SECURITY IN WIRELESS SENSOR NETWORKS
by
Mohd Faraz Uddin
Submitted in partial fulfilment of the requirements for the degree of
MASTER OF ENGINEERING
Major Subject: Internetworking
at
DALHOUSIE UNIVERSITY
Halifax, Nova Scotia
January, 2016
© Copyright by your Mohd Faraz Uddin, 2016
Dalhousie University
Faculty of Engineering
Internetworking
The undersigned hereby certify that they have read and award a pass in INWK 6800 for the seminar project entitled "Security in Wireless Sensor Networks" by Mohd Faraz Uddin in partial fulfilment of the requirements for the degree of Master of Engineering.
___________________________
Alireza Nafarieh
DALHOUSIE UNIVERSITY
INTERNETWORKING PROGRAM
…show more content…
In addition I might want to thank my Parents for giving me such an extraordinary chance to think about and develop in such a regarded University.
EXECUTIVE SUMMARY
This report deals with the Security of Wireless Sensor Networks and how and why we need to secure them from any outsiders or attacks.
1 INTRODUCTION
The security of Wireless sensor networks is a range that has been examined significantly in the course of recent years. Applications for these networks are differed and they all include some level of checking, tracking, controlling, or a mix thereof. Wireless sensor networks have attributes that are remarkable to them, for example, the capacity to withstand unfavorable natural conditions, dynamic network topology, correspondence disappointments, expansive size of deployment, Scalable node limit, node portability, unattended operation and also restricted power, to give some examples. They likewise have base stations, which have more assets, that go about as a gateway between the sensor node and the end client.
Since Wireless networks posture exceptional difficulties, conventional security strategies utilized as a part of customary systems can 't be connected straightforwardly. In the first place, to make Sensor Networks financially practical, sensor devices are constrained in their vitality, computations, and correspondence
So we will definitely need to have a base station that controls all the sensors and makes sure that it uses encryption to secure communication. We will have authentication, so that we can ensure data integrity and origin and to prevent injection of unauthorized messages. Use confidentiality, so that we can ensure secrecy of data and prevent eavesdropping. To accomplish this we are going to use Sensor-Network Encryption Protocol (SNEP) and micro Timed Efficient Stream Loss-tolerant Authentication
3) Secure data aggregation: Fine grain sensing is one of the important compensation of a wireless sensor network which is provided by the large and dense sets of nodes .So to avoid overwhelming amounts of traffic, the sensed values must be aggregated and the aggregation may take place in many places in the network depending on the architecture of the wireless sensor network. For example, the system may average the temperature of a geographic region, combine sensor values to compute the location and velocity of a moving object, or aggregate data to avoid false alarms in real-world event detection. All aggregation locations must be secured [8].
The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security
Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw.20(8), 2481–2501 (2014). doi:10.1007/s11276-014-0761-7
The world of wireless networks as we all know is one of the most rapidly growing areas in our world today. With the massive amount of data that is going on, “the cloud” the security of all of our data is questioned. As well with so many of our day to day tasks relying on our wireless capabilities it make you wonder how safe is it to rely so heavily on something. We have to ask the questions what are the key vulnerabilities of wireless networks and even just of networks in general. Different types of networks have different levels of safety and it is a good idea to know not only which are safe but the vulnerabilities of said networks to keep our information out of the
ireless network (Wi-Fi) is now widely established and utilized at home, offices and everywhere in public areas such as rail stations, streets, and etc. This newsletter provides the technical knowledge of Wi-Fi technologies, relevant threats and countermeasures for building a secure internal Wi-Fi network.
The next big boom in the networking fields is the Internet of things (IoT). The basic idea of IoT is the networking of different physical devices, smart devices, vehicles and also the items embedded with electronics, software, sensors etc. to the internet. IoT is playing a more and more important role. It covers from traditional equipment to most general household objects such as WSNs and RFID. With this great potential of IoT there come security problems which are discussed in this paper. As IoT is built on the internet, security problems of the internet will also show up in the IoT. IoT contains three layers: perception layer, transportation layer and the application layer. This paper analyses the security problems related to each layer separately and try to find the new solutions for the problems.
