Security Challenges in Wireless Sensor Networks
Security Challenges in Wireless Sensor Networks
Id - 3687
Batch – 54D
Introduction:
Due to significant advances in wireless and mobile communication techniques and
the broad development of potential applications, Wireless Sensor Networks
(WSNs) have attracted great attention in recent years. Nevertheless, WSNs are
formed dynamically by a number of power-limited sensor nodes and the manager
node with long-lasting power. WSNs are self-organized and autonomous systems
consisting of common sensors, manager nodes and back-end data center. Firstly,
the common sensors are responsible for transmitting the real-time sensor data of
specific monitoring environment to the intermediate collection nodes called
manager node. Finally, the back-end data center will receive the sensed data from
manager nodes to do further process and analysis. Undoubtedly, all communication
between nodes are through the wireless transmission techniques. Furthermore, due
to the property of self-organized, without support from the fixed infrastructure and
the topology of wireless sensor network changes dynamically, therefore,
broadcasting is the general way for communications in WSNs.
Wireless sensor network has been widely used in practical applications, such as
monitoring of forest fire, detection of military purpose, medical or science areas
and even in our home life. However, WSNs are easily compromised by attackers
due to wireless communications use a broadcast transmission medium and their
lack of tamper resistance. Therefore, an attacker can eavesdrop on all traffic, inject
malicious packets, replay older messages, or compromise a sensor node. Generally,
sensor nodes are most worried about two major security issues, which are privacy
preserving and node authentication. Privacy means the data confidentiality is
achieved under security mechanism, and hence it allows network communications
between sensor nodes and the manager station to proceed securely. In addition, a
well-structured authentication mechanism can ensure that no unauthorized node is
able to fraudulently participate and get sensitive information from WSNs. As a
result, several schemes have been proposed to secure communications in WSNs. In
this chapter, we classify them into three classifications based on the cryptographic
techniques: symmetric keys, asymmetric keys and one-way hashing functions.
A sensor network consists of multiple detection stations called sensor nodes, each
of which is small, lightweight and portable. Every sensor node is equipped with a
transducer, microcomputer, transceiver and power source. The transducer
generates electrical signals based on sensed physical effects and phenomena. The
microcomputer processes and stores the sensor output. The transceiver receives
commands from a central computer and transmits data to that computer. The power
for each sensor node is derived from a battery.
A WSN consists of spatially distributed sensors, and one or more sink nodes (also
called base stations). Sensors monitor, in real-time, physical conditions, such as
temperature, vibration, or motion, and produce sensory data. A sensor node could
behave both as data originator and data router. A sink, on the other hand, collects
data from sensors. For example, in an event monitoring application, sensors are
required to send data to the sink(s) when they detect the occurrence of events of
interest. The sink may communicate with the end-user via direct connections, the
Internet, satellite, or any type of wireless links.
Characteristics of WSN
Non-centralized architecture: In WSNs, the status of every node is
identical and no one is responsible for providing normal services. It is lack
of a central administration and every node can join or disjoin the network
any time. Besides, it does not affect the whole sensor network if some node
failed and is reliable for applications with high stable requirement.
Self-organized: Because WSNs are characterized as infrastructure-less
networks and lack of fixed infrastructure. Thus, the sensor network is fully
constructed by themselves when it is begin working with some pre-defined
layering protocols and distributed algorithms. Once sensor networks are
constructed completely, the sensor data would be collect and send to back-
end system for further processing through the networks they built.
Multi-hop routing: The sensor range of nodes in the WSNs is assumed to
be limited, so if a node A would like to communicate with node D, which is
out of communication range of node A. The node B would be a intermediate
node and is responsible for transmitting the communication data to each
other between node A and node B. The multi-hops is illustrated as Figure 1.
Dynamic topology: In most of sensor network architecture assume that
sensor nodes are deployed randomly and the network topology would be
changed dynamically since the sensor node might be shut down, crash,
recovery or utilize mobile sensors.
fig. Organization of WSN.
