05-03-2012, 01:56 PM
Overview of Sensor Network Security
[attachment=17985]
Challenges
Wireless Communication
Bring eavesdropping, unauthorized access, spoofing, replay and denial-of-service attacks;
Resource-constrained sensor nodes
Limit the degree of encryption, decryption, and authorization on the individual sensor nodes;
Compromised sensor nodes
Denial-of-service attacks;
Attack Threads
Spoofed, altered, or replayed routing information
Selective forwarding
Sinkhole attacks
Sybil attacks
A single nodes presents multiple identities
Wormholes
HELLO flood attacks
Cryptographic Mechanism
Use of public key cryptography in a manner that takes advantage of its asymmetric nature to minimize power consumption
Use of secret key (symmetric) cryptography within tamper-resistant sensors in a manner that efficiently emulates public key functionality (i.e., key notarization and symmetric-key certificates)
Efficient key management techniques, including adaptive selection and use of group keying
Use of special-purpose hardware to accelerate selected cryptographic operations