security in sensor network1

13

Upload: piyush-rupareliya

Post on 14-Jun-2015

154 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Security in sensor network1
Page 2: Security in sensor network1

Abstract 1. Introduction(sensor networks)2. Obstacles of Sensor Security3. Security Requirements4. Attacks5 Defensive Measures6. Conclusions

Page 3: Security in sensor network1

Introduction Uses tiny, in expensive sensor nodesvery low processing power and radio ranges permit very low energy consumption perform limited and specific monitoring and

sensing functions.

Page 4: Security in sensor network1

Application Agriculture and livestockOcean and wildlife monitoring, Manufacturing machinery performance

monitoring, Building safety and earthquake monitoring, Many military applications. Monitoring of highway traffic, pollution,

wildfires, building security, water quality , People’s heart rates.

Page 5: Security in sensor network1

key featuresscalability, security, reliability, self-healing, robustness

Page 6: Security in sensor network1

Obstacles of Sensor SecurityVery Limited ResourcesUnreliable CommunicationUnattended Operation

Page 7: Security in sensor network1

Very Limited ResourcesLimited Memory and Storage Space one common sensor type (TelosB) has an

16-bit, 8 MHz RISC CPU with only 10K RAM, 48K program memory and 1024K flash storage

Power Limitation

Page 8: Security in sensor network1

Unreliable Communication• Unreliable Transfer

- Conflicts - Latency

Page 9: Security in sensor network1

Unattended Operation • Exposure to Physical Attacks - Managed Remotely - No Central Management Point

Page 10: Security in sensor network1

Security RequirementsA sensor network is a special type of

network. It shares some commonalities with a typical computer network, but also poses unique requirements. Therefore, we can think of the requirements of a wireless sensor network as encompassing both the typical network requirements and the unique requirements suited solely to wireless sensor networks.

Page 11: Security in sensor network1

AttacksTypes of Denial of Service attacksThe Sybil attack Traffic Analysis AttacksNode Replication AttacksAttacks Against Privacy Physical Attacks

Page 12: Security in sensor network1
Page 13: Security in sensor network1