Considerations of WSN
Sleep pattern: The sleep pattern is highly necessary in WSNs to extend the
availability of the networks. For example, the manager node can set fresh
bootstrapping times for live sensors while other sensor nodes can shut down
to save power. Different sensor nodes are operated according to the
bootstrapping times to which they belong and the lifetime of WSNs is
therefore extended in a differentiated way (23).
Abstract
Wireless sensor network (WSN) performance is directly related to the placement of
the sensors within the region of interest. This chapter investigates the static WSN
deterministic deployment, which aims at generating a network topology that
satisfies user’s requirements. It highlights the components involved and discusses
the existing literature. Moreover, it analyzes the uncertainty-aware WSN
deployment where sensors may not always provide reliable information and shows
how the evidence theory could be exploited to design better deployment strategies.
A comprehensive methodology for deterministic deployment of WSNs is presented
and executed to deploy a simplified indoor surveillance WSN for motion detection.
Wireless sensor networks (WSNs) technology is becoming a very promising
solution to better address reliability in general, thanks to constant, accurate
environmental monitoring. After reviewing the current reliability issues of
the telecommunications sector, this chapter describes how the integration of
multiple microelectromechanical systems (MEMS) sensors on small, low-power,
low-cost WSN platforms may help answer the current and future needs of this key
industry. Finally, a miniaturized WSN environmental platform is presented as a
case study to suggest one possible fabrication methodology for the designer.
Wireless sensor network (WSN) technology refers to a group of sensors used for
monitoring and recording the physical conditions of the environment and
organizing the collected data at a central location. This sensor network can include
thousands of smart sensing nodes with processing abilities that are powered by a
dedicated battery. A WSN consists of a tiny wireless computer that communicates
environmental stimuli, including vibrations, light, and temperature. It is an integral
part of such domains as industry, health care, infrastructure, and research and
development. As it relates to health care, a WSN can diagnose abnormal conditions
in a patient, issue alarms and alerts, and send electronic mail to healthcare
providers. This chapter is a discussion of the applications of WSNs in the
healthcare industry.
Security threats
Internal attacks (such as node replication attacks and node compromised attacks)
are usually caused by compromised members who are belong to the sensor
network in question, and hence internal attacks are more difficult to safeguard
against than external attacks.
Sybil attack
Sybil Attack is a type of attack seen in peer-to-peer networks in which a node in
the network operates multiple identities actively at the same time and undermines
the authority/power in reputation systems. The main aim of this attack is to gain
the majority of influence in the network to carry out illegal (with respect to rules
and laws set in the network) actions in the system. A single entity (a computer) has
the capability to create and operate multiple identities (user accounts, IP address
based accounts). To outside observers, these multiple fake identities appear to be
real unique identities.
In a direct attack, the honest nodes are influenced directly by the Sybil
node(s).
In an indirect attack, the honest node(s) are attacked by a node which
communicates directly with the Sybil node(s). This middle node is
compromised as it’s under malicious influence of Sybil node(s).
Ways to prevent Sybil attack:
In black hole attack, a malicious node uses its routing protocol in order to publicize
itself for having the shortest route to the destination node. This aggressive node
publicizes its availability of fresh routes regardless of checking its routing table. In
this attack, attacker node always has the accessibility in replying to the route
request so adapt the data packet and drop it (Biswas & Ali, 2007). In protocol
based on flooding, the malicious node reply will be received by the requesting
node before the reception of reply from any actual node; therefore a malicious and
faked route will create. When this route set up, now it’s depending to the node
whether to drop the packets or forward them to an unknown address (Pegueno &
Rivera, 2006). Security in mobile ad-hoc network (MANET) is the most serious
issue impacting performance of network. In general, routing methods is one of the
complicated and exciting analysis places. In black hole attack, a harmful node uses
its routing technique to be able to promote itself for having the quickest direction
to the place node or to the bundle it wants to identify. In this research, performance
of one of the most efficient solutions for preventing single black hole attack in
MANET using AODV routing protocol will be investigated in terms of packet
delivery ratio, packet loss percentage, average end-to-end delay, and route request
overhead.
