Security in sensor network1
-
Upload
piyush-rupareliya -
Category
Technology
-
view
154 -
download
1
Transcript of Security in sensor network1
![Page 1: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/1.jpg)
![Page 2: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/2.jpg)
Abstract 1. Introduction(sensor networks)2. Obstacles of Sensor Security3. Security Requirements4. Attacks5 Defensive Measures6. Conclusions
![Page 3: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/3.jpg)
Introduction Uses tiny, in expensive sensor nodesvery low processing power and radio ranges permit very low energy consumption perform limited and specific monitoring and
sensing functions.
![Page 4: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/4.jpg)
Application Agriculture and livestockOcean and wildlife monitoring, Manufacturing machinery performance
monitoring, Building safety and earthquake monitoring, Many military applications. Monitoring of highway traffic, pollution,
wildfires, building security, water quality , People’s heart rates.
![Page 5: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/5.jpg)
key featuresscalability, security, reliability, self-healing, robustness
![Page 6: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/6.jpg)
Obstacles of Sensor SecurityVery Limited ResourcesUnreliable CommunicationUnattended Operation
![Page 7: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/7.jpg)
Very Limited ResourcesLimited Memory and Storage Space one common sensor type (TelosB) has an
16-bit, 8 MHz RISC CPU with only 10K RAM, 48K program memory and 1024K flash storage
Power Limitation
![Page 8: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/8.jpg)
Unreliable Communication• Unreliable Transfer
- Conflicts - Latency
![Page 9: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/9.jpg)
Unattended Operation • Exposure to Physical Attacks - Managed Remotely - No Central Management Point
![Page 10: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/10.jpg)
Security RequirementsA sensor network is a special type of
network. It shares some commonalities with a typical computer network, but also poses unique requirements. Therefore, we can think of the requirements of a wireless sensor network as encompassing both the typical network requirements and the unique requirements suited solely to wireless sensor networks.
![Page 11: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/11.jpg)
AttacksTypes of Denial of Service attacksThe Sybil attack Traffic Analysis AttacksNode Replication AttacksAttacks Against Privacy Physical Attacks
![Page 12: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/12.jpg)
![Page 13: Security in sensor network1](https://reader035.fdocuments.in/reader035/viewer/2022081515/557d3d62d8b42a447f8b4fc5/html5/thumbnails/13.jpg)