Download Network Tomography Based on Flow Level Measurements

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Network tap wikipedia , lookup

Deep packet inspection wikipedia , lookup

Distributed operating system wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Peering wikipedia , lookup

Computer network wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Airborne Networking wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Wireless security wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Security Issues in
Distributed Sensor Networks
Yi Sun
Department of Computer Science and Electrical Engineering
University of Maryland, Baltimore County
2007. 10
Outline
1.
2.
3.
4.
5.
Introduction
Security Criteria
Vulnerabilities
Attack types
Security Schemes
2
1. Introduction

Explosive growth of mobile computing devices
laptops
personal digital assistants (PDAs)
handheld digital devices
…

Ubiquitous computing
Individual users utilize, at the same time, several
electronic platforms through which they can access all the
required information whenever and wherever they may be
3
2. Security Criteria

Availability
Provide all the designed services

Integrity
Malicious altering, accidental altering

Confidentiality
Accessible to authorized nodes

Authenticity
Prove identities
4
2. Security Criteria

Nonrepudiation
Cannot disavow sent or received a message

Authorization
Specifies the privileges and permissions

Anonymity
Privacy preserving
5
3. Vulnerabilities

Lack of secure boundaries
No need to gain the physical access to visit the network

Threats from compromised nodes inside the network
Behavioral diversity of different nodes, mobility

Lack of centralized management facility
Benign failures, trust management, cooperative algorithm

Restricted power supply
Battery, DoS, selfish node

Scalability
Efficient routing protocol, key management service
6
4. Attack types

Denial of Service (DoS)
Radio jamming, battery exhaustion

Impersonation
Compromised nodes join the network as normal nodes

Eavesdropping
Obtain confidential information during communication

Attacks against routing
Attacks on routing protocols, attacks on packet
forwarding/delivery
7
5. Security Schemes

Intrusion Detection Techniques
Distributed and cooperative to meet with the needs of
sensor networks

Secure Routing Techniques
Defend specific attacks and general attacks

Medium Access Control
Guaranteed or controlled access, random access

Key Management
Cryptography
8
Thanks!
9
References

Y. Zhang and W. Lee, Intrusion Detection in Wireless Ad-hoc Networks, in
Proceedings of the 6th International Conference on Mobile Computing and
Networking (MobiCom 2000), pages 275–283, Boston, Massachusetts,
August 2000.

Jim Parker, Anand Patwardhan, and Anupam Joshi, Detecting Wireless
Misbehavior through Cross-layer Analysis, in Proceedings of the IEEE
Consumer Communications and Networking Conference Special Sessions
(CCNC’2006), Las Vegas, Nevada, 2006.

Y. Hu, A. Perrig and D. Johnson, Rushing Attacks and Defense in Wireless Ad
Hoc Network Routing Protocols, in Proceedings of ACM MobiCom Workshop
- WiSe’03, 2003.

Yi-an Huang and Wenke Lee, A Cooperative Intrusion Detection System for
Ad Hoc Networks, in Proceedings of the 1st ACM Workshop on Security of
Ad hoc and Sensor Networks, Fairfax, Virginia, 2003, pp. 135 – 147.

Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc
Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31),
CRC Press LLC, 2003.
10