Wormhole attack
In the wormhole attack, an attacker tunnels messages received in one part of the
network over a low latency link and replays them in a different part of the network.
The wormhole puts the attacker nodes in a very powerful position compared to
other nodes in the network. For instance in reactive routing protocols such as
AODV or DSR, the attackers can tunnel each route request RREQ packet to
another attacker which near to destination node of the RREQ. When the neighbors
of the destination hear this RREQ, they will rebroadcast this RREQ and then
discard all other received RREQs in the same route discovery process. Wormhole
attacks can destabilize or disable wireless sensor networks. In a typical wormhole
attack, the attacker receives packets at one point in the network, forwards them
through a wired or wireless link with less latency than the network links, and
relays them to another point in the network. This paper describes a distributed
wormhole detection algorithm for wireless sensor networks, which detects
wormholes based on the distortions they create in a network. Since wormhole
attacks are passive in nature, the algorithm uses a hop counting technique as a
probe procedure, reconstructs local maps for each node, and then uses a
“diameter” feature to detect abnormalities caused by wormholes. The main
advantage of the algorithm is that it provides the locations of wormholes, which
is useful for implementing countermeasures. Simulation results show that the
algorithm has low false detection and false toleration rates.
Physical Attacks
Before focusing on the physical attack, it is good to have a general overview on the
factors that create security demand in WSNs. Threats, vulnerabilities and attacks
are three crossly related entities that usually caused havoc to the security of the
information owned by others. Threat is basically an ability or intention of any
agent to adversely affect the operation, system or facility offered by that network
and can be categorized as amateur, professional and well-funded adversary.
Amateur types of attacks include denial-of-services or eavesdropping through
wireless sniffing. A professional type of adversary on the other hand, usually
launches more sophisticated attacks such as hijacking, man-in-the middle or Sybil
attack. Finally a well-funded adversary with highly sophisticated tools will launch
attacks such as node capture, wormhole or rushing attacks [32]. Subsequently,
vulnerabilities are defined as anything that leaves an information system open for
potential exploitation. The nature of WSNs itself such as physical limitation,
wireless communication and unattended nature can be said as major sources of
vulnerabilities to WSNs applications. Finally, attack is best described as an action
with an intention to bypass the security control of the system and is further
classified into passive and active attacks. The physical type of active attacks can be
performed by insiders or outsiders. Due to space limitation, the following
paragraph will only focus on physical types of attack. Relationship between
threats, vulnerabilities and attacks can be portrayed as in Fig. 1 and is explained as,
“Threats that come from various background and identities and with different
intentions will generate various types of attacks to tamper or steal the valuable
information from the valuable entity. In addition, successful attacks are very much
dependent on the vulnerabilities surrounding the valuable entity, which is referring
to the sensor node in this case”. Physical attacks can be broadly defined as attacks
that involve direct physical access by adversary to the sensor node. Usually after
capturing the node, the adversary proceeds to tamper or extract the confidential
data before redeploying the node into the network. Therefore, the effect of node
capture attack is categorized as hazardous by because it can lead to various data
exposure, clone node and other various types of attacks.
It is believed that security chip with on-SOC memory and with extra security
features can help in lowering done the risk of exposing sensor node sensitive
credentials due to physical tampering. Among current commercially available low
energy embedded security module are the Trusted Platform Module (TPM) by
Atmel, ARM11 with Trust Zone by ARM and latest TI-M Shield by Texas
Instrument. Basically the TPM offers the foundation for a trusted platform. It can
be added to existing architecture such as Schleck sensor node, hence providing the
lowest layer for larger security architecture. TPM verifies the integrity of systems
through trusted boot, strong process isolation and remote attestation that verifies
the authenticity of the platform. On the other hand ARM1176JZF-s with Trust
Zone features consist of hardware enforced security processor providing code
isolation and two separated parallel execution world which are secure and non-
secure. In addition, it also offer basic security services such as crypto engine and
On-SoC memory for safety storage and integrity checking to help ensure device
and platform security. Another, TI M-shield, a system-level security solution
specifically designed for securing wireless mobile applications. TI M-Shield is
designed with the intention to provide hardware solution for widespread adoption
of new mobile services and the convergence between mobile and internet services.
