wireless sensor networks

Published on November 2016 | Categories: Documents | Downloads: 80 | Comments: 0 | Views: 487
of 4
Download PDF   Embed   Report

ABout sensor networks

Comments

Content

INTRODUCTION
Advances in robotics have made it possible to develop a variety of new architectures for autonomous wireless networks of sensors. Mobile nodes, essentially small robots with sensing, wireless communications, and movement capabilities, are useful for tasks such as static sensor deployment, adaptive sampling, network repair, and event detection. These advanced sensor network architectures could be used for a variety of applications including intruder detection, border monitoring, and military patrols. In potentially hostile environments, the security of unattended mobile nodes is extremely critical. The attacker may be able to capture and compromise mobile nodes, and then use them to inject fake data, disrupt network operations, and eavesdrop on network communications. In this scenario, a particularly dangerous attack is the replica attack, in which theadversary takes the secret keying materials from a compromised node, generates a large numberof attacker-controlled replicas that share the nodes keying materials and ID, and then spreadsthese replicas throughout the network. With a single captured node, the adversary can create asmany replica nodes as he has the hardware to generate. Note that replica nodes need not beidentical robots; a group of static nodes can mimic the movement of a robot and other mobilenodes or even humans with handheld devices could be used. The only requirement is that theyhave the software and keying material to communicate in the network, all of which can beobtained from the captured node. The time and e ort needed to inject these replica nodes into thenetwork should be much less than the e ort to capture and compromise the equivalent number of original nodes. The replica nodes are controlled by the adversary, but have keying materials that allow them toseem like authorized participants in the network. Protocols for secure sensor network communication would allow replica nodes to create pair wise shared keys with other nodes andthe base station, enabling the nodes to encrypt, decrypt, and authenticate all of theircommunications as if they were the original captured node.

1.2 Objective The system and attacker models, we have three key design goals for replica detection. 1. First, replica nodes should be detected with reasonable communication, computational, andstorage overheads. 2. Second, the detection schemes should be robust and highly resilient against an attackersattempt to break the scheme. More specifically, the scheme should detect replicas unless theattacker compromises a substantial number of nodes. 3. Finally, replica detection should be performed at the cost of minimal false positives andnegatives. This is important to prevent turning the replica detection scheme into a tool for denialof service attacks. Wireless sensor networks are usually deployed in hostile environments for theirunattended nature which makes nodes in the network dangerous to be captured by an adversary.The adversary can compromise the captured nodes and obtain all the secrets of the nodes,replicate the compromised nodes to get many replicas with the same node identity. Thenadversary can launch an insidious attack with these legitimate nodes. Dangerous attack is thereplica node attack, in which the adversary takes the secret keying materials from a compromisednode, generates a large number of attacker controlled replicas that share the compromised node’skeying materials and ID, and then spreads these replicas throughout the network. With a singleCaptured node, the adversary can create as many replica nodes as he has the hardware togenerate. Note that replica nodes need not be identical robots; a group of static nodes can mimicthe movement of a robot and other mobile nodes or even humans with handheld devices could beused. The only requirement is that they have the software and keying material to communicatein the network, all of which can be obtained from the captured node. The time and effort neededto inject these replica nodes into the network should be much less than the

effort to capture andcompromise the equivalent number of original nodes. The replica nodes are controlled by theadversary, but have keying materials that allow them to seem like authorized participants in the network. Protocols for secure sensor network communication would allow replica nodes to create pairwise shared keys with other nodes and the base station, enabling the nodes to encrypt, decrypt, and authenticate all of their communications as if they were the original captured node. The adversary can then leverage this insider position in many ways. 1.3 Scope of study In the system and attacker models,we have three key design goals for replica detection. First, replica nodes should be detected with reasonable communication, computational, and storage overheads. Second, the detection schemes should be robust and highly resilient against an attacker’s attempt to break the scheme. More specifically, the scheme should detect replicas unless the attacker compromises a substantial number of nodes. Finally, replica detection should be performed at the cost of minimal false positives and negatives. This is important to prevent turning the replica detection scheme into a tool for denial of service attacks. 1. Secure the sensor network. 2. Detect the replica node attacks in wireless sensor networks. 3. Avoid the replica node attacks. 4. Fast detection of Replica node attack.

LITERATURE SURVEY
2.1 Existing System (Static Sensor Networks) Security of unattended mobile nodes is citical. The attacker may be able tocapture and compromise mobile nodes, and then he can use them to inject fake data, disruptnetwork operations, and eavesdrop on network communications. 2.1.1 Ststic Sensor Networks “Ststic sensor networks is a set of sensors which are stable at on place and these assume a fixed topology”.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close