Vous êtes sur la page 1sur 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/221255078

Security Issues in Wireless Sensor Networks

Conference Paper · October 2006


DOI: 10.1109/ICSNC.2006.66 · Source: DBLP

CITATIONS READS

100 4,789

2 authors:

Tanveer Zia Albert Zomaya


Charles Sturt University The University of Sydney
101 PUBLICATIONS   586 CITATIONS    937 PUBLICATIONS   12,218 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Performance Degradation on Cloud-based applications View project

Development of effective mobile and cloud forensic techniques to identify sources that generate malicious traffic View project

All content following this page was uploaded by Albert Zomaya on 04 June 2014.

The user has requested enhancement of the downloaded file.


Security Issues in Wireless Sensor Networks
Tanveer Zia and Albert Zomaya
School of Information Technologies
University of Sydney
Email: {tanzia,zomaya}@it.usyd.edu.au

Abstract – Due to inherent limitations in wireless sensor frequency. Heterogeneous nature of sensor nodes is an
networks, security is a crucial issue. While research in WSN additional limitation which prevents one security solution.
security is progressing at tremendous pace, no comprehensive Due to the deployment nature, sensor nodes would be
document lists the security issues and the threat models which deployed in environments where they would be highly prone
pose unique threats to the wireless sensor networks. In this to physical vandalism.
paper we have made an effort to document all the known
security issues in wireless sensor networks and have provided
the research direction towards countermeasures against the
B. Network limitations
threats posed by these issues. Beside node limitations, sensor networks bring all the
limitations of a mobile ad hoc network where they lack
Keywords – wireless sensor network security, security physical infrastructure, and they rely on insecure wireless
issues in sensor networks. media.

I. INTRODUCTION C. Physical limitations


Sensor networks deployment nature in public and hostile
Sensor networks pose unique security challenges because environments in many applications makes them highly
of their inherent limitations in communication and vulnerable to capture and vandalism. Physically security of
computing. The deployment nature of sensor networks makes sensor nodes with tamper proof material increases the node
them more vulnerable to various attacks. Sensor networks cost.
are deployed in applications where they have physical
interactions with the environment, people and other objects III. CHARACTERISTICS OF SENSOR NETWORKS
making them more vulnerable to security threats. We
envision that sensor networks would be deployed in mission Sensor networks are emerging technologies currently
critical applications like battlefield, security of key land being deployed in seismic monitoring, wild life studies,
marks, building and bridges, measuring traffic flow, habitat manufacturing and performance monitoring. These sensor
monitoring and farming. Inherent limitations of sensor nodes are densely deployed in a predetermined geographical
networks can be categorized as node and network limitations. area to self-organize into ad-hoc wireless networks to gather
The privacy and security issues in sensor networks raises rich and aggregate data [13]. A typical sensor network contains
research questions. Dense deployment of sensor networks in large number of densely deployed, tiny, low cost nodes that
an unattended environment makes sensor nodes vulnerable to use wireless peer-to-peer network. They use multi-hop and
potential attacks. Attackers can capture the sensor nodes and cluster based routing algorithms based on dynamic network
compromise the network to accept malicious nodes as and resources algorithms based on dynamic network and
legitimate nodes. Once within the network, attackers can discovery protocol. [14]. For the purpose of this research we
rage variety of attacks. We expect Moore’s law to be applied assume usage of Berkeley’s Mica2Dot sensor node [16]
to drive down the cost of sensor nodes instead of improving which is limited in terms of computations and
its resources and performance. communication resources.
Hardware and software improvements will address these The ad hoc nature of sensor networks poses unique
issues at some extent but complete secure sensor networks challenges with their security and reliability. Resource
require deployment of countermeasures such as secure key constrained sensor nodes in terms of limited memory; low
management, secure routing and light weight encryption power, limited processing abilities, and low coverage are
techniques. This paper provides an overview of security vulnerable to intrusion, interception, modification and
issues known so far in wireless sensor networks. fabrication. Because of these unique challenges traditional
security techniques are not enough to meet the security goals
II. LIMITATIONS IN SENSOR NETWORKS of confidentiality, integrity, reliability and availability.
Unlike traditional networks, sensor nodes are deployed
The following section list the inherent limitations in physically in open areas where there is added risk of
sensor networks which make the design of security intervention with people and environment [15]. Therefore,
procedures more complicated. new security measures are needed to address these unique
sensor networks security challenges.
A. Node limitations
A typical sensor node processor is of 4-8 MHz, having
4KB of RAM, 128KB flash and ideally 916 MHz of radio