Like the ARM1176JZF-s processor, TI M-Shield also comes with embedded
security and Trust Zone features and most importantly, the hardware security
solutions complies with basic trusted environment standard. As of now, the
successful implementation of trusted sensor node, utilizes the TPM chip as the
security chip. However, both work (Trust fleck and SEF) incorporate TPM chip
into the sensor node platform resulting in bigger sensor node size. Another, TPM
chip was basically designed for personal computer and therefore contains
superfluous commands for basic security processes which later lead to higher
energy consumption. Conversely, ARM11 and TI M-Shield although designed
with low energy consumption, the use of both processors especially in the research
area are limited due to the proprietary issue.
The node replication attack is one of the notorious attacks that can be easily
launched by adversaries in wireless sensor networks. A lot of literatures have
studied mitigating the node replication attack in static wireless sensor networks.
However, it is more difficult to detect the replicas in mobile sensor networks
because of their node mobility. Considering the limitations of centralized detection
schemes for static wireless sensor networks, a few distributed solutions have been
recently proposed. Some existing schemes identified replicated attacks by sensing
mobile nodes with identical ID but different locations. To facilitate the discovery
of contradictory conflicts, we propose a hybrid local and global detection method.
The local detection is performed in a local area smaller than the whole deployed
area to improve the meeting probability of contradictory nodes, while the distant
replicated nodes in larger area can also be efficiently detected by the global
detection. The complementary two levels of detection achieve quick discovery by
searching of the replicas with reasonable overhead. he attack makes it possible for
an adversary to prepare her own low-cost sensor nodes and induce the network to
accept them as legitimate ones. To do so, the adversary only needs to physically
capture one node, reveal its secret credentials, replicate the node in large quantity,
and deploy these malicious nodes back into the network so as to subvert the
network with little effort. Recently, Ko et al. proposed a neighbor-based detection
scheme to cope with replication attacks. The scheme features distributed detection
and takes node mobility into account. It harnesses the dynamic observations of the
neighbors of a claimer node and avoids the protocol iterations typically found in
distributed detections. Unfortunately, we show that their proposal is subject to
various replication attacks that can circumvent the detection. Moreover, it is even
possible for a sophisticated adversary to exploit the protocol to revoke legitimate
nodes.
Internal attacks (such as node replication attacks and node compromised attacks)
are usually caused by compromised members who are belong to the sensor
network in question, and hence internal attacks are more difficult to safeguard
against than external attacks.
According to the above description of the security threats, we can infer that a
secure sensor network corresponds with the following requirements.
Black hole Attacks. The black hole attacker drops all received packets. It will
cause the most serious damage to the network among all types of packet drop
attacks during the same amount of time. However, it can be easily captured by
the monitoring neighbors as it consistently drops all their packets.
On-Off Attack. When attack is on, the attacker drops all received packets, then
forwards all received packets when attack is off, and repeats this drop-forward
pattern periodically. This attacker can appear suspicious to its neighbor during
its attack period when it acts like black hole attacks and can also be detected
easily when the attack on period is long or the on-off pattern is discovered.
