Security of Mobile Ad Hoc and Wireless Sensor Networks

Similar documents
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Trusted Routing in IoT

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Introduction to VANET

Security in Ad Hoc Networks Attacks

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Security Issues In Mobile Ad hoc Network Routing Protocols

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

Sleep/Wake Aware Local Monitoring (SLAM)

MANET ROUTING ATTACKS

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network

Selective Forwarding Attacks Detection in WSNs

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Wireless Network Security Spring 2011

Routing Protocols and Security Issues in Mobile Ad-Hoc Network: A Review

Communication Layer, Attacks and Security Mechanisms of Wireless Sensor Network

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

Secure Routing in Wireless Sensor Neworks

Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)

Sybil Attack Detection and Prevention Using AODV in VANET

Wireless Sensor Networks: Security Issues, Challenges and Solutions

Wireless Network Security Spring 2011

MANET : Services, Parameters, Applications, Attacks & Challenges

Attacks in Wireless Sensor Networks(WSN)

A Survey on Security Attacks in Mobile Ad Hoc Networks

Secured Routing Protocols for Wireless & ATM Networks : An Analysis

An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network

Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack

Wireless LAN Security (RM12/2002)

Key establishment in sensor networks

A Review on Mobile Ad-hoc Networks (MANET S) with Attacks Impact

Packet Estimation with CBDS Approach to secure MANET

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

Wireless Network Security Spring 2015

Statistical Traffic Pattern Discovery System For Wireless Mobile Networks

A survey on AODV routing protocol for AD-HOC Network

Wireless Network Security Spring 2013

Protection Against DDOS Using Secure Code Propagation In The VANETs

International Journal of Advance Engineering and Research Development

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, ISSN

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe

Part I. Wireless Communication

Towards Securing MintRoute in Wireless Sensor Networks

Survey on Mobile Adhoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Int. J. Advanced Networking and Applications Volume: 04 Issue: 04 Pages: (2013) ISSN :

Sensor Networks and Security Issues

Introduction and Statement of the Problem

Detection and Prevention Mechanism against Attack for MANET Routing Protocol

A Review on Black Hole Attack in MANET

Hacking MANET. Building and Breaking Wireless Peering Networks. Riley Caezar Eller

Detection of Attacks on Application and Routing Layer in Tactical MANETs

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Detection of Malicious Nodes in Mobile Adhoc Network

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

SECURING WIRELESS SENSOR NETWORKS: A SURVEY Oussalah, Mourad; S. Ould Amara, R. Baghdad

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

Defending MANET against Blackhole Attackusing Modified AODV

MANET SECURITY BREACHES : THREAT TO A SECURE COMMUNICATION PLATFORM

DYNAMIC KEY BASED SECURITY PROTOCOL IN NETWORK COMMUNICATION

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Secure routing in ad hoc and sensor networks

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Webpage: Volume 4, Issue VI, June 2016 ISSN

Introduction to Vehicular Networks

Resource management issues in mobile ad hoc networks (MANET)

AODV Routing Protocol in MANET based on Cryptographic Authentication Method

Armor-LEACH for Wireless Sensor Network

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

Design and Implementation of TARF: A Trust Aware Routing Framework WSN s

Attacks on Mobile Adhoc Networks: A Survey

On Demand secure routing protocol resilient to Byzantine failures

Intrusion Detection for Routing Attacks in Sensor Networks

ABSTRACT I. INTRODUCTION

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

A Survey on Routing protocols for enhancement of security of mobile ad-hoc network

EVALUATION OF INTRUSION DETECTION TECHNIQUES IN MOBILE AD-HOC NETWORKS

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

International Journal of Advance Research in Computer Science and Management Studies

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

AN ENHANCED SECURE ROUTING ALGORITHM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

CSE 713: Wireless Networks Security Principles and Practices. Ad hoc networks security and sensor networks security (1 hour)

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies

[Ramesh, 2(9): September, 2013] ISSN: Impact Factor: 1.852

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 2, August 2012

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities

Transcription:

Security of Mobile Ad Hoc and Wireless Sensor Networks July, 2013 Edward Bonver LA Board Member Symantec Corporation edward@owasp.org Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the License. The Foundation http://www.owasp.org

Agenda Intro What are MANETs and WSNs? Problem Space and Challenges wrt to Security... Drinking @ BJ s Restaurant & Brewary, across the street 2

Who am I? Senior Principal Engineer, Office of the CTO, Symantec Approaching 10 years @ Symantec Development @ QA engineering background Prior to Symantec: operating systems & networking protocols LA board member Father of three (future world changing persons) Note to self: robot programming and first Emails Computer Science Ph.D. student Famous for long introductions 3

What are MANETs? 4

Mobile Ad-hoc Networks Do not rely on an existing infrastructure Wireless communications Mobile nodes (constantly changing topology) Nodes must be able to relay traffic, as communicating nodes might be out of range MANET can be self-forming and standalone or attached to other networks 5

MANET vs. Traditional Wireless Network 6

MANET Example: Vehicular Ad-Hoc Network (VANET) 7

8

9

What are Wireless Sensor Networks? 10

Sensor Network Consists of a number of small nodes Each node is capable of: Communications Sensing Computation Typically, measures physical phenomena 11

