The Sybil Attack: Abstract
The Sybil Attack: Abstract
The Sybil Attack: Abstract
Abstract:
The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed
numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands
of tiny sensor nodes, functioning autonomously, and in many cases, without access to renewable energy resources. Cost
constraints and the need for ubiquitous, invisible deployments will result in small sized, resource-constrained sensor nodes.
While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper.
We propose some of the security goal for Wireless Sensor Network. Further, security being vital to the acceptance and use of
sensor networks for many applications; we have made an in depth threat analysis of Wireless Sensor Network. We also
propose some countermeasures against these threats in Wireless Sensor Network.
I. WSN ARCHITECTURE
In a typical WSN we see following network
components
Sensor motes (Field devices) – Field
devices are mounted in the process and
must be capable of routing packets on
behalf of other devices. In most cases
Physical Layer: In Table 1, we describe Physical Layer Threats & Countermeasures in case of
Wireless Sensor Network.
Data-link Layer: In Table 2, we describe Data-Link Layer Threats & Countermeasures in case of
Wireless Sensor Network.
Table 2 Data-link Layer Threats and Countermeasures
Threat Countermeasure
Collision CRC and Time diversity
Exhaustion Protection of Network ID and other information that is required to
joining device
Spoofing Use different path for re-sending the message
Sybil Regularly changing of key
De-synchronization Using different neighbors for time synchronization
Traffic analysis Sending of dummy packet in quite hours; and regular monitoring
WSN network
Eavesdropping Key protects DLPDU from Eavesdropper
Network Layer: In Table 3, we describe Network Layer Threats & Countermeasures in case of
Wireless Sensor Network.
Table 3 Network Layer Threats and Countermeasures
Threat Countermeasure
Wormhole Physical monitoring of Field devices and regular monitoring of
network using Source Routing. Monitoring system may use
Packet Leach techniques.
Selective forwarding Regular network monitoring using Source Routing
DoS Protection of network specific data like Network ID etc. Physical
protection and inspection of network.
Sybil Resetting of devices and changing of session keys.
Traffic Analysis Sending of dummy packet in quite hours; and regular monitoring
WSN network.
Eavesdropping Session keys protect NPDU from Eavesdroppers.
REFERENCES
CONCLUSION
Security in Wireless Sensor Network is vital 1. to S. Sharma, “Energy-efficient Secure Routing in
the acceptance and use of sensor networks. In Wireless Sensor Networks”, Dept of Computer
particular, Wireless Sensor Network product in Science and Engineering, National Institute of
industry will not get acceptance unless there is a
Technology Rourkela, Rourkela, Orissa, 769
fool proof security to the network. In this paper,
we have made a threat analysis to the Wireless 008, India, 2009.
Sensor Network and suggested some counter 2. D. Boyle, T. Newe,”Securing Wireless Sensor
measures. Link layer encryption and Networks: Security Architectures”, Journal of
authentication mechanisms may be a reasonable Networks, 2008, 3 (1). International Journal of
first approximation for defense against mote
Next- Generation Networks (IJNGN),Vol.1,
class outsiders, but cryptography is not enough
to defend against laptop-class adversaries and No.1, December 2009
insiders: careful protocol design is needed 3. as X. Du, H. Chen, "Security in Wireless Sensor
well. Networks", IEEE Wireless Communications,
2008.