1
IV. SECURITY IN SENSOR NETWORKS B. Attacks on sensor networks
Security goals in sensor networks depend on the need to Having built a foundation of security threats in
know what we are going to protect. We determine four computing, next section lists the possible security attacks in
security goals in sensor networks which are Confidentiality, sensor networks identified by [3].
Integrity, Authentication and Availability (CIAA).
1) Passive Information Gathering
Confidentiality is the ability to conceal message from a An adversary with powerful resources collecting
passive attacker, where the message communicated on sensor information from sensor networks if information is not
networks remain confidential. encrypted.
Integrity refers to the ability to confirm the message has 2) Node subversion
not been tampered, altered or changed while it was on the Capture of a node may reveal its information including
network. disclosure of cryptographic keys hence compromising the
Authentication Need to know if the messages are from whole sensor network.
the node it claims to be from, determining the reliability of 3) False Node
message’s origin. Addition of a malicious node by an adversary to inject the
Availability is to determine if a node has the ability to use malicious data, false node would be computationally robust
the resources and the network is available for the messages to to lure other nodes to send data to it.
move on. 4) Node Malfunction
A malfunctioning node will generate inaccurate data
which would jeopardize the integrity of sensor network
A. Security classes especially when that node is data aggregating node for
Pfleeger [2] has identified four classes of security in example, a cluster leader.
computing systems. We integrate these four threat classes in 5) Node Outage
sensor networks. In computing systems the major assets are
What happens when a cluster leader stop functioning?
hardware, software, and data. While in sensor networks, our
Sensor network protocols should be robust enough to
goal is to protect, the network itself, the nodes and
mitigate the effects of node outages by providing alternate
communication among the sensor nodes. The four classes of
route.
threats which exploit the vulnerability of our security goals
are illustrated below in Figure 1: 6) Message Corruption
When contents of a message are modified by an attacker
it compromises the message integrity.
7) Traffic Analysis
Interruption Interception
Even the message transfer is encrypted in sensor
networks, it still leaves the high probability of analysis of
communication patterns and sensor activities revealing
enough information to enable adversary to cause more
malicious harm to sensor networks.
8) More attacks
Chris Karlof et al [4] have presented much detailed
Modification Fabrication
attacks in sensor networks which are described in the
following section. Table 1 below lists these attacks.
Figure 1. Pfleeger’s four classes of Systems security threats
TABLE I. ATTACKS IN WIRELESS SENSOR NETWORKS
In an interruption, a communication link in sensor Spoofed, Create routing loop, attract or repel network traffic,
networks becomes lost or unavailable. Examples of this sort altered, or extend or shorten source routes, generate false error
of threats are node capture, message corruption, addition of replayed messages etc
malicious code etc. routing
information
An interception means sensor network has been
compromised by an adversary where the attacker gains Selective Either in-path or beneath path by deliberate
unauthorised access to sensor node or data in it. Example of forwarding jamming, allows to control which information is
this type of attacks is node capture attacks. forwarded. A malicious node act like a black hole
and refuses to forward every packet it receives.
Modification means unauthorised party not only accesses
the data but tampers with it, for example modifying the data Sinkhole Attracting traffic to a specific node, e.g. to prepare
packets being transmitted causing a denial of service attack attacks selective forwarding
such as flooding the network with bogus data. Sybil attacks A single node presents multiple identities, allows to
In fabrication, an adversary injects false data and reduce the effectiveness of fault tolerant schemes
compromises the trustworthiness of information. such as distributed storage and multipath etc.

