+ All Categories
Home > Documents > Denial of service in sensor networks

Denial of service in sensor networks

Date post: 02-Jan-2016
Category:
Upload: flavia-pittman
View: 24 times
Download: 2 times
Share this document with a friend
Description:
Denial of service in sensor networks. Pratik Zirpe Instructor – Dr. T. Andrew Yang. Agenda. Introduction Concepts Denial of Service Threat Physical layer Link layer Network layer Transport layer Conclusion. Introduction. Real-time data processing Applications Availability - PowerPoint PPT Presentation
35
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang
Transcript
Page 1: Denial of service in sensor networks

DENIAL OF SERVICE IN SENSOR NETWORKSPratik Zirpe

Instructor – Dr. T. Andrew Yang

Page 2: Denial of service in sensor networks

Agenda

Introduction Concepts Denial of Service Threat Physical layer Link layer Network layer Transport layer Conclusion

Page 3: Denial of service in sensor networks

Introduction

Real-time data processing Applications Availability Denial of service

Page 4: Denial of service in sensor networks

Concepts

Application dependent networks Limited individual capability of nodes Must continue operating after significant

node failure

Page 5: Denial of service in sensor networks

Security demands of a network Network has to face harsh environments

and intelligent opposition Disasters Public safety Home healthcare Design time consideration

Page 6: Denial of service in sensor networks

Denial of Service Threat

Any event that diminishes or eliminates a network’s capacity to perform it’s expected function

Reasons may be hardware failures, software bugs, resource exhaustion, environmental conditions or other complicated interactions.

Page 7: Denial of service in sensor networks

Layered Network Architecture Improves robustness of the system Each layer is vulnerable to different DoS

attacks Some attacks may crosscut multiple

layers

Page 8: Denial of service in sensor networks

Layered model

Page 9: Denial of service in sensor networks

Physical layer

Nodes use wireless communication

Base stations use wired or satellite communication

Attacks- Jamming Tampering

Page 10: Denial of service in sensor networks

Jamming

Interferes with radio frequencies of nodes

Randomly distributed k nodes can put N nodes out of service (k<<N)

Effective in single frequency networks

Page 11: Denial of service in sensor networks

Detection

Determined by constant energy that impedes communication

Constant jamming prevents nodes from exchanging data or even reporting attack to remote monitoring stations

Sporadic jamming is also effective

Page 12: Denial of service in sensor networks

Prevention or mitigation

Spread-spectrum communication – not feasible solution

Attacked nodes can be put in long-term sleep and have them wake up periodically to test the channel

High priority messages to defend against intermittent jamming

Page 13: Denial of service in sensor networks

Defense against jamming

Page 14: Denial of service in sensor networks

Tampering

Attacker can physically tamper nodes Attacker can damage and replace

computation hardware Sensitive material is exposed

Page 15: Denial of service in sensor networks

Prevention or mitigation

Camouflaging or hiding nodes

Erase cryptographic or program memory

Page 16: Denial of service in sensor networks

Link layer

Protocols requires cooperation between nodes to arbitrate channel use making them more vulnerable to DoS attack

Attacks- Collision Exhaustion Unfairness

Page 17: Denial of service in sensor networks

Collision – detection and prevention Adversary may need to induce collision

in one octet of transmission Attacker requires less energy to listen for

transmission No complete solution is known Errors are detected using checksum

mismatch Error correction codes can be used

Page 18: Denial of service in sensor networks

Exhaustion

Repeated retransmissions are triggered by unusually late collision leading to exhaustion

Affect availability A node could reportedly request channel

access with RTS Causes power losses

Page 19: Denial of service in sensor networks

Detection and mitigation

Random back-offs Time division multiplexing MAC admission control rate limiting Limiting the extraneous responses

required

Page 20: Denial of service in sensor networks

Unfairness

Degrades service rather than denying it It exploits MAC-Layer priority schemes It can be prevented using small frames Adversary can cheat while vying for

access

Page 21: Denial of service in sensor networks

Network and Routing Layer

Messages may traverse many hops before reaching the destination

The cost of relaying a packet and the probability of its loss increases in an aggregate network

Every node can act as a router Routing protocols should be simple and

robust

Page 22: Denial of service in sensor networks

Neglect and Greed

A neglectful node arbitrarily neglects to route some messages

Its undue priority to messages originating from it makes it greedy

Multiple routes or sending redundant messages can reduce its effect

It is difficult to detect

Page 23: Denial of service in sensor networks

Homing

Important nodes and their identities are exposed to mount further attacks

A passive adversary observes traffic to learn the presence and location of critical resources

Shared cryptographic keys are an effective mechanism to conceal the identity of such nodes

This makes the assumption that none of the nodes have been subverted

Page 24: Denial of service in sensor networks

Misdirection

Messages are forwarded in wrong paths This attack targets the sender Adversary can forge replies to route

discovery requests and include the spoofed route

Sensor networks can use an approach similar to egress filtering

Page 25: Denial of service in sensor networks

Black Holes

Nodes advertise zero cost routes to every other node

Network traffic is routed towards these nodes

This disrupts message delivery and causes intense resource contention

These are easily detected but more disruptive

Page 26: Denial of service in sensor networks

Authorization

Only authorized node can share information

Public-key encryption can be used for routing updates

The problems are with computational and communication overheads and key management

Page 27: Denial of service in sensor networks

Monitoring

Nodes can keep monitoring their neighbors

Nodes become watchdogs for transmitted packets

Each of them has a quality-rating mechanism

Page 28: Denial of service in sensor networks

Probing

A network probe tests network connectivity

This mechanism can be used to easily detect Black holes

A distributed probing scheme can detect malicious nodes

Page 29: Denial of service in sensor networks

Transport layer

Manages end-to-end connections Sensor Networks utilize protocols with

minimum overhead Threats- Flooding Desynchronizations

Page 30: Denial of service in sensor networks

Flooding

Adversary send many connection establishment request to victim

Each request causes allocation of resources

It can be prevented by limiting the number of connections

Connectionless protocols are not susceptible to this attack

Another solution is client puzzles

Page 31: Denial of service in sensor networks

Desynchronization

The attacker forges messages to one or both ends with sequence numbers

This causes the end points to request retransmissions of missed frames

This may lead to lack of availability and resource exhaustion

Authentication can prevent such an attack

Page 32: Denial of service in sensor networks

Adaptive rate control

Describe a series of improvements to standard MAC protocols

Key mechanisms include Random delay for transmissions Back-off that shifts an applications periodicity phase Minimization of overhead in contention control

mechanisms Passive adaptation of originating and route-through

admission control rates Anticipatory delay for avoiding multihop hidden node

problems

Page 33: Denial of service in sensor networks

RAP

Real-time location based protocol Velocity monotonic scheduling RAP can use clock synchronization

Page 34: Denial of service in sensor networks

Conclusion

Attempts at adding security focus on cryptographic-authentication mechanisms

Use of higher security mechanisms poses serious complications in Sensor Networks

It is essential to incorporate security considerations during design-time

Without adequate protection against DoS and other attacks sensor networks may not be deployable at all

Page 35: Denial of service in sensor networks

References

A.D. Wood and J.A. Stankovic, “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, 2002, pp. 54–62.

A.D. Wood and J.A. Stankovic, “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks”, Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, 2004.

David R. Raymond and Scott F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, vol. 7, no. 1, 2008, pp. 74-81.


Recommended