Most of the reported efforts focused on random selective forwarding attacks. For
example, Hai and Huh presented a neighbor-based monitoring and detection
mechanism using two-hop neighbor knowledge where each exchanges its one-
hop neighbors’ packet forwarding behavior periodically. However, this
approach introduces network overhead due to periodic information exchange
between nodes and is vulnerable to false information provided by malicious
neighbors. In the multichip acknowledgement scheme, each node in the
forwarding path is responsible for detecting attackers. Specifically, some
randomly chosen nodes (called ACK nodes) will report ACKs back to the
source node (hop by hop) using the same but reversed routing path when they
receive a packet. However, this approach has several problems. First, it is
unclear how to locate the exact attacker. Second, their detection scheme depends
on other nodes’ observations, and thus their scheme is vulnerable to false
accusation from malicious neighbors. The trust mechanisms with watchdog, as
we have discussed earlier, solve these problems by monitoring whether the next
node in the routing path forwards the packets or not. Despite its many known
limitations, the trust mechanism has been a promising solution to defend against
insider packet drop attacks.
iv. Collision: When attacker discovers some valid packets, it starts dispatching
signal at the same time and with the equal frequency of that of valid packet. The
valid packet can collided with the attacker’s signal.
v. Exhaustion: An intruder continuous send join request to a victim node and the
victim node keep on sending the acknowledgements and as a result its battery
drains out.
vi. Unfairness: It is not a very strong attack; it just delays the transmission of the
information.
vii. Interception Attack / Replay: It attacks the routing information in the WSN.
A packet is being modified and transmitted back in the network again. In a replay
attack same packet is transmitted in the network many times. These attacks
increase latency time of the WSN and mislead the routing protocols.
viii. IP Spoofing: The attacker pings various nodes and the source address in the
ping, contains the address of the victim node. Now all the responses get diverted to
the victim node.
ix. Homing: It aims nodes which are important and have some responsibility
in the WSN like cluster head, cryptography manager, and gateway or sink node.
Authentication Scenarios
For authentication in WSNs, three types of scenarios for pair-wise and
group-wise authentication are illustrated. For example, a pair-wise
authentication is accomplished between node x and node y. For group-wise
authentication, we divided it into two scenarios: cluster-based
authentication and global-based authentication. A cluster authentication is
used by a cluster head and all its neighboring sensor nodes, and it is used for
securing clustered broadcast messages. Finally, this is a node authentication
verified by the manager node and all sensor nodes in the sense field. A
global authentication is done by the manager node for securing
communications that are broadcast to the entire network and prevent illegal
sensor nodes from participating the sensor networks.
Cryptographic Approaches
In order to protect privacy and secure communications, participating nodes joined
in WSNs should be authenticated and shared keys should be established between
deployed sensors and their neighboring nodes. For example, in two-party
communications, a deployed node establishes a pair-wise key with each of its
neighboring nodes. Similarly, in broadcast communications, a group-wise key
should be shared by all nodes in the network. We classify the security of node
authentication and key establishment schemes into three types of cryptography:
symmetric keys, asymmetric keys and one-way hashing functions.
Symmetric Keys
Recently, many schemes were proposed to secure communications in WSNs and
one of secure communication schemes is based on symmetric key cryptography. A
simple solution to ensure privacy would be store a single master key MK into all
deployed sensors prior to their deployment. Thus, a legal node NA can use this
master key to establish a pair-wise key K = F(MK||NA||NB) with its neighboring
node NB for securing communications that require privacy or node authentication,
where F is a pseudo-random function. However, this solution fails to prevent
security breaches and thus is impracticable for WSNs for whose sensors lack
tamper resistance and are easy for attackers to compromise, leaving all the secret in
those networks known to attackers. As a result, during initial deployment phase,
we suggest that there should be a security mechanism for erasing master key. For
example, the manager node sets a timer with reasonable time interval T for a
deployed sensor to discover its neighboring nodes. When a timer expires after T,
deployed sensor node erases MK and attackers cannot inject illegal sensed data into
networks without knowing MK.
The other extreme solution is to store a set of n − 1 key pairs in each sensor node
before deployment in such a way that it shares a unique key pair with all other
nodes in the networks, where n is the number of sensor nodes in WSNs. However,
this solution is only suitable for small networks due to it requires large memory to
store keys and becomes a serious problem when the network needs to be expanded.
