Determine the Security Issues in Wireless Sensor Networks Prof.Shashikant B. Ahire. Assistant Professor of Master of Computer Application Department, A.C.Patil College of Engineering, Kharghar-410210, Navi-Mumbai, Maharashtra sbahire.acpce@gmail.com Mr. Pankaj Pimple Student of of Master of Computer Application Department, A.C.Patil College of Engineering, Kharghar-410210, Navi-Mumbai, Maharashtra pppankaj39@gmail.com Abstract--Wireless Sensor Network (WSN) is an emerging technology which shows a very good number of valid futuristic applications both for common people and military. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. The basic idea of asensor network is to disperse tiny sensing devices that are capable of sensing some changes of incidents/parameters and communicating with other devices. The inclusion of wireless communication technology incurs various types of security threats. This paper introduces determination of security issues in wireless sensor network, by identifying various threats and the research issues some security measures in the WSN is proposed. In this paper I introduce different security considerations for accessing efficient security in a real time security processes. I also discuss the security for ensuring layered and robust security in wireless sensor networks. pressure, etc. and the corresponding data are transmitted through the network to a main location.The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. Basic Idea about WSN The WSN (Figure 1) is built of "nodes" – from a few hundreds or even thousands, where each node is connected to one or more sensors. Index Terms-Wireless Sensor Network (WSN), Security. I. INTRODUCTION Wireless Sensor Networks:Wireless Sensor Network is an ad hoc(created or done for a particular purpose as necessary) network that consists of a number of resource constrained devices spread across some geographical area to monitor the physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants detection and for the surveillance in the military applications. Now-a-days sensor networks are used in many industrial and civilian application areas including industrial process monitoring and control, health monitoring, environment and habitat monitoring, healthcare applications, home automation, traffic controls, etc. Security: Security means to provide the protection against the danger, loss and criminals but in the networks it is the Protection of information from theft, corruption or natural disaster while allowing the information to be accessible by the intended users. A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, sound, Fig.1 WSN Each such sensor network node has typically several parts: a radio frequency trans receiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few thousands of rupees, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. WSN Topologies WSN nodes are typically organized in one of three types of network topologies. In a star topology, each node connects directly to a gateway. In a cluster tree network, each node connects to a node higher in the tree and then to the gateway, and data is routed from the lowest node on the tree to the gateway. Finally, to offer increased reliability, mesh networks feature nodes that can connect to multiple nodes in the system and pass data through the most reliable path available. This mesh link is often referred to as a router (see Figure 2). Figure 2. Common WSN Network Topologies II. APPLICATIONS OF WSN Wireless Sensor Networks (WSN) has off late, found applications in wide-ranging areas. In this section I list some of the prominent areas of applications of WSN. The list would bevery lengthy if I exhaust all the areas of WSN applications. Therefore, in this paper only handful applications are provided. >The military applications of sensor nodes include battlefield surveillance and monitoring, guiding systems ofintelligent missiles and detection of attack by weapons of massdestruction. >The Medical Application: Sensors can beextremely useful in patient diagnosis and monitoring. Patientscan wear small sensor devices that monitor their physiologicaldata such as heart rate or blood pressure. >Environmental monitoring: It includes traffic,habitat, Wild fire etc. >Industrial Applications: It includes industrialsensing and diagnostics. For example appliances, factory, supplychains etc. >Infrastructure Protection Application: Itincludes power grids monitoring, water distribution monitoringetc. >Miscellaneous Applications: Sensors will soonfind their way into a host of commercial applications at home andin industries. Smart sensor nodes can be built into appliances athome, such as ovens, refrigerators, and vacuum cleaners, whichenable them to interact with each other and be remotecontrolled. III. SECURITY ISSUES IN WSN Security issues in sensor networks depend on the need to know what we are going to protect. Four security goals in sensor networks which are Confidentiality, Integrity, Authentication and Availability. Confidentiality is the ability to conceal message from a passive attacker, where the message communicated on sensor networks remain confidential. Integrity refers to the ability to confirm the message has not been tampered, altered or changed while it was on the network. Authentication Need to know if the messages are from the node it claims to be from, determining the reliability of message’s origin. Availability is to determine if a node has the ability to use the resources and the network is available for the messages to move on. Freshness implies that receiver receives the recent and fresh data and ensures that no adversary can replay the old data. This requirement is especially important when the WSN nodes use shared-keys for message communication, where a potential adversary can launch a replay attack using the old key as the new key is being refreshed and propagated to all the nodes in the WSN. To achieve the freshness the mechanism like nonce or time stamp should add to each data packet. Why is security necessary in WSN? The reasons are many. First of all Wireless networks are vulnerable to security attacks due to the broadcast nature of the transmission medium. Furthermore, wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically safe. Attacks on WSNs can be classified from two different levels of views:1. Attack against security mechanisms. 2. Attack against basic mechanisms (like routing mechanisms). In many applications, the data obtained by the sensing nodes needs to be kept confidential and it has to be authentic. In the absence of security a false or malicious node could intercept private information, or could send false messages to nodes in the network. The major attacks are: Denial of Service (DOS), Wormhole attack, Sinkhole attack, Sybil attack, Selective Forwarding attack, Passive information gathering, Node capturing, false or malicious node, Hello flood attack etc. In this section a brief overview on these attacks are presented. > Denial of Service