.
 Steganography is the art of covert communication
by embedding a message into the multimedia
data (image, sound, video, etc.).
Physical layer Secure Access
 Physical layer secure access in wireless sensor
networks could be provided by using frequency
hopping.
 Important points in physical layer secure access are
the efficient design so that the hopping sequence is
modified in less time than is required to discover it
and for employing this both the sender and receiver
should maintain a synchronized clock.
3. Security Threads and Issues in
Wireless Sensor Networks
 3.1 Attacks in Wireless Sensor Networks
 3.1.1 Danial of Service
 3.1.2 Attacks on Information in Transit
 3.1.3 Sybil Attack
 3.1.4 Blackhole/Sinkhole Attack
 3.1.5 Helloflood Attack
 3.1.6 Wormhole Attack
Attacks in Wireless Sensor Networks
 Security attack is a concern for wireless sensor
networks because:
 Usage of minimal capacity devices in parts of the systems
 Physical accessibility to sensor and actuator devices
 Wireless communication of the system devices
3.1.1 Danial of Service
 Denial of Service (DoS) is produced by the
unintentional failure of nodes or malicious action.
 The simplest DoS attack tries to exhaust the
resources available to the victim node, by sending
extra unnecessary packets and thus prevents
legitimate network users from accessing services or
resources to which they are entitled
3.1.2 Attacks on Information in Transit

 In a sensor network, sensors monitor the changes of


specific parameters or values and report to the sink
according to the requirement.
 While sending the report, the information in transit
may be altered, spoofed, replayed again or vanished.
3.1.3 Sybil Attack
 In many cases, the sensors in a wireless sensor
network might need to work together to accomplish
a task, hence they can use distribution of subtasks
and redundancy of information.
3.1.4 Blackhole/Sinkhole attacks
 In this attack, a malicious node acts as a blackhole to
attract all the traffic in the sensor network.
3.1.5 Hello Flood Attack
 Hello Flood Attack is introduced in this attack uses
HELLO packets as a weapon to convince the sensors
in WSN
3.1.6 Wormhole Attack
 Wormhole attack is a critical attack in which the
attacker records the packets (or bits) at one location
in the network and tunnels those to another
location. The tunneling or retransmitting of bits
could be done selectively.
4.Proposed Security Schemes
and Related Work
 4.1 Security Schemes for Wireless Sensor
Networks
 4.2 Holistic Security in Wireless Sensor
Networks
4.1. Security Schemes for Wireless Sensor
Networks
 Gives an analysis of secure routing in wireless
sensor networks. Studies how to design secure
distributed sensor networks with multiple supply
voltages to reduce the energy consumption on
computation and therefore to extend the network’s
life time.
4.2. Holistic Security in Wireless Sensor
Networks
 A holistic approach aims at improving the
performance of wireless sensor networks with
respect to security, longevity and connectivity under
changing environmental conditions.
Conclusion
 Most of the attacks against security in wireless sensor
networks are caused by the insertion of false
information by the compromised nodes within the
network.
 Many of today’s proposed security schemes are based
on specific network models.
 Even if holistic security could be ensured for wireless
sensor networks, the cost-effectiveness and energy
efficiency to employ such mechanisms
References
 [1]”Wireless Sensor Networks :Issues and challenges”
Department of Computer Engg.
Kyung Hee University, Korea
www.arxiv.org/pdf/0712.4169&embedded=true
 [2] “Security Issues in Wireless Sensor Networks” By:Zoran S. Bojkovic,
Bojan M. Bakmaz, and Miodrag R. Bakmaz
www.cs.odu.edu/~mukka/cs772f11/Lectures/day9/c-41.pdf
 [3]” Journal of Theoretical and Applied Information Technology“
www.jatit.org/volumes/research-papers/Vol13No1/3Vol13No1.pdf
 [4]” STUDY OF SECURITY ISSUES IN WIRELESS SENSOR NETWORK”By:
MANJU.V.C Kerala University, Thiruvananthapuram ,Kerala
www.ijest.info/docs/IJEST11-03-10-191.pdf
 [5]”Jitter in Networking”
en.wikipedia.org/wiki/Jitter
 [6] “Wireless Sensor Network”
en.wikipedia.org/wiki/Wireless_sensor_network

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy