Denial Of Service in Sensor Networks
Download
Report
Transcript Denial Of Service in Sensor Networks
Denial of Service in
Sensor Networks
Authors: Anthony D. Wood,
John A. Stankovic
Presented by: Aiyaz Amin Paniwala
1
The paper
Introduction
Theory and Application
Denial of Service Threat
Physical Layer
Link Layer
Networking Layer
Transport Layer
Conclusion
References
2
Introduction
WSN involves large-scale, real time data
processing in complex environments
WSN is used for various applications
Availability is of great importance
Consideration of security at design time is
essential
3
Theory
Growing use of application dependent sensor
networks
Many limitations exist in WSN like power
reserves, wireless communication, identifiers
Network must operate under partial failure
Network must meet real time requirements
Data may be intrinsically valid for short time
4
Application
Sensor Networks are used in different
environments with different needs
Military application is primary
Can be used in inaccessible locations like
volcanoes
Can be used in critical situations like natural or
man made disasters
In all applications network must be resilient to
individual node failure
5
Denial of Service Threat
Any event that diminishes or eliminates a
network’s capacity to perform it’s expected
function
Caused by hardware failures, software
bugs, resource exhaustion, environmental
conditions or other complicated
interactions
6
The Layered Approach
A layered network architecture improves
robustness
Each layer has different attacks and
different defensive mechanisms
Some attacks are applicable across
multiple layers
7
Tabular Representation
8
Physical Layer
This layer deals with the physical
transmission in the form of signals
Nodes use wireless communication
Base Stations use wired or satellite
communication.
Attacks
Jamming
Tampering
9
Jamming
Interferes with radio frequencies
An adversary can use k randomly
distributed jamming nodes
These k nodes can put N nodes out of
service (k<<N)
Effective for single frequency network
10
Detection of Jamming
Determined by constant energy as
opposed to lack of response
Jamming can be sporadic and hence more
difficult to detect yet effective
Jamming itself prevents exchanging data
or even reporting the attack
11
Prevention and Mitigation
Spread spectrum communication (code
spreading)
It is less feasible due to design complexity, more
power and more cost
Attacked nodes can switch to lower duty cycle
and wake up to check for jamming
For intermittent jamming nodes send few high
power, high priority messages to report attack
12
Local Jamming
13
Tampering
Attacker can physically tamper nodes
Likewise nodes can be interrogated and
compromised
Attacker can damage or replace sensor
and computation hardware
Attacker can extract sensitive material and
use it for further attacks
14
Prevention and Mitigation
Tamper proofing against physical damage
Camouflaging or hiding nodes
React to tampering by erasing
cryptographic or program memory
15
Link Layer
Provides Channel arbitration
Cooperative schemes are vulnerable to
DoS attacks
Sensor Network is susceptible to
Collision
Exhaustion
Unfairness
16
Collision
Adversary may cause disruption by
inducing collision in just one octet of
transmission
Corruption of ACK can induce costly
exponential back-off
The attacker requires minimum energy for
listening
17
Detection, Prevention and
Mitigation
Errors are detected using checksum
mismatch
There is no effective way of defending
against such an attack
Error Correcting codes can be used at the
cost of increased overheads
18
Exhaustion
Repeated retransmissions are triggered even by
unusually late collisions
This leads to exhaustion of battery source
It can potentially block availability
A node could repeatedly request channel access
with RTS
This causes power losses on both requesting
and responding node
19
Detection, Prevention and
Mitigation
Random back-offs can be used for prevention
Ineffective as they would only decrease
probability of inadvertent collisions
Time division multiplexing
Solve the indefinite postponement problem
MAC admission control rate limiting
Limiting the extraneous responses required
20
Unfairness
It is a weaker form of DoS
It mostly degrades service than denies it
It exploits MAC-Layer priority schemes
It can be prevented by use of small frames
This may increase framing overheads
Adversary can cheat while vying for
access
21
Network and Routing Layer
Messages may traverse many hops before
reaching the destination
The cost of relaying a packet and the probability
of its loss increases in an aggregate network
Every node can act as a router
Hence the routing protocols should be simple
and robust
22
Neglect and Greed
A neglectful node arbitrarily neglects to
route some messages
Its undue priority to messages originating
from it makes it greedy
Multiple routes or sending redundant
messages can reduce its effect.
It is difficult to detect
23
Homing
Important nodes and their identities are exposed
to mount further attacks
A passive adversary observes traffic to learn the
presence and location of critical resources
Shared cryptographic keys are an effective
mechanism to conceal the identity of such nodes
This makes the assumption that none of the
nodes have been subverted
24
Misdirection
Messages are forwarded in wrong paths
This attack targets the sender
Adversary can forge replies to route
discovery requests and include the
spoofed route
Sensor networks can use an approach
similar to egress filtering
25
Black Holes
Nodes advertise zero cost routes to every other
node
Network traffic is routed towards these nodes
This disrupts message delivery and causes
intense resource contention
These are easily detected but more disruptive
26
Authorization
This is a defense mechanism against
misdirection and black-hole
Only authorized node can share information
Public-key encryption can be used for routing
updates
The problems are with computational and
communication overheads and key management
27
Monitoring
Nodes can keep monitoring their
neighbors
Nodes become watchdogs for transmitted
packets
Each of them has a quality-rating
mechanism
28
Probing
A network probe tests network connectivity
This mechanism can be used to easily
detect Black holes
A distributed probing scheme can detect
malicious nodes
29
Redundancy
Lessens the probability of encountering a
malicious node
Duplicate messages can also be sent
using same path to deal with intermittent
failure
30
Transport Layer
Manages end-to-end connections
Sensor Networks utilize protocols with
minimum overhead
The potential threats are
Flooding
Desynchronization
31
Flooding
Adversary send many connection establishment
request to victim
Each request causes allocation of resources
It can be prevented by limiting the number of
connections
Connectionless protocols are not susceptible to
this attack
Another solution is client puzzles
32
Desynchronization
The attacker forges messages to one or
both ends with sequence numbers
This causes the end points to request
retransmissions of missed frames
This may lead to lack of availability and
resource exhaustion
Authentication can prevent such an attack
33
Adaptive rate control
Describe a series of improvements to standard
MAC protocols
Key mechanisms include
Random delay for transmissions
Back-off that shifts an applications periodicity phase
Minimization of overhead in contention control mechanisms
Passive adaptation of originating and route-through
admission control rates
Anticipatory delay for avoiding multihop hidden node
problems
34
Conclusion
Attempts at adding security focus on
cryptographic-authentication mechanisms
Use of higher security mechanisms poses
serious complications in Sensor Networks
It is essential to incorporate security
considerations during design-time
Without adequate protection against DoS and
other attacks sensor networks may not be
deployable at all
35
References
C.L.Schuba et al., “Analysis of a Denial of Service Attack on TCP”,
Proc. IEEE Symp. Security and Privacy, IEEE Press, Piscataway,
N.J., 1997, pp. 208-223
A Perrig et al., “SPIN: Security Protocols for Sensor Networks,”
Proc. 7th Ann. Intl. Conf. Mobile Computing and Networking
(MobiCom 2001), ACM Press, New York, 2001, pp. 189-199
CERT Coordination Center, “Smurf IP Denial-of-Service Attacks”,
CERT Advisory CA-98:01,Jan. 1998.
A. Woo and D.E. Culler, “A Transmission Control Scheme for Media
Access in Sensor Networks,” Proc. 7th Ann Int’l Conf. Mobile
Computing and Networking (MobiCom 2001), ACM Press, New
York, 2001, pp. 221-235
36