Adversary model in wireless sensor networks pdf

Cryptanalysis and improvement of a dynamic and secure key. The red and green circles represent the communication ranges of the victim and attacker nodes, respectively. Pdf node capture attacks in wireless sensor networks. Wireless sensor networks wsns have attracted a lot of interest over the last decade in wireless and mobile computing research community. Modeling node capture attacks in wireless sensor networks invited paper patrick tague and radha poovendran network security lab nsl, electrical engineering department, university of washington, seattle, washington email. Abstractin wireless sensor networks, adversaries can make use of traffic. Accordingly, we present a survivability evaluation model to model and assess the survivability of wireless sensor networks. Resilient cluster leader election for wireless sensor networks. Kui ren, member, ieee, wenjing lou, member, ieee, kai zeng, student member, ieee, and patrick j. The batteries in sensor networks may not be rechargeable. Recent advances insemiconductor, networking and material science technologies are driving the ubiquitous deployment of largescale wireless sensor networks wsns. A more practical adversary model is the local adversary model 4,5,811. Nodes and they can be automatically organized to form an adhoc network.

Manets have high degree of mobility, while sensor networks are mostly stationary. Abstractin wireless sensor networks, adversaries can make use of traffic information to locate the monitored objects, e. A wireless sensor node is equipped with sensing and computing devices, radio transceivers and power components. It is certainly possible that a malicious sensor node is elected as the cluster leader at some point. Due to its advancements wireless sensor networks are exposed to a number of threats.

Now, let n g and n adv denote the set of nodes in target network and adversary s network respectively and let total monitored area be a. Wireless sensor network uwsn hostile deployment environment no constantly present sink itinerant, visits periodically periodic data sensing nodes might retain data for a long time data is valuable nodes are mostly left on their own adversary roams around with impunity adversary has lots of time challenge. Abdelshakour abuzneid coadvisor dissertation submitted in partial fulfilment of the requirements for the degree of doctor of philosophy in computer science and. Eventbased trust framework model in wireless sensor networks haiguang chen1,2, huafeng wu 2,3, jinchu hu1, chuanshan gao2 1mathematic and science college 2dept. Ande prasad 2 1research scholar, vikrama simhapuri university, nellore email. Pdf cdaclone detection algorithms in wireless sensor. The network and adversary models are discussed in section 3. The sn is a powerful node with high performance and is used to collect all the information sensed by the sensor nodes.

They proposed a signcryption algorithm which is the main building block in their key management. To provide security, communication should be encrypted and. Eventbased trust framework model in wireless sensor. Wireless sensor networks can be used to monitor the condition of civil infrastructure and related geophysical processes close to real time, and over long periods through data logging, using appropriately interfaced sensors. Among which clonetion is one of the most harmful threats. Adversary detection in wireless sensor networks under.

Citeseerx document details isaac councill, lee giles, pradeep teregowda. The open nature of wireless communication makes it easy for attackers to eavesdrop or inject data packets in a sensor network. Signal strength based hello flood attack detection and. Wlans, wireless personal area networks wpans, wireless sensor networks wsns, ad hoc networks, mobile telephony, wireless mesh networks wmns and cyber physical systems cpss. Applications of wsns are numerous and growing, which range from indoor deployment scenarios in the home and office to outdoor deployment in adversarys territory in a tactical battleground. Users may join or leave a wahn at any time resulting in routing and security problems. Adversary information gathering model for node capture. Early work in wireless sensor networks envisioned sensor networks to be composed of socalled smart dust 142. It would be spread over an area where a phenomenon, such as humidity or temperature, was to be measured.

A novel approach for probabilistic dual source location. Networking issues in wireless sensor networks deepak ganesan, alberto cerpa, wei ye, yan yu, jerry zhao, deborah estrin abstract the emergence of sensor networks as one of the dominant technology trends in the com. Once the adversary controls a set of sensor nodes, these nodes can be arbitrarily altered in terms of both software programming and hardware conguration, including attacks such as node cloning 6. Several metrics of relevance in wireless sensor networks, brief explanations of their formulations, and example values, are listed in table i. First, we describe the adversary model, the objectives of attacks against routing, as well as the different attack methods that may be used in wireless sensor networks. Low processing power and wireless connectivity make such networks. A global adversary divides the entire deployment area into a n. Sustaining the temporal privacy of an event in a wireless sensor network wsn is a critical task. Wireless sensor networks have been widely deployed in many applications and drawn more attentions. In a wsn, an external adversary can, however, gain access into the network as a valid user by physically attacking, or capturing, sensor nodes and extracting the. Much of prior research explored various aspects of wireless sensor networks wsns, including. At this time there is a limited number of textbooks on the subject of wireless sensor networks.

