Wireless Sensor Networks
Overview
Applications
Wireless Sensor Networks (WSN)
Wireless Sensor and Actuator Networks (WSAN)
Nodes process information and communicate it wirelessly
Applications:
Roles In WSNs
Sources: Measure data, report them “somewhere”
Sinks: Interested in receiving data from WSN
Actuators: Control device based on data, usually also a sink
General Limitations In WSNs
Limited computational power and memory
- (cryptography is computationally expensive!)
Limited Battery
Multi-Hop Network
- Failure of one/few nodes can cause total net breakdown
Nodes are exposed to an omnipresent attacker with a lot more computational power and infinite battery
Key Management In WSNs
needs cryptographic algorithms depend on secret (key)
Three ways to install keys
Key exchange often not possible due to limited resources
- Asymmetric cryptography computationally expensive
Key generation additionally includes transmitting and
receiving many messages
- Even higher energy consumption
Applying pre-shared keys is simple
- But nodes can be captured and keys extracted
Attacks On WSNs
Attacks On WSNs #1: Tampering
Nodes of a WSN might be exposed to physical access of an adversary who could tamper with them
Extract sensitive material such as cryptographic keys from memory (Cold boot attack)
Countermeasures:
Attacks On WSNs #2: Exhaustion & Interrogation
Make nodes performing superfluous and expensive operations
Battery exhaustion
Countermeasures
Exhaustion & Interrogation countermeasure: Client Puzzles
Concept: Proof-of-Work
Client must solve a task before receiving service
Flooding would exhaust malicious clients’ resources
Asymmetric demand for resources when solving the puzzle
Attacks On WSNs #3: Tampered Forwarding
WSNs usually require every node to forward packets from its neighbors
Suppose an attacker can modify the behavior of certain devices or the routing tables
Tampered Forwarding
Countermeasures
Usage of multiple disjoint routing paths
- Mitigates selective forwarding and blackhole attack
Monitoring neighbors
Authenticated routing updates
Periodic end-to-end probing
- Helps to detect congested or attacked network paths
Geographic forwarding
- Geo-location used for routing instead of network addresses
Diversity Coding
Attacks On WSNs #4: Wormholes
Multiple adversaries create a side-channel that provides an advantage over regular links
This channel can be used to forward information faster than the network
Can for instance be used to delude distance bounding
Countermeasures
Attacks On WSNs #5: Sybil Attack
Most protocols assume that a node has a single identity
Sybil attacker claims to have multiple identities and to be at an arbitrary location
Thus, attacker appears at multiple places at the same time
Countermeasures
Attacks On WSNs #6: HELLO Flooding
Flooding in general aims at overwhelming the victim‘s (or network‘s) limited resources (memory, battery, bandwidth,…)
Many protocols exchange HELLO messages to become aware of the network‘s topology or a node‘s neighbors
Countermeasures:
Attacks On WSNs: Summary
WSNs face many attacks which leverage the fact that resources are scarce in WSNs
Most of them aim at a denial of service or eavesdropping
For secure communication and to increase availability, WSNs need
But most countermeasures are in conflict with the limited resources of WSNs and are therefore impractical