After a discussion of the challenges in planning a secure protocol and therefore the attacks, successive section discusses many secure routing protocols for ad hoc networks. [20]
Definition of Wireless LAN is Wireless Local Area Network (WLAN). WLAN is a wireless computer network that connect two or more devices by using a wireless distribution method within a limited area such as home, room, school, computer laboratory, library or office building. Besides, WLAN gives users the ability to move around within local coverage area and yet still be connected to the network. Most modern WLAN’s based on IEEE 802.119 (extended protocols for WLAN), marketed under the name of Wi-Fi.
when compared with secure foundation of network because of limited energy, the nodes number, storage, Internet bandwidth, communication of sensor nodes and the capabilities of computation. Two main reasons are computation capabilities and low traffic rates. The low traffic rate of sensor nodes can not support battery of sensors to make the network smooth for a long time and devices in the WSN can not support very complex computation to deal with some typical internet attacks. Additionally, Internet attacks can be divided into two types: internal attacks and external attacks. Generally, internal attacks are produced from malicious nodes. On the other hand, when it comes to the external attacks, wireless sensor network are easy to be attacked by several types of external internet attacks, which can be considered to three main aspects: secrecy and authentication attacks, network availability attacks and replay attacks.(p135, denial). Although many traditional techniques that have been used to resist various kinds of attacks, there are still remain serious problems in security of WSN. As a result, it is necessary to come up with the most effective approach to handle the Internet attacks in time because the faster development of technology, the more security problems. For these reasons, the prevention of
Abstract—Wireless sensor networks (WSN) is a key innovation for the wireless network technology. It generally has a large number of sensor nodes with a power unit, a sensing unit, a processing unit, a storage unit, and a wireless transmitter & receiver. They are more vulnerable to attack then wired ones due to its nature and resources limitations. So as to overcome this security problems we can different types of Key Distribution and Hierarchical WSN. This paper gives more solutions to all problems in security issues of the Networks.
The B-MAC is proposed to meet these goals, a configurable MAC protocol for WSNs. It is simple in both for implementation and design. MAC protocol support a wide variety of sensor network workloads by factoring out some functionality and exposing control to higher services. In contrast to the classic monolithic MAC protocol this minimalist model of MAC protocol is designed [1].
For cluster-based WSNs (CWSNs), secure data transmission, where like dynamically and periodically the clusters are shaped. The analysis problems associated with WSNs security and knowledge aggregation with reference to the protection and security analysis against various attacks, we show the quality of being usable of the SET-IBS and SET-IBOOS protocols. For a fuzzy approach and SET-IBS formula employing a combination in our planned system, for WSNs a replacement routing technique to extend network amount of some time from the supply to the destination by affirmative the best remaining battery power. The proposal is to envision an optimum routing path, minimum vary of hops, and minimum traffic load in terms of leveling energy consumption and for some time maximization of network quantity for the planned technique. To demonstrate the effectiveness, in two completely different topographical areas using similar routing criteria with the A-star search formula we tend to match our approach and fuzzy approach.
We consider a WSN in which the sensor nodes have both sensing ability and short distance wireless communication ability. The objective of the deployment of the WSN is to keep the FoI under strict surveillance/collect data and then forward the obtained information to a designated gateway/data sink. Hence, coverage and connectivity are the
Abstract: Wireless Sensor Network is a collection of homogeneous/heterogeneous wireless devices used to monitor the changes in the surrounding of the wireless device. Each wireless device present in the network has the capability of sensing the changes in the surrounding environment. Homogeneous sensors are those which have same computational power, energy etc. Each node is battery powered which is used to transmit the sensed data over the network. So efficient transmission of data in Wireless Sensor Network is important and to transmit the data unaltered over the network to the receiver security is important