Therefore, many probabilistic key pre-deployed schemes were proposed to
overcome these shortages. A large pool of P keys and their identifiers are
generated and d distinct keys are randomly drawn from P and pre-loaded into each
sensor’s key ring, where P ≫ d. This solution ensures that only a few keys need to
be stored in each sensor’s memory and two nodes share at least one key, based on a
selected probability. An extension to the basic probabilistic scheme is proposed by
Liu and Ning, called polynomial pool-based key pre-distribution scheme. This
scheme randomly selects polynomials from a polynomial pool and stores them to
each sensor instead of randomly choosing keys from a key pool.
Cryptography
Cryptography is the study of secure communications techniques that allow only the
sender and intended recipient of a message to view its contents. The term is
derived from the Greek word kryptos, which means hidden. It is closely associated
to encryption, which is the act of scrambling ordinary text into what's known as
cipher text and then back again upon arrival. In addition, cryptography also covers
the obfuscation of information in images using techniques such as microdots or
merging. Ancient Egyptians were known to use these methods in complex
hieroglyphics, and Roman Emperor Julius Caesar is credited with using one of the
first modern ciphers.
Steganography
The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to
cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or
‘hidden writing’. Steganography is a method of hiding secret data, by embedding it
into an audio, video, image or text file. It is one of the methods employed to
protect secret or sensitive data from malicious attacks.
How is it different from cryptography?
Cryptography and steganography are both methods used to hide or protect secret
data. However, they differ in the respect that cryptography makes the data
unreadable, or hides the meaning of the data, while steganography hides
the existence of the data.
In layman’s terms, cryptography is similar to writing a letter in a secret language:
people can read it, but won’t understand what it means. However, the existence of
a (probably secret) message would be obvious to anyone who sees the letter, and if
someone either knows or figures out your secret language, then your message can
easily be read.
If you were to use steganography in the same situation, you would hide the letter
inside a pair of socks that you would be gifting the intended recipient of the letter.
To those who don’t know about the message, it would look like there was nothing
more to your gift than the socks. But the intended recipient knows what to look for,
and finds the message hidden in them.
Similarly, if two users exchanged media files over the internet, it would be more
difficult to determine whether these files contain hidden messages, than if they
were communicating using cryptography.
Cryptography is often used to supplement the security offered by steganography.
Cryptography algorithms are used to encrypt secret data before embedding it into
cover files.
Image Steganography –
As the name suggests, Image Steganography refers to the process of hiding data
within an image file. The image selected for this purpose is called the cover-
image and the image obtained after steganography is called the steno-image.
How is it done?
An image is represented as an N*M (in case of greyscale images) or N*M*3 (in
case of color images) matrix in memory, with each entry representing the intensity
value of a pixel. In image steganography, a message is embedded into an image by
altering the values of some pixels, which are chosen by an encryption algorithm.
The recipient of the image must be aware of the same algorithm in order to known
which pixels he or she must select to extract the message.
Figure – Process of Image Steganography.
References
i. http://en.wikipedia.org/wiki/Wireless_sensor_network
ii. http://arxiv.org/abs/0712.4169
iii. http://www.cs.wayne.edu/~weisong/papers/walters05-wsn-security- survey.pdf
iv. http://www.cs.utk.edu/~saraogi/594paper.pdf
v. https://www.researchgate.net/publication/234689233_Security_in_Wireless_Se
nsor_Networks
vi. http://www.cs.binghamton.edu/~kang/teaching/cs580s/wsn-security.ppt
vii. https://www.intechopen.com/books/wireless-sensor-networks-technology-and-
protocols/overview-of-wireless-sensor-network
viii. https://www.sciencedirect.com/topics/engineering/wireless-sensor-network
ix. https://searchdatacenter.techtarget.com/definition/sensor-network
x. https://link.springer.com/chapter/10.1007/978-3-642-36511-9_7