Modeling node capture attacks in wireless sensor networks. Protecting receiverlocation privacy in wireless sensor networks. In recent years, sensors and sensor networks have been extremely popular in the research community. Modelling adversaries and security objectives for routing. Defending wireless sensor networks against adversarial. Threat models and security issues in wireless sensor networks. As depicted in figure 1, the blue nodes represent the network nodes, the green node is a victim node and the red node represents the adversary. Secure kconnectivity in wireless sensor networks under an. On broadcast authentication in wireless sensor networks. Abdelshakour abuzneid coadvisor dissertation submitted in partial fulfilment of the requirements for the degree of doctor of philosophy in computer science and engineering. Citeseerx a cloudbased scheme for protecting source. Samram adversary model to prevent security attacks and network degradation problems in wireless sensor networks d. Pdf modelling adversaries and security objectives for. In this chapter, we study how sensor network routing protocols can be secured.

Data security in unattended wireless sensor networks roberto di pietro, luigi v. Sensor networks inherit all aspects of wireless networks and they have their own distinct characteristics that make the design of a security model for sensor networks different from that of ad hoc networks. These techniques include manual microprobing, laser cutting, focused. In this paper, we introducethe problemof temporalprivacy fordelaytolerant sensor networks and propose adaptive buffering at intermediate nodes on the sourcesink routing path to obfuscate temporal information from an adversary. Together, these technologies have combined to enable a new generation of wsns that differ greatly from wireless networks developed. A privacypreserving location monitoring system for. It identifies the research that needs to be conducted on a number of levels to design and assess the deployment of wireless sensor networks, and provides an in depth analysis of the development of. The objective of the proposed network structure is to minimize delays in the data collection processes of wireless sensor networks which extends the lifetime of the network. Node capture attack is one of the most dreadful security attack exist in wireless sensor networks.

A pairwise key predistribution scheme for wireless sensor networks wenliang du and jing deng syracuse university. It has a preplanned criteria that how to deploy the sensor nodes in large geographical area. Pdf anonymity against global adversary in wsns using dummy. For example, an adversary can easily listen to the trafc, impersonate one of the network nodes, or intentionally provide misleading information to other nodes. However, security of these routing protocols has fallen beyond the scope so far. A lightweight intrusion detection framework for wireless. In our system, we design two in network location anonymization algorithms, namely, resource and qualityaware algorithms, that aim to enable the system to provide high quality location monitoring services for system users, while preserving. Wireless sensor networks wsns, denial of service dos attack, sybil. Introduction wireless networking is a key enabler for mobile communication systems, that range from cellular infrastructurebased data networks and wireless local area networks wlans to disasterrelief, tactical, and sensor networks, and short.

These networks are used to monitor physical or environmental conditions like sound, pressure, temperature, and cooperatively pass data through the network to the main location as shown in the figure. Wireless sensor networks 118 wireless sensor networks 4 fig. Wireless sensor networks wsn provide a bridge between the real physical and virtual worlds allow the ability to observe the previously unobservable at a fine resolution over large spatiotemporal scales have a wide range of potential applications to industry, science, transportation, civil infrastructure, and security. It is done by the unauthorized node that eavesdrop the packets exchanged between the sensor nodes during their communication. Introduction to wireless sensor networks types and applications. Wireless integrated network sensors wins technology that began to appear with the commercialization of the internet has made it possible to access the wireless sensor network through an internet network.

Next classification of attacks is based on network. Connectivity, resilient and unsplittability are the essential requirements of any wireless sensor network wsn. In this model, the adversary can monitor a local area with a similar size to that of a sensor nodes communication area and knows all the radio actions in this area. Decentralized hypothesis testing in wireless sensor. Wireless sensor network is a new paradigm in designing fault tolerant mission. No comprehensive study lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In particular, security issues in wsns have received a lot of attention. A cluster may include a few compromised sensor nodes. Introduction wireless sensor networks wsn are emerging as both an important new tier in the it ecosystem and a rich domain of. Wireless sensor networks may be considered a subset of mobile adhoc networks manet. A survey of intrusion detection in wireless network. A sensor is a tiny device with only a small amount of memory and computing power.

