Professional Documents
Culture Documents
Outline
Introduction
Security Principles
Conclusion
Introduction
Definition:
o
Limitations:
o
Power limitations
Computational limitations
Storage limitations
Passive attack:
o
Active attack
o
Insider
Outsider
Mote-class attacker
o
Types of attacks:
Jamming
o
Effects of jamming
Energy loss
Blocked reception
Attacker
Two
ways:
Attacker
Uses:
o
Tampering
o
Interference
o
Similar to Jamming
Threat
Counter-measures
Interference
Jamming
Sybil
Tampering
Types of attacks:
o
Collision
Desynchronization
Eavesdropping
o
Man in the middle attack- received data is modified and retransmitted later
Hard to detect
Sybil attack
o
Denial of information
Counter-measures
Collision
Desynchronization
Eavesdropping
Encrypted communication
Sybil attack
Selective Forwarding
o
Wormhole attack
o
The device modifies data and send back to the intended receiver in
network
Sybil Attack
o
Counter-measures
DoS
Selective forwarding
Wormhole
Flooding
o
Summary
Routing
Quality of Service
Energy efficiency
Security
Multicasting
References
[1] Modares, H.; Salleh, R.; Moravejosharieh, A., "Overview of Security Issues in Wireless Sensor
Networks," inComputational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third
International Conference on, vol., no., pp.308-311, 20-22 Sept. 2011 doi:
10.1109/CIMSim.2011.62
[2] Pathan, A.K.; Hyung-Woo Lee; Choong Seon Hong, "Security in wireless sensor networks:
issues and challenges," inAdvanced Communication Technology, 2006. ICACT 2006. The 8th
International Conference, vol.2, no., pp.6 pp.-1048, 20-22 Feb. 2006 doi:
10.1109/ICACT.2006.206151
[3] Gupta, R.; Sultania, K.; Singh, P.; Gupta, A., "Security for wireless sensor networks in
military operations," inComputing, Communications and Networking Technologies
(ICCCNT),2013 Fourth International Conference on, vol., no., pp.1-6, 4-6 July 2013 doi:
10.1109/ICCCNT.2013.6726654
[4] Murat Dener, Security Analysis in Wireless Sensor Networks,International Journal of
Distributed Sensor Networks, vol. 2014, Article ID 303501, 9 pages, 2014.
doi:10.1155/2014/303501
[5] Al Ameen M, Liu J, Kwak K. Security and Privacy Issues in Wireless Sensor Networks for
Healthcare Applications.Journal of Medical Systems. 2012;36(1):93-101. doi:10.1007/s10916010-9449-4.
Questions ?