protocol mechnism for security ppt

Post on 25-Jul-2015

42 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

SEMINAR REPORT ON Protocols and

mechanisms for security

Presented by SANJAY . D .

DHANDARE

Guided by Prof. saniya ansari mam

10,oct,2014

DYPSOE PUNE

Department of

Electronics and telecommunication Engg.

CONTENT INTRODUCTION.

What is protocol.

What is protocol mechanism.

What is network security.

Fundamentals of network security.

What it means?

Attacks on security network.

Mechanism for security.

Protocols for security.

Conclusion.

References.

INTRODUCTION

What is a Sensor Network ?A heterogeneous system combining tiny sensors and

actuators with general-purpose computing elements. Most consisting of hundreds or thousands of low-power, low-cost nodes deployed to monitor and affect the environment.

What are they used for? Ocean and wildlife monitoring. Monitoring of manufactured machinery. Building safety. Earthquake monitoring. Variety of military applications. Medical monitoring and research.

What is protocol?

PROTOCOL

“set of rules commonly employ for proper communication in between sender and receiver in every wireless sensor network.

What is protocol mechanism?

The mechanism in which different

protocol performs their well defined

task for healthy communication in

the sensor network.

This is the key term used in every

network to protect from different

attacks.

What is network security?

Network security is nothing but the

collection of all policies,

mechanisms and services that

afford a network which required

protection from unauthorised

access.

Fundamentals of network security

The network is said to be secure if it have,

Confidentiality.

Integrity.

Availability.

What it means?

DATA CONFIDENTIALITY – data leakage to

neighboring networks must be prevent.

DATA INTEGRITY – transmission data cannot be

modified.

AVAILABILITY–network able to work at any

time.

DATA AUTHENTICATION – verification of

sender/receiver.

Attacks on security

Following are the different attacks on

security:

Denial-of-service.

Routing attacks.

Data aggregation attacks.

Privacy attacks.

Denial-of-service attacks

Attempt to stop network from proper functioning.

Disturbed the service provided by the network.

It may occur at various layer of protocol :

physical layer Dos.Data link layer Dos.

Routing attacks

What happen?Data is forwarded along one or more

routes.

EFFECT:

Traffic increases at node and as a result packets (data) can not reaches to destination.

Examples of routing attacks

Blackhole attack.

Rushing attacks.

Sinkhole attacks.

Sybil attack.

Wormhole attack

Data aggregation attacks.

Reducing frequency of operation.Reducing packets size.Replacing real measurement by fake

readings.

Privacy attacks

May introduce by accessing the data

store at node.

May occur at node which perform

more activity.

The traffic analysis can be used to

identify the important nodes.

Mechanism for security

Cryptography :Cryptography is a method of storing

and transmitting data in a particular form so that only those for whom it is intended can read and process.

The term plaintext is often used which means ordinary text sometimes referred as cipher text called as encryption and back again called decryption

Symmetric and public key cryptography

SYMMETRIC CRYPTOGRAPHY:A encryption system in which the

sender and receiver of a messages share a single key that is used to encrypt and descrypt the data.

PUBLIC KEY CRYPTOGRAPHY;

It uses two keys a public key to encrypt the massage and a private key to descrypt them.

Symmetric cryptography

Key management

It is nothing but reliable and secure establishment of shared keys among neighbouring nodes in a network.

In this approach every sensor shares different pairwise key with each other. Hence the sensor network can be represented as matrix with rows and column.

example

Defence again attacks

Dos attacks.

Aggregation attacks.

Routing attacks

Security protocols

Encryption protocol.

Same message is encrypted differently at each time.

tinySec protocol.

It supports two mechanism :

Authentication encryption.

Authentication only.

Localized encryption and Authentication protocol.

Localized encryption and Authentication protocol.

It provide four keying mechanism as follows,

Individual key .

Group key.

Cluster key.

Pairwise key.

*** CONCLUSION ***

from above discussion we conclude

that the security is a important issue

in a wireless sensor network and can

be introduced by using a standard

protocol and mechanism to prevent

unauthorised access.

References

Dargie w and poellabaur fundamentals of wireless sensor networks :theory and practise john wiley and sons 2010 .

Protocols and architectures for wireless sensor networks holger karl andreas willig 2007.

And E-journals .

ANY QUERIES…

THANK YOU

top related