A wireless power transfer technique can solve the power capacity problem in wireless rechargeable sensor networks wrsns. In these applications, the sensor node senses the existence of objects and transmitting data packets to the sink node sn in a multi hop fashion. Maximizing data survival in unattended wireless sensor. In 2012, alagheband and aref presented a dynamic and secure key management model for hierarchical heterogeneous sensor networks. Such projects were carried out in ucla university in 1993, and the stardust project developed in uc berkeley in 1998 1. In wireless sensor networks, the adversary uses wireless devices to attack the systems, and it is more reasonable. Wireless sensor network security model using zero knowledge. Pdf source anonymity in wireless sensor networks wsns becomes a real. Achieving source location privacy protection in monitoring wireless. A wsn is usually composed of multiple sensor nodes that are spread out in a large deployment area and a bs. Playing hideandseek with a focused mobile adversary in. Mancini, claudio soriente, angelo spognardi, and gene tsudik abstractin recent years, wireless sensor networks wsns have been a very popular research topic, offering a treasure trove of systems, networking, hardware, security, and applicationrelated problems.

Security and privacy in unattended sensor networks or how to. Security analysis of reliable transport layer protocols for wireless sensor networks. In wireless sensor networks, the adversary uses wire less devices to attack the systems, and it is more reasonable to assume that the adversary can interfere with communi. Wireless sensor networks wsns have been utilized for many applications such as tracking and monitoring of endangered species in a national park, soldiers in a bat. As indicated in section ii, the goal is to maximize the accuracy of adversary tracking by the sensors i. Securing wireless sensor network using intelligent techniques. Wsn nodes have less power, computation and communication compared to manet nodes. Abstractpreserving source location privacy in wireless sensor networks can be critical for several practical applications. Similar to 4, in this paper, we develop an adversary model that is di. Wireless sensor networks an overview sciencedirect topics. Optimizing source anonymity of wireless sensor networks against global adversary using fake packet injections anas bushnag under the supervision of dr. Basically, sensor nodes are spread throughout the deployment area of a wsn. Adversary detection in wireless sensor networks under byzantine attacks 44. Applications of wsns are numerous and growing, which range from indoor deployment scenarios in the home and office to outdoor deployment in adversary s territory in a tactical battleground.

From an adversarial point of view, the privacy of an event of interest can be breached by analyzing the traffic which emanates from a particular region. A practical study of transitory master key establishment. In laptop class attacks an adversary can use more powerful devices e. Most security protocols for wireless sensor networks wsn assume that the adversary can gain full control over a sensor node through direct physical access node capture attack. In this paper, we propose a secure and efficient scheme to protect query processing in clusterbased sensor networks. In this paper we consider the problem of decentralized detection in wireless sensor networks. Secure kconnectivity in wireless sensor networks under an onoff channel model jun zhao dept.

The survivability model is represented and modeled as a state transition to reflect the status of real wireless sensor networks and to model the transition of the wsns from one state to the other. A cloudbased scheme for protecting sourcelocation privacy. This may be due to energy levels, as in sensor networks, or just the dynamic nature of the users, as in the ad hoc internet network connection. Though there are various attacks in wireless sensor networks, but certain active attacks, that can be detected with our proposed model are as follows. We propose a method for identifying the compromisedcloned nodes and also verifying the authenticity of sender sensor nodes in wireless sensor network with the help of zero knowledge. A pairwise key predistribution scheme for wireless sensor. In contrast to traditional wireless networks, special security and performance issues have to be carefully considered for sensor networks 21. Wireless sensor networks wsns have attracted a lot of interest over the last decade in.

Each node communicates with the neighboring nodes within its range. The goal of this paper is to develop a security model for wireless sensor networks. An untraceable data sharing scheme in wireless sensor networks. Wireless sensor networks wsns have been widely deployed to monitor valuable objects. In this mesh topology, sensor nodes must not only capture and disseminate their own data, but also serve as relays for other sensor nodes, that is, they must collaborate to propagate sensor data towards the base station. A new direction for source location privacy in wireless. Resilient and secure wireless sensor network under non. The charging strategy is a widespread research problem. The adversary is represented by adversarial nodes in the network.

