38
SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Embed Size (px)

DESCRIPTION

SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath. AGENDA. Sensor Networks Wireless Sensor Networks vs. Ad- Hoc Networks Sensor Network Security Challenges Attacks on Sensor Network routing Securing the Wireless Network Summary. Sensor Networks. - PowerPoint PPT Presentation

Citation preview

Page 1: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

SECURE ROUTING IN WIRELESS SENSOR NETWORKS

Gayathri VenkataramanPreeti Raghunath

Page 2: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

AGENDA Sensor Networks

Wireless Sensor Networks vs. Ad- Hoc Networks

Sensor Network Security Challenges Attacks on Sensor Network routing Securing the Wireless Network Summary

Page 3: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Sensor Networks A sensor network is composed of a large number of sensor nodes

that are densely deployed either inside the phenomenon or close it . Each of these sensor nodes collect data and transmit to the sink using special routing protocols. The sink may communicate to the task manager using Internet or satellite [1].

Figure 1 Sensor nodes communicationSource : http://www.cdt.luth.se/babylon/snc/References/Akyildiz2002_SurveySensorNets_01024422.pdf Retrieved August 22, 2003

Page 4: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

What is a Sensor Network? Heterogeneous system that combines tiny

sensors and actuators with general purpose computing elements.

Sensor readings from multiple nodes can be processed by one or more aggregation points

Page 5: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Base Station Sensor Networks have one or more points

of centralized control called Base Stations. Base stations are either:

– Gateway to another network– Data processing or storage center– Access point for human interface.

Page 6: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Sensor Network ArchitectureBase Stations

Sensor Nodes

Aggregation points

Page 7: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Constraints of Wireless Sensor Networks

Sensor Networks are resource-starved when it comes to:– Computational power– Memory– Bandwidth– Power

Page 8: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Sensor Networks VS. Ad Hoc Networks

Ad-Hoc Network supports routing between any pairs of nodes.

Sensor Networks have a specialized communication pattern:– Many to One– One to Many– Local Communication

Page 9: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Security challenges in Wireless Sensor networks (1 of 3)

Network Assumptions:– Radio links are not secure– Attackers can deploy malicious nodes into the

network. Trust Requirements:

– Base Stations are trusted nodes– Aggregation points maybe trusted for certain

protocols

Page 10: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Security challenges in Wireless Sensor networks (2 of 3)

Threat models:– Mote-Class attackers: Sensor nodes are used for

attacks. Sensor can eavesdrop only nodes in its vicinity.– Laptop-Class attackers: More sophisticated. Can

eavesdrop or jam entire network.– Outsider attacks: Attacker has no special access to the

sensor network.– Insider attacks: An authorized participant of the

network has gone bad by running malicious code.

Page 11: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Security challenges in Wireless Sensor networks (3 of 3)

Security Goals:– Protection against eavesdropping is

responsibility of application layer not routing algorithms.

– However, eavesdropping caused by abuse of routing protocol is the responsibility of protocols.

– Graceful degradation of network in case of insider attack.

Page 12: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Attacks on Sensor Networks (1 of 3)

Spoofing: Altering, spoofing or replaying routing information between nodes.

Selective Forwarding: Malicious nodes does not forward any packets or selectively forwards packets.

Page 13: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Attacks on Sensor Networks (2 of 3)

Sinkhole attack: – Here the attacker’s goal is to lure all the traffic through

a compromised node– Other nodes in the path have opportunities to tamper

with application data Sybil attack:

– A single node presents multiple identities. Wormholes:

– Attacker tunnels messages received in one part of the network over a low-latency kink and replays them in a different part.

Page 14: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Attacks on Sensor Networks (3 of 3)

HELLO Flood attack: An attacker with enough transmission power convinces every node in the network that the attacker is the neighbor.

Acknowledgement spoofing:– Link layer acknowledgements are spoofed to

convince a weak link is strong and vice-versa.

Page 15: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Attacks on Specific Routing Protocols

Gayathri Venkataraman

Page 16: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Special Routing Protocols! Why???

A typical mote has 4MHz processor, 128 KB of instruction memory, 4 KB of RAM data, and 512 KB of flash memory. The whole device is powered by two AA batteries. So the requirement of special routing protocols with

Less computationLess memorySimpleNo global identification like IP address

Page 17: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Challenges For Security

Resource starved nature of sensor networks poses a big challenge for security

Public-key Cryptography is so expensive

With only 4KB of RAM memory must be used carefully

Page 18: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Directed Diffusion

•Is a data centric routing

•Base stations flood interests for named data

•Nodes able to satisfy the interest disseminate information along the reverse path of interest propagation.

•Interests are initially transmitted at a lower rate.

•Based nodes reinforce the path where there is more data.

•Failed node paths are negatively reinforced.

Page 20: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Attacks on Directed Diffusion

•SuppressionSuppress the flow of data by sending negative reinforcement

•CloningAttacker can replay an interest from legitimate base station

•Path InfluenceAttacker can influence the path taken by a data flow by spoofingpositive and negative reinforcements and bogus data events.

•Selective forwarding and TamperingAttacker can insert himself into the path of events flow and gainControl of the event flow.

Page 21: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Attacks on Directed Diffusion

•A Laptop class adversary can create worm hole between node A located near base station and node B located near likely events.

•Interests are advertised through worm hole and rebroadcast bynode B.

•If node A sends negative reinforcements and worm hole does not pass those messages then node B continues its positive reinforcement then no data reaches the sink node and eventually node B’s power is lost.

