Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 12

SECURITY IN WIRELESS SENSOR NETWORK

Presented by:Ankit Kumar Verma CS 1 (3rd year) 0800310014

What is Wireless Network?


Wireless network refer to any type of computer network that is not connected by cables of any kind. It is a method by which telecommunications networks and enterprise (business), installations avoid the costly process of introducing cables into to a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using a transmission system called radio waves.

Example of Wireless Network

What is Wireless Sensor Network?


It consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. The WSN is built of "nodes" - from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting.

Architecture of WSN

Attacks in WSN
Denial of Service:Physical Layer:- Jamming , Tampering Data link layer:-Collision,Exhaustion,Unfairness Network layer:-Neglect and Greed, Homing, Spoofing, Black Holes, Flooding Transport layer:-Flooding, De-synchronization

Sybil:Data Aggregation, Voting Wormhole:A routing attack where an adversary convinces a network node of a shorter, or zero, path to the base station, for example, and can disrupt the network in this manner. Sinkhole (Black hole):Sinkhole attacks typically work by making a compromised node look especially attractive to surrounding nodes with respect to the routing algorithm.

Security Requirements
Data Confidentiality Data Integrity Data Freshness Availability Self-Organization Time Synchronization Secure Localization Authentication

Defense from Attacks


Protecting the sensor network from attacks. We start with key establishment in wireless sensor networks, which lays the foundation for the security in a wireless sensor network, followed by defending against DoS attacks, secure broadcasting and multicasting, defending against attacks on routing protocols, combating traffic analysis attacks, defending against attacks on sensor privacy, intrusion detection, secure data aggregation, defending against physical attacks, and trust management.

Conclusion
Security in sensor networks has been an increasingly important issue for both academia and in industry individuals and groups working in this fast growing research area. We have made a threat analysis to the Wireless Sensor Network and suggested some counter measures. A common assumption is most existing distributed key management schemes is that all sensor nodes have the same capability.

You might also like