Monitoring, control and automation explores the explosive growth that has occurred in the use of wireless sensor networks in a variety of applications during the last few years. These sensor networks have limitations of system resources like battery power, radio range and processing capability. These devices have greater transmission range, energy. Wsn is a wireless network that consists of base stations and numbers of nodes wireless sensors. Furthermore, most of these books are written with a speci. Introduction in recent years, sensors and sensor networks have been extremely popular in the research community. Energy efficient finite range query scheme for detecting. There are currently enormous approaches in the field of wireless sensor networks security. A survey of recent trends in general security requirements, typical security treats, intrusion. Energy efficient finite range query scheme for detecting mobile adversary replica nodes in wireless sensor networks abstract with the growing demand in wireless sensor network wsn, adversary attack on sensor node becomes major issue in current wsn deployment. Routing is a fundamental functionality in wireless networks, thus hostile interventions aiming to disrupt and degrade the routing service have a serious impact on the. The remainder of this paper is organized as follows. The hotspot phenomenon and the hotspotlocating attack are discussed. Threat models and security issues 31 in outsider attack attacker has no access to wireless sensor network.

Malicious node detection in wireless sensor networks using. Smart dust would be composed of large numbers of tiny electronic systems with sensing, computation, and communication abilities. Introducing epidemic models for data survivability in. An adversary steals cryptographic key or other confidential information like nodes id etc from. Some wireless sensor networks preclude the constant presence of a centralized data collection point, that is, a sink. Blockchain trust model for malicious node detection in. We assume that the adversary is not perfectly global.

We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. A survey of intrusion detection in wireless network applications. Security analysis of reliable transport layer protocols. Furthermore, if the operating environment is hostile, there is a very real danger of. Bakmaz abstract this work deals with some security issues over wireless sensor networks wsns. It is an important problem to preserve the privacy of sensitive data in clusterbased query processing in wireless sensor networks.

Temporal differential privacy in wireless sensor networks. Wireless sensor networks wsn are used in almost every area of life. First, it gives the whole framework of the trust model. All these are illustrated by example attacks on wellknown sensor network routing protocols.

The literature is very broad considering routing protocols in wireless sensor networks wsns. Malicious node detection in wireless sensor networks. The individual nodes in a wireless sensor network wsn are inherently resource constrained. Keywords sensor, security, attack, holistic, challenge. Wireless sensor networks are used to monitor wine production, both in the field and the cellar. Source anonymity in wireless sensor networks wsns becomes a real. In such a disconnected or unattended setting, nodes must accumulate sensed data until it can be off loaded to an itinerant sink.

Abstractbroadcast authentication is a critical security ser vice in wireless sensor networks wsns, since it enables users to broadcast the wsn in an authenticated way. For example, due to the unattended nature of sensor networks, an attacker could launch various attacks and even compromise sensor devices without being detected. Wireless sensor networks introduction to wireless sensor networks february 2012 a wireless sensor network is a selfconfiguring network of small sensor nodes communicating among themselves using radio signals, and deployed in quantity to sense, monitor and understand the physical world. Resilient networking in wireless sensor networks 5 limited memory and limited computing power. Wireless sensor networks wsns have shown great potential in serving a wide variety of applications that operate in hostile environments such as combat field reconnaissance, border protection, and security surveillance. Maximizing data survival in unattended wireless sensor networks against a focused mobile adversary roberto di pietroa, luigi v. Furthermore, unlike other wireless networks composed. In this paper, we first define a hotspot phenomenon that causes an obvious inconsistency in the network traffic pattern due. This access into the network and control of sensor nodes.

Pdf in this paper we address the problem of physical node capture attacks in wireless sensor. Wireless sensor network is a highly distributed network of small lightweight wireless sensor nodes, deployed in large numbers to monitor the environment or system. Clone attack in clone attack, an adversary may capture a sensor node and copy the crytographic information to another node known as cloned node. Sensor networks, routing protocols, adversary model. This means that the result of a given round of leader election is only affected by the network connec tivity during that round. Manual verification is stepwise execution of the protocol model, where each. Adversary information gathering model for node capture attack.

For example, the common sensor type micaz has only 4kb of ram, 128kb of rom, 512kb of. Abstract wireless sensor networks are prone to node misbehavior arising from tampering by an adversary byzantine attack, or due to other factors such as node failure resulting from hardware or software degradation. Wireless sensor networks characterized by the sporadic presence of the sink. Samram adversary model to prevent security attacks and. Secure and efficient clusterbased range query processing in.

1421 1131 819 1251 1087 772 970 879 1550 81 1256 1363 837 51 201 1333 1183 1289 837 889 959 308 375 1147 1118 1418 782 1527 443 677 1457 590 771 873 832 522 386 1174 993