2
Wormhole Tunnelling of messages over alternative low-latency wasting the energies. The real base station will also be
attacks links to confuse the routing protocol, creating broadcasting the similar messages but will have only few
sinkholes etc. nodes responding to it.
Hello floods An attacker sends or replays a routing protocols 15) DoS attacks
hello packets with more energy
Denial of service attacks occur at physical level causing
radio jamming, interfering with the network protocol, battery
exhaustion etc.
9) Routing loops
In sensor networks routing loops attacks target the C. Layering based security approach
information exchanged between nodes. False error messages
are generated when an attacker alters and replays the routing 1) Application layer
information. Routing loops attract or repel the network Data is collected and managed at application layer
traffic and increases node to node latency. therefore it is important to ensure the reliability of data.
Wagner [6] has presented a resilient aggregation scheme
10) Selective forwarding which is applicable to a cluster based network where a
Selective forwarding is a way to influence the network cluster leader acts as an aggregator in sensor networks.
traffic by believing that all the participating nodes in network However this technique is applicable if the aggregating node
are reliable to forward the message. In selective forwarding is in the range with all the source nodes and there is no
attack malicious nodes simply drop certain messages instead intervening aggregator between the aggregator and source
of forwarding every message. Once a malicious node cherry nodes. In hierarchical clustering approach, communication
picks on the messages, it reduces the latency and deceives the channel between the aggregator and base station has
neighboring nodes that they are on a shorter route. potentially limited bandwidth because the cluster leader as an
Effectiveness of this attack depends on two factors. First the aggregator itself is a sensor node [5, 6]. To prove the validity
location of the malicious node, the closer it is to the base of the aggregation, cluster leaders use the cryptographic
station the more traffic it will attract. Second is the techniques to ensure the data reliability.
percentage of messages it drops. When selective forwarder
drops more messages and forwards less, it retains its energy 2) Network Layer
level thus remaining powerful to trick the neighboring nodes. Network layer is responsible for routing of messages
from node to node, node to cluster leader, cluster leaders to
11) Sinkhole attacks cluster leaders, cluster leaders to the base station and vice
In sinkhole attacks, adversary attracts the traffic to a versa.
compromised node. The simplest way of creating sinkhole is
to place a malicious node where it can attract most of the Routing protocols in sensor networks are of two types (1)
traffic, possibly closer to the base station or malicious node ID-based protocols, in which packets are routed to the
itself deceiving as a base station. One reason for sinkhole destination based on the IDs specified in the packets, and (2)
attacks is to make selective forwarding possible to attract the data centric protocols [7] in which packets contain attributes
traffic towards a compromised node. The nature of sensor that specify the type of data being provided. Law and
networks where all the traffic flows towards one base station Havinga [5] have described Karlof and Wagner’s [4] routing
makes this type of attacks more susceptible. attacks in sensor networks as below:

12) Sybil attacks • Packets are dropped completely, or selectively.


A type of attacks where a node creates multiple • The network is flooded with global broadcasts.
illegitimate identities in sensor networks either by fabricating • Some sensor nodes in the network are misguided
or stealing the identities of legitimate nodes. Sybil attacks into believing that nodes are either multiple hops
can be used against routing algorithms and topology away or that do not exist at all in the neighbours.
maintenance; it reduces the effectiveness of fault tolerant • A significant proportion of the traffic is tunnelled
schemes such as distributed storage and dispersity. Another from one place in the network to another distant
malicious factor is geographic routing where a Sybil node place of the network depriving other parts of the
can appear at more than one place simultaneously. network that under normal circumstances would
13) Wormholes have received the traffic themselves.
In wormhole attacks an adversary positioned closer to the • Sometimes traffic is lured to a particular node or a
base station can completely disrupt the traffic by tunneling small group of nodes, depriving other parts of the
messages over a low latency link. Here an adversary network that normally would have received the
convinces the nodes which are multi hop away that they are traffic themselves.
closer to the base station. This creates a sinkhole because • Security of routing protocols depends on the
adversary on the other side of the sinkhole provides a better location of nodes and the encryption techniques.
route to the base station.
14) Hello flood attacks 3) Data Link layer
Broadcasting a message with stronger transmission power Data link layer does the error detection and correction,
and pretending that the HELLO message is coming from the and encoding of data. Link layer is vulnerable to jamming
base station. Message receiving nodes assume that the and DoS attacks. TinySec [9] has introduced link layer
HELLO message sending node is the closest one and they try encryption which depends on a key management scheme.
to send all their messages through this node. In this type of However, an attacker having better energy efficiency can still
attacks all nodes will be responding to HELLO floods and rage an attack. Protocols like LMAC [8] have better anti-

3
jamming properties which are viable countermeasure at this
layer. [5] Y.W. Law and P. J.M Havinga, How to secure sensor
network, Proceeding of the 2005 International
4) Physical Layer Conference on Sensor Networks and Information
The physical layer emphasizes on the transmission media Processing, 5-8 Dec. 2005 pp. 89-95
between sending and receiving nodes, the data rate, signal
strength, frequency types are also addressed in this layer. [6] D. Wagner, Resilient aggregation in sensor networks, In
Ideally FHSS frequency hopping spread spectrum is used in Proceedings of the 2nd ACM workshop on Security of ad
sensor networks. hoc and sensor networks. ACM Press, 2004, pp. 78-87.

