Module 3
Module 3
ATTACK ANALYSIS
Rituparna Chaki
rchaki@ieee.org
Security challenges
2
Security Challenges
Open To All :
A wireless channel is open to everyone. With a radio interface
configured at the same frequency band, anyone can monitor or
participate in communications.
No security consideration during designing of protocols
Most protocols for WSNs do not include potential
security considerations at the design stage and are known
publicly. Therefore, attackers can easily launch attacks by
exploiting security holes in those protocols.
3
Resource constrained :
make it very difficult to implement strong security algorithms on a sensor platform
due to the complexity of the algorithms.
High scalability:
A WSN can scale up to thousands of sensor nodes. These pose the demand
for simple, flexible, and scalable security protocols.
Cost effectiveness?
A stronger security protocol costs more resources on sensor nodes, which can
lead to the performance degradation of applications.
Weak security protocols can be broken easily by attackers and thus pose a
great threat to the sensor networks.
Hostile deployment scenarios:
A WSN is usually deployed in hostile areas without any fixed infrastructure.
Thus, difficult to perform continuous surveillance after network deployment. So, it
may be susceptible to various kinds of attacks
4
Data Security Requirements
5
Integrity: Integrity is provided to check that the send message has not been
modified by an intruder. The contents of the message can be deleted or
modified by the attacker. This may be prevented by providing a message
authentication code.
Data Freshness: Data freshness means the recent data that is up-to-date and
ensures that no old messages have been repeated and then relayed by the
attacker. To solve this problem a nonce, or another time related counter,
can be added into the packet to ensure data freshness.
Self-Organization: A wireless sensor network is ad hoc in nature and each
node should be independent and flexible enough to organize itself
according to the environment. Due to the Infrastructure less feature, there
are many challenges imposed on the network security in WSN. If self-
organization is lacking in a sensor network, the damage resulting from an
attack or even the risky environment may be devastating.
6
Time Synchronization:
Time synchronization is an important feature of most of the
sensor network applications. Furthermore, sensors may wish to
compute the end-to-end delay of a packet transmitted between two
sensors. A more collaborative Sensor network may require group
synchronization for tracking applications.
Secure Localization:
Often, the utility of a sensor network will rely on its ability to
accurately and automatically locate each sensor in the network. A
sensor network designed to locate faults will need accurate location
information in order to locate the exact location of a fault.
Unfortunately, an attacker can easily manipulate no secured location
information by reporting false signal strengths, replaying signals.
7
Attacks based on capability of
Attacker
Active/Passive
Outsider/Insider
Mote Class/Laptop Class
8
Active attacks
9
Passive attacks
10
Outsider attacks are the attacks from nodes outside a
WSN while insider attacks occur when legitimate
inner nodes of a WSN pertain to unauthorized ways.
To overcome these attacks, we require robustness
against Outsider Attacks, Resilience to Insider
Attacks, Graceful Degradation with Respect to Node
Compromise and Realistic Levels of Security.
11
Mote-class versus laptop-class a:
The former consists of an attacker attacking a WSN
by using a few nodes with similar capabilities to the
network nodes; whereas the latter consists of an
adversary that can use more powerful devices (e.g., a
laptop) to attack a WSN. These devices have greater
transmission range, processing power, and energy
reserves than the network nodesttacks
12
Attacks Based on the information
being transmitted
Interruption
Interseption
Modification
Fabrication
Replaying
13
Interruption
Communication link in sensor networks becomes lost or
unavailable. This causes the mal functioning of the service. The
main purpose is to launch denial-of service (DoS) attacks. This is
aimed at all layers of WSN protocol stack.
Interception
An interception means that some unauthorized party has gained
access to the network ant to its nodes along with the data. An
Example of this type of attacks is node capture attacks. This
threatens message confidentiality. The main purpose is to
eavesdrop on the information carried in the messages. This
operation is usually aimed at the application layer of WSN
protocol stack
14
Modification
An unauthorized party not only accesses the data but also tampers it. This threatens
message integrity. The main purpose is to confuse or mislead the parties involved in
the communication protocol. This is usually aimed at the network layer and the
application layer of WSN protocol stack, because of the richer semantics of these
layers.
Fabrication
An unauthorized party inserts spurious data and compromises the trustworthiness of
information. This threatens message authenticity. The main purpose is to confuse or
mislead the parties involved in the communication protocol. This operation can also
facilitate DOS attacks, by flooding the network.
Replaying existing messages
This operation threatens message freshness. The main purpose of this operation is to
send the same messages again and again or send the old messages on the
communication link, in order to confuse or mislead the parties involved in the
communication protocol that is not time- aware.
15
Attacks based on Origin of
Information
16
Host-based Attacks
19
Layer-Specific Attacks
Rushing attack
Eavesdropping
20
DOS attack
22
Attacks depending on the Technique
Selfishness &
Packet Dropping
Denial-of-Service
24
B E
C
D
A
S F
25
Hello Flood Attack
27
B E
C
D
A
S F
M1
M2
Source Sink
29
Malicious code attacks
30
Viruses, worms, trojans, …
Characteristics :
Attack vector –
• Social engineering- (Make them want to run it)
• Vulnerability exploitation – (Force your way in the system)
• Piggybacking – (Make it run when other programs run)
Payload - Make use of flaws in software input handling,
eg. Buffer overflow attacks.
31
Identity theft (or MAC spoofing)
32
Man-in-the-middle in wireless LAN
33
Denial of Service Attack
34
Denial of Service Attack
35
Denial of Service Attack
Constant jamming
Radio signals are emitted continuously with intervals. This
type of jamming causes two things:
The signals from the jammers keep the medium busy and
therefore transmissions are deferred at the transmitting
node, and/or
At the receiving node reception is interfered with due to the
signals transmitted by the jammers.
Deceptive jamming
Radio signals are continuously transmitted with regular
intervals.
Counter-jamming
40
Resource exhaustion attacks
45
This is relatively tougher to carry out for an attacker, as
the password and/or SSID of the network has to be
cracked first.
Even without the knowledge of network password,
authentication flooding can be carried out but APs more or
less remain unperturbed. A failed authentication request
will not result in overflowing of Association table or State
table; it only takes up the processor speed for pre –
processing of requests.
Strong authentication methods also go a long way in
preventing authentication and association flood attacks.
De-authentication Flooding attack
53
Security Management Schemes
Low-Level
Key Establishment
Robustness in Communication
Secrecy & authentication
Privacy
Secure Routing
Resilience
High Level
Intrusion Detection
Secure Group Management
Key-establishment
63
64