Wireless Sensor Network Each sensor node is equipped with a radio transceiver, microprocessor, sensors. Such nodes can autonomously form a network, through which sensor readings can be propagated Data can be processed as it travels through the network, because nodes have some intelligence 12

Wireless Sensor Network 13

Typical WSN Applications Weather survey in hard-to-access geographical locations (e.g., mountains, ocean floor) Battlefield (e.g., surveillance and reconnaissance) 14

Security in MANETs and WSNs 15

Security Trade-offs Cost Security Performance, Functionality 16

Types of Attacks Application Layer: Malicious code, Repudiation Transport Layer: Session hijacking, Flooding Network Layer: Black Hole, Worm Hole, Link Spoofing, Location disclosure etc. Data Link/MAC: Malicious Behavior, Selfish Behavior Physical: Interference, Traffic Jamming, Eavesdropping 17

Types of Attacks (cont.) Passive (difficult to detect) Active External External malicious nodes attempting to DoS the network Internal A (compromised) node that s already an authorized part of the network, performing malicious actions Compromised nodes can use security measures to protect their attacks 18

Security Challenges Resource scarcity Highly susceptible to physical attacks (e.g., node capture) Sensor networks closely interact with people and with their physical environments Communication patterns differ from traditional networks 19

Physical Security Main concern: node-capture How vital is this node? What functionality do adversaries have access to now? Keys? Sensor data? Etc. I am behind a firewall mentality So am I! (behind your firewall) Drastically different threat model 20

Crypto-related Challenges 21

Key Management Trust model Key creation Key distribution Key storage 22

Key Establishment: Take One Simplest thing ever: one shared key 23

Key Establishment: Take Two Use a single shared key to establish a set of link keys 24

Securing WSNs Symmetric key crypto was the only way to address encryption, until recently. Does not scale for WSNs. Use Identity-Based Encryption Nodes can exchange information that uniquely identifies each node, and can be used to exchange keys and to encrypt data (Oliveira, et al., 2007) 25

Comparing Crypto Schemes for WSNs Computational Complexity Communication Overhead Symmetric key Cryptography Public Key Cryptography Low High High Low High Low Key Distribution Problematic Complex Simple Number of Keys O(n2) O(n) n Key Directory At Each Node At Each node or Key Center Non-Repudiation No Yes Yes Forward Encryption No No Yes Identity-Based Cryptography No 26

Routing and Intrusion Detection-related Challenges 27

28

Aggregation Trees in WSNs 29

Types of Routing Protocols Proactive Typically table-driven and distance-vector protocols Reactive (source-initiated on-demand) Hybrid 30

Attacks 31

Spoofing (Man-in-the-Middle) I am B! 32

Fabrication Malicious node sends false (but valid ) routing messages, to change the topology e.g.: neighbors B and C are no longer available 33

Wormhole Attack 34

Modification Tamper with the packet s data payload (attack on integrity) 35

Denial of Service In general ad-hoc networks are supposed to withstand DoS better than fixed networks 36

Sinkholes Malicious node tries to attract all traffic to itself e.g. by faking to be the best route for other nodes 37

Sleep Depravation A.k.a. Resource Consumption Attack Consume battery on the target by constantly communicating with it (routing updates, relay requests, etc.) 38

Sybil Attack Malicious node takes on identity of many other nodes, again, making other nodes communicate with it. 39

Attacking the Sensors Tampering with the surrounding environment to full the sensors In general, WSNs are well positioned to detect such attacks 40

Other Attacks Eavesdropping Black hole attack Malicious node falsely advertises routes without having actual routes established Byzantine attack confuse target nodes with non-optimal routing updates Flooding (the entire network vs. DoS of a single node) Replay attack Location disclosure attack 41

Detecting Malicious Events 42

References Ahmed, A. A., Shi, H., & Shang, Y. (2003). A Survey on Network Protocols for Wireless Sensor Networks. Paper presented at the Information Technology: Research and Education, 2003. Proceedings. ITRE2003. International Conference on. Coelingh, E., & Solyom, S. (2012). All Aboard the Robotic Road Train. Spectrum, IEEE, 49(11), 34-39. doi: 10.1109/MSPEC.2012.6341202 Oliveira, L. B., Dahab, R., Lopez, J., Daguano, F., & Loureiro, A. A. F. (2007). Identity- Based Encryption for Sensor Networks. Paper presented at the Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on. Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in Wireless Sensor Networks. Commun. ACM, 47(6), 53-57. doi: http://doi.acm.org/10.1145/990680.990707 Sharifi, M., Ardakani, S. P., & Kashi, S. S. (2009). SKEW: An Efficient Self Key Establishment Protocol for Wireless Sensor Networks. Paper presented at the Collaborative Technologies and Systems, 2009. CTS '09. International Symposium on. Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks. Wireless Communications, IEEE, 14(5), 56-63. doi: 10.1109/MWC.2007.4396943 43

Conclusion Don t treat MANETs & WSNs as your average network Large problem space wrt security Always backup your PowerPoint presentations! 44

Q&A 45

Thank You! Edward Bonver edward@owasp.org Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the License. The Foundation http://www.owasp.org