Table II below summarizes the attacks and [7] D. Ganesan, A. Cerpa, Y. Yu, and D. Estrin, Networking
countermeasures in a layering model in sensor networks. issues in wireless sensor networks, Journal of Parallel
and Distributed Computing (JPDC), Special issue on
TABLE II. LAYERING APPROACH IN SENSOR NETWORK ATTACKS AND
Frontiers in Distributed Sensor Networks. Vol. 64, 2004.
COUNTERMEASURES
[8] L.V. Hoesel and P. Havinga, A Lightweight Medium
Attack types Countermeasures Access Protocol (LMAC) for wireless sensor networks:
reducing preamble transmissions and transceiver state
Application Subversion and Malicious Node switches, in the proceedings of INSS, June 2004.
Layer Malicious Nodes Detection and
Isolation [9] C. karlof, N. Shastry and D. Wagner, TinySec: A link
Network Layer Wormholes, Key Management, layer security architecture for wireless sensor networks,
Sinkholes, Sybil, Secure Routing SenSys’04, November 3-5 2004, Baltimore, Maryland,
Routing loops USA

Data Link Layer Link layer Link layer encryption [10] H. Chan, A. Perrig, Security and privacy in sensor
Jamming networks, IEEE Journal of Computing, Vol. 36, Issue 10,
Oct. 2003, pp. 103-105
Physical Layer DoS and Node Adaptive antennas,
capture attcks Spread Spectrum [11] F. Stajano, Security for Ubiquitous Computing, John
Wiley and Sons, NY 2002, ISBN:0-470-84493-0

[12] E. Shi, and A. Perrig, Designing secure sensor networks,


V. CONCLUSION Journal of IEEE Wireless Communications, Vol. 11,
Issue 6, Dec. 2004 pgs 38-43.
Wireless Sensor networks have become promising future
to many applications. In the absence of adequate security, [13] N. Hu, Randy R. K. Smith and P. G. Bradford, Security
deployment of sensor networks is vulnerable to variety of for Fixed Sensor Networks, Proceedings of the 42nd
attacks. Sensor node’s limitations and nature of wireless annual Southeast regional conference, ACM Press, 2004,
communication poses unique security challenges. Current NY, USA
research in sensor network security is mostly built on a
trusted environment [12]; however there are several research [14] R. Anderson, H. Chan, and A. Perrig, Key infection:
smart trust for smart dust, 12th IEEE International
challenges remain unanswered before we can trust on sensor
Conference on Network Protocols. Oct 5-8 2004, Berlin,
networks. In this paper we have discussed threat models and
Germany
unique security issues faced by wireless sensor networks. On
the basis of our observation we motivate the need of a [15] A. Perrig, J Stankovic, D. Wagner, Security in wireless
security framework to provide countermeasures against sensor network, Communication of the ACM, Vol.47, No.
attacks in wireless sensor networks. 6, 2004

REFERENCES [16] Wireless sensor networks: getting started guide,


Crossbow Technology, Inc, San Jose, CA, Aug’04.
[1] L. Eschenauer and V. Gligor, A key-management scheme http://www.xbow.com/Support/Support_pdf_files/Gettin
for distributed sensor networks, Proceedings of the 9th g_Started_Guide_7430-0022-05_B.pdf [Viewed online
ACM conference on Computer and Communication 10 June 2006]
Security 2002, Washington DC, USA

[2] C.P. Fleeger, Security in computing, 3rd edition,


Prentice-Hall Inc. NJ. 2003

[3] J. Undercoffer, S. Avancha, A. Joshi, and J. Pinkston,


Security for sensor networks, 2002 CADIP Research
Symposium.

[4] C. Karlof and D. Wagner, Secure routing in wireless


sensor networks: Attacks and Countermeasures,
Elsevier’s Ad Hoc Networks Journal, Special Issue on
Sensor Network Applications and Protocols, Vol. 1, No.
2-3, pp. 293-315, 2003.

View publication stats

Vous aimerez peut-être aussi