security in sensor network1
TRANSCRIPT
Abstract 1. Introduction(sensor networks)2. Obstacles of Sensor Security3. Security Requirements4. Attacks5 Defensive Measures6. Conclusions
Introduction Uses tiny, in expensive sensor nodesvery low processing power and radio ranges permit very low energy consumption perform limited and specific monitoring and
sensing functions.
Application Agriculture and livestockOcean and wildlife monitoring, Manufacturing machinery performance
monitoring, Building safety and earthquake monitoring, Many military applications. Monitoring of highway traffic, pollution,
wildfires, building security, water quality , People’s heart rates.
key featuresscalability, security, reliability, self-healing, robustness
Obstacles of Sensor SecurityVery Limited ResourcesUnreliable CommunicationUnattended Operation
Very Limited ResourcesLimited Memory and Storage Space one common sensor type (TelosB) has an
16-bit, 8 MHz RISC CPU with only 10K RAM, 48K program memory and 1024K flash storage
Power Limitation
Unreliable Communication• Unreliable Transfer
- Conflicts - Latency
Unattended Operation • Exposure to Physical Attacks - Managed Remotely - No Central Management Point
Security RequirementsA sensor network is a special type of
network. It shares some commonalities with a typical computer network, but also poses unique requirements. Therefore, we can think of the requirements of a wireless sensor network as encompassing both the typical network requirements and the unique requirements suited solely to wireless sensor networks.
AttacksTypes of Denial of Service attacksThe Sybil attack Traffic Analysis AttacksNode Replication AttacksAttacks Against Privacy Physical Attacks