CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay...

17
CS 265 PROJECT CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur
  • date post

    21-Dec-2015
  • Category

    Documents

  • view

    218
  • download

    0

Transcript of CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay...

Page 1: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

CS 265 PROJECTCS 265 PROJECT

Secure Routing in Wireless Sensor Networks : Directed Diffusion a

study

Ajay Kalambur

Page 2: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

OutlineOutline

IntroductionDirected DiffusionAttacksCountermeasures

Page 3: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

IntroductionIntroduction

Array of sensors deployed to monitor real time events

The concepts derived from adhoc networks

Much more energy starved than adhoc networks

Sensor nodes limited battery and memory

Page 4: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

Introduction(contd)Introduction(contd)

Scalability Self Organization Data Collection , aggregation and

processing All protocols must be designed such

that they are energy efficient

Page 5: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

NETWORK ARCHITECTURE(My project)NETWORK ARCHITECTURE(My project)

CLUSTERS OF SENSOR NODES

LOCAL BASESTATION

LOCAL BASESTATION

Page 6: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

Sensor Node ArchitectureSensor Node Architecture

Power Unit(Battery)

Location finding system

TransceiverSensor ADC

SensingUnit

ProcessingUnit

Processor

Storage

Page 7: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

Directed DiffusionDirected Diffusion

Data centric , interest-based routing protocol

Base station or sink node disseminates interest

Gradient established in opposite direction for data flow

Positive and Negative Reinforcements possible

Interests also stored in interest cache at each node

Page 8: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

Diffusion (in molecules)Diffusion (in molecules)

Page 9: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

THE PICTURETHE PICTURE

Page 10: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

Example Interest from Base station Example Interest from Base station or sink nodeor sink node Type=toxin Interval=1s //send every second Duration=50 seconds //for next 50 seconds Rect=[-100,100,250,300]

Page 11: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

Response from sensor node Response from sensor node detecting the eventdetecting the event Type=toxin Instance=mercury Location=[120,225] Intensity=0.6 Confidence=0.7 Timestamp=03:14:45

Page 12: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

Attacks on Directed DiffusionAttacks on Directed Diffusion

Denial of Service -jammingModification and spoofing of

routing infoDropping or selective

forwarding of data

Page 13: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

Denial of ServiceDenial of Service

Page 14: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

Modification and Spoofing of Modification and Spoofing of routing inforouting info

Page 15: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

Dropping or selective forwarding Dropping or selective forwarding of dataof data Previous attack enables malicious node to

get into path of data flow The spoofed positive and negative

reinforcements and spoofed data, Selective forwarding is trivial to achieve

Dropping all packets- similar to node being non existent.

Selective forwarding is a more dangerous security issue

Page 16: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

COUNTERMEASURESCOUNTERMEASURES

Link layer security with each node sharing a unique key with base station

Efficient Symmetric key cryptographic schemes needed

Public key cryptography not possible Defense against internal attacks is very

challenging Routing protocol needs to be designed

carefully

Page 17: CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.

ReferencesReferences

[1] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: A Scalable and Robust Communication paradigm for Sensor Networks,” Proc. ACM MobiCom, Boston, MA, pp. 42-49, 2000.

[2]. Chris Karlof and David Wagner, “Secure Routing in Wireless Sensor Networks,” Adhoc Networks, Volume1, Issues 2-3, pp: 293-315, September 2003.