Top Banner
SEMINAR REPORT ON Protocols and mechanisms for security Presented by SANJAY . D . DHANDARE Guided by Prof. saniya ansari mam 10,oct,2014 DYPSOE PUNE Department of Electronics and telecommunication Engg.
25
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: PROTOCOL MECHNISM FOR SECURITY ppt

SEMINAR REPORT ON Protocols and

mechanisms for security

Presented by SANJAY . D .

DHANDARE

Guided by Prof. saniya ansari mam

10,oct,2014

DYPSOE PUNE

Department of

Electronics and telecommunication Engg.

Page 2: PROTOCOL MECHNISM FOR SECURITY ppt

CONTENT INTRODUCTION.

What is protocol.

What is protocol mechanism.

What is network security.

Fundamentals of network security.

What it means?

Attacks on security network.

Mechanism for security.

Protocols for security.

Conclusion.

References.

Page 3: PROTOCOL MECHNISM FOR SECURITY ppt

INTRODUCTION

What is a Sensor Network ?A heterogeneous system combining tiny sensors and

actuators with general-purpose computing elements. Most consisting of hundreds or thousands of low-power, low-cost nodes deployed to monitor and affect the environment.

What are they used for? Ocean and wildlife monitoring. Monitoring of manufactured machinery. Building safety. Earthquake monitoring. Variety of military applications. Medical monitoring and research.

Page 4: PROTOCOL MECHNISM FOR SECURITY ppt

What is protocol?

PROTOCOL

“set of rules commonly employ for proper communication in between sender and receiver in every wireless sensor network.

Page 5: PROTOCOL MECHNISM FOR SECURITY ppt

What is protocol mechanism?

The mechanism in which different

protocol performs their well defined

task for healthy communication in

the sensor network.

This is the key term used in every

network to protect from different

attacks.

Page 6: PROTOCOL MECHNISM FOR SECURITY ppt

What is network security?

Network security is nothing but the

collection of all policies,

mechanisms and services that

afford a network which required

protection from unauthorised

access.

Page 7: PROTOCOL MECHNISM FOR SECURITY ppt

Fundamentals of network security

The network is said to be secure if it have,

Confidentiality.

Integrity.

Availability.

Page 8: PROTOCOL MECHNISM FOR SECURITY ppt

What it means?

DATA CONFIDENTIALITY – data leakage to

neighboring networks must be prevent.

DATA INTEGRITY – transmission data cannot be

modified.

AVAILABILITY–network able to work at any

time.

DATA AUTHENTICATION – verification of

sender/receiver.

Page 9: PROTOCOL MECHNISM FOR SECURITY ppt

Attacks on security

Following are the different attacks on

security:

Denial-of-service.

Routing attacks.

Data aggregation attacks.

Privacy attacks.

Page 10: PROTOCOL MECHNISM FOR SECURITY ppt

Denial-of-service attacks

Attempt to stop network from proper functioning.

Disturbed the service provided by the network.

It may occur at various layer of protocol :

physical layer Dos.Data link layer Dos.

Page 11: PROTOCOL MECHNISM FOR SECURITY ppt

Routing attacks

What happen?Data is forwarded along one or more

routes.

EFFECT:

Traffic increases at node and as a result packets (data) can not reaches to destination.

Page 12: PROTOCOL MECHNISM FOR SECURITY ppt

Examples of routing attacks

Blackhole attack.

Rushing attacks.

Sinkhole attacks.

Sybil attack.

Wormhole attack

Page 13: PROTOCOL MECHNISM FOR SECURITY ppt

Data aggregation attacks.

Reducing frequency of operation.Reducing packets size.Replacing real measurement by fake

readings.

Page 14: PROTOCOL MECHNISM FOR SECURITY ppt

Privacy attacks

May introduce by accessing the data

store at node.

May occur at node which perform

more activity.

The traffic analysis can be used to

identify the important nodes.

Page 15: PROTOCOL MECHNISM FOR SECURITY ppt

Mechanism for security

Cryptography :Cryptography is a method of storing

and transmitting data in a particular form so that only those for whom it is intended can read and process.

The term plaintext is often used which means ordinary text sometimes referred as cipher text called as encryption and back again called decryption

Page 16: PROTOCOL MECHNISM FOR SECURITY ppt

Symmetric and public key cryptography

SYMMETRIC CRYPTOGRAPHY:A encryption system in which the

sender and receiver of a messages share a single key that is used to encrypt and descrypt the data.

PUBLIC KEY CRYPTOGRAPHY;

It uses two keys a public key to encrypt the massage and a private key to descrypt them.

Page 17: PROTOCOL MECHNISM FOR SECURITY ppt

Symmetric cryptography

Page 18: PROTOCOL MECHNISM FOR SECURITY ppt

Key management

It is nothing but reliable and secure establishment of shared keys among neighbouring nodes in a network.

In this approach every sensor shares different pairwise key with each other. Hence the sensor network can be represented as matrix with rows and column.

Page 19: PROTOCOL MECHNISM FOR SECURITY ppt

example

Page 20: PROTOCOL MECHNISM FOR SECURITY ppt

Defence again attacks

Dos attacks.

Aggregation attacks.

Routing attacks

Page 21: PROTOCOL MECHNISM FOR SECURITY ppt

Security protocols

Encryption protocol.

Same message is encrypted differently at each time.

tinySec protocol.

It supports two mechanism :

Authentication encryption.

Authentication only.

Localized encryption and Authentication protocol.

Page 22: PROTOCOL MECHNISM FOR SECURITY ppt

Localized encryption and Authentication protocol.

It provide four keying mechanism as follows,

Individual key .

Group key.

Cluster key.

Pairwise key.

Page 23: PROTOCOL MECHNISM FOR SECURITY ppt

*** CONCLUSION ***

from above discussion we conclude

that the security is a important issue

in a wireless sensor network and can

be introduced by using a standard

protocol and mechanism to prevent

unauthorised access.

Page 24: PROTOCOL MECHNISM FOR SECURITY ppt

References

Dargie w and poellabaur fundamentals of wireless sensor networks :theory and practise john wiley and sons 2010 .

Protocols and architectures for wireless sensor networks holger karl andreas willig 2007.

And E-journals .

Page 25: PROTOCOL MECHNISM FOR SECURITY ppt

ANY QUERIES…

THANK YOU