Koneru Lakshmaiah College of Engineering: Dept. of Information Science and Technology
Koneru Lakshmaiah College of Engineering: Dept. of Information Science and Technology
Koneru Lakshmaiah College of Engineering: Dept. of Information Science and Technology
By By
1. Abstract
2. Introduction
2.1 Wireless Sensor Networks (WSN)
2.2 Applications
4. Security Threats
4.1 Passive Information Gathering
4.2 Subversion of a Node
4.3 False Node and malicious data
6. Conclusion
7. References
1. Abstract
This paper proposes a security protocol for Wireless Sensor Networks which are a new type of
networked systems, characterized by severely constrained computational and energy resources, and
an ad hoc operational environment.
The paper first introduces sensor networks, and discusses security issues and goals along with
security problems, threats, and risks in sensor networks. It describes crippling attacks against all of
them and suggests countermeasures and design considerations. It gives a brief introduction of
proposed security protocol SPINS whose building blocks are SNEP and µTESLA which overcome
all the important security threats and problems and achieves security goals like data confidentiality,
freshness, authentication in order to provide a secure Wireless Sensor Network.
2. Introduction:
2.1Wireless Sensor Networks:
Wireless Sensor Networks are new type of networked systems characterized by severely constrained
computational and energy resources. These networks will consist of hundreds or thousands of self-
organizing, low power, low cost wireless nodes.
Sensor networks often have one or more points of centralized control called base stations. A base
station (sink) is typically a gateway to another network, a powerful data processing or storage center,
or an access point for human interface which are used as a nexus to disseminate control information
into the network or extract data from it. They have enough battery power to surpass the lifetime of all
sensor nodes, sufficient memory to store cryptographic keys, stronger processors, and means for
communicating with outside networks. The sensor nodes establish a routing forest, with a base station
at the root of every tree. Base stations are many orders of magnitude more powerful than sensor nodes
2.2 Applications:
The applications for WSNs are many and varied. They are used in commercial and industrial
applications to monitor data that would be difficult or expensive to monitor using wired sensors.
Some of the typical applications are:
• Environmental monitoring
• Habitat monitoring
• Acoustic detection
• Seismic Detection
• Military surveillance
• Inventory tracking
• Medical monitoring
• Process Monitoring
Sensor networks are used in a number of domains that handle sensitive information. Due to this, there
are many considerations that should be investigated and are related with protecting sensitive
information traveling between nodes from been disclosure to unauthorized parties.
3.1 Confidentiality:
Confidentiality means keeping information secret from unauthorized parties. A sensor network should
not leak sensor readings to neighboring networks. In many applications
(E.g. key distribution) nodes communicate highly sensitive data. The standard approach for keeping
sensitive data secret is to encrypt the data with a secret key that only intended receivers possess,
hence achieving confidentiality. Since public-key cryptography is too expensive to be used in the
resource constrained sensor networks, most of the proposed protocols use symmetric key encryption
methods.
3.2 Authenticity:
In a sensor network, an adversary can easily inject messages, so the receiver needs to make sure that
the data used in any decision-making process originates from the correct source. Data authentication
prevents unauthorized parties from participating in the network and legitimate nodes should be able to
detect messages from unauthorized nodes and reject them. In the two-party communication, data
authentication can be achieved through a purely symmetric mechanism where, sender and the receiver
share a secret key to compute a message authentication code (MAC) of all communicated data. When
a message with a correct MAC arrives, the receiver knows that the sender must have sent it.
Authentication requires stronger trust assumptions on the network nodes.
3.3 Integrity:
Moving on to the integrity objective, there is the danger that information could be altered when
exchanged over insecure networks. Lack of integrity could result in many problems since the
consequences of using inaccurate information could be disastrous, for example for the healthcare
sector where lives are endangered. Integrity controls must be implemented to ensure that information
will not be altered in any unexpected way there is urgent need to make sure that information is
traveling from one end to the other without being intercepted and modified in the process.
3.6 Availability:
Availability ensures that services and information can be accessed at the time that they are required.
In sensor networks there are many risks that could result in loss of availability such as sensor node
capturing and denial of service attacks. Lack of availability may affect the operation of many critical
real time applications like those in the healthcare sector that require a 24 * 7 operation that could even
result in the loss of life. Therefore, it is critical to ensure
Figure 1: μTELSA key disclosure and computation. Each hash mark denotes an epoch. P1, P2…P7
represent packets
6. Conclusion:
Thus, Combination of these two building blocks SNEP and µTESLA can fulfill the security goals and
threats in the wireless sensor networks which are the most important challenges faced by current
wireless communicational systems. Therefore, we conclude that security in Wireless Sensor Networks
can be achieved by implementing our proposed security protocol SPINS.
7. References:
[1] Agrawal, Dharma P.; Qing-An Zeng. 2003. Introduction to Wireless and Mobile Systems.
Brooks/Cole – Thompson, Pacific Grove, CA.
[2] Chan, H., A. Perrig, and D. Song. Random Key Predistribution Schemes for Sensor Networks.
IEEE Symposium on Security and Privacy (SP)
[3] M. chen, W. Cui, and V. Wen. Security and Deployment Issues in a Sensor Network
(http://www.cs.berkeley.edu/~wdc/classes/cs294-1-report.pdf), 2000.
[4] A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar. SPINS: Security Protocols for Sensor
Networks. In Seventh Annual ACM International Conference on Mobile Computing and Networks
(MobiCom 2001), July 2001.
[5] A. Perrig, R. Canetti, D. Song and J.D. Tygar. Efficient and secure source authentication for
multicast. Network and Distributed System Security Symposium (NDSS). 2001.
[6] A. Fiat and M. Naor. Broadcast encryption. Advances in Cryptology - CRYPTO'93, volume 773
of Lecture Notes in Computer Science, 1994.