Page 22: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Tiny-OS Beaconing

•In this protocol base stations periodically broadcast routing update.

•All station receiving the update marks the base station as its parent.

•This algorithm happens recursively with each node marking its parent as the first node from which it hears the update.

•All packets received or generated by a node is forwarded to its parent until it reaches the base station.

•This is a breadth first spanning tree rooted to the base station

Page 23: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Attacks on Tiny-OS Beaconing

Routing updates are not authenticated

Attacker can suppress, eaves-drop, and modify packets througha worm hole/ sink hole attack as shown in the figure

Source: http://webs.cs.berkeley.edu/retreat-1-03/slides/sensor-route-security.pdfRetrieved on November 17, 2003

Page 24: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Attacks on Tiny-OS Beaconing

•A lap top class adversary can use Hello flood attack to broadcast a routing update and all nodes will consider the adversary as its parent.

So the nodes which are not in the actual range of the parent may flood the packets to neighbors which also has the adversary as its parent

•Routing Loops can be created. Suppose adversary knows node A and node B are within radio range of each other. Adversary sends a routing update to B as if it came from A. B updates its parent as A, and sends routing update. Now A updates its parent as B.

Page 25: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Geographic Routing

Two Kinds •Geographic and Energy aware routing (GEAR) uses the energy information and the location of neighboring nodes to forward the packets

•Greedy Perimeter Stateless Routing (GPSR) used only the proximity of neighbors to forward its messages. The energy consumption is uneven within the nodes.

Page 26: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Attacks on Geographic Routing•Regardless of adversary’s location he might advertise to be closest and place himself on the path of data flow.

•For GEAR the adversary can advertise to have maximum energy to divert all the packets to himself and can now mount a selective forwarding attack

Routing Loops is possible in GPSR routing as shown in figure

Source: http://webs.cs.berkeley.edu/retreat-1-03/slides/sensor-route-security.pdfRetrieved on November 17, 2003

Page 27: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Counter Measures

Link Layer Security•Simple link layer encryption and authentication using a globally shared key.

•If a worm hole is established, encryption makes selective forwarding difficult, but can do nothing to prevent black hole selective forwarding. This worm hole is possible by replaying the message from one group of nodes to other group.

•Link layer security mechanisms cannot prevent any insider attack.

Page 28: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Counter Measures

Sybil Attack

•Every node shares a unique symmetric key with base station

•Two nodes can use Needham-Schroeder like protocol to verifyidentity and establish a shared key.

•Base station limits the number of nodes an insider can have communication.

•This limits the number of nodes an adversary can communicate.

Page 29: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Counter Measures

Hello Flood Attacks

•Verify the bi-directionality of the link before taking any action

•Measures against Sybil Attack like limiting the number ofverified neighbors to a node will also prevent Hello Flood Attack

Page 30: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Counter Measures

Worm Hole and Sink Hole Attacks•Sink holes are difficult to defend in protocols which use advertised information like energy information and hop count. Hop count can be verified, however energy and TinyOs beaconing is difficult to defend.

•Best solution is to design protocols where above attacks are meaningless

Page 31: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

•Protocols that construct topology initiated by base station are susceptible to attacks

•Geographic protocols that construct topology on demand using localized interactions and not from base stations are good solutions.

•In geographic routing since proximity is a factor artificial link to sink hole is not possible because they may not fall in the normal radio range.

Counter Measures

Page 32: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

•Geographic routing is secure against worm hole, sink hole, and Sybil attacks, but the remaining problem is that the location advertisement must be trusted.

•Probabilistic selection of next hop from several advertisement can reduce the problem

•Restricting the structure of the topology can eliminate the problem by eliminating advertisement. For example nodes can arrange itself in square, triangular, etc., So that every node can derive its neighbors

Counter Measures

Page 33: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Counter Measures

Selective Forwarding

•Multi-path routing can be used to avoid this attacks.

•Messages routed over n paths whose nodes are completely disjoint is an effective solution

•Creating this kind of path may be difficult .

•Probabilistic selection of next hop can add to security.

Page 34: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Counter Measures

Authenticated Broadcast & flooding

• digital signatures

• symmetric-key cryptography

• delayed key disclosure and one –way key chains constructed with publicly computable cryptographically secure hash function •Replay attack is not possible key is used only once.

Page 35: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Limitations of Multi-Hop Routing

•If nodes within one or two hops near the base station arecompromised then the network will be completely down

•Protocols like leach which forms clusters and where cluster heads communicate directly with base station may yield a secure solution.

Page 36: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Conclusion

•Secure routing is vital to the acceptance and use of sensor networks.

•Current protocols are insecure

•Careful protocol design is needed as a sensor mote cannot do complex cryptographic computations

Page 37: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

References

[1 ]Ian F. Akyildiz, Weilian Su, Yogesh Subramaniam, and Erdal Cayirci (2002, August). A Survey on Sensor Networks. http://www.cdt.luth.se/babylon/snc/References/Akyildiz2002_SurveySensorNets_01024422.pdf Retrieved August 26, 2003

[2]Charlermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin. Directed Diffusion:A Scalable and Robust Communication Paradigm

for Sensor Networkshttp://www2.parc.com/spl/members/zhao/stanfordcs428/readings/Networking /Estrin_mobicom00.pdf Retrieved August 20, 2003

[3] Chris Karlof, David Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Counter Measures

Page 38: SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath

Thank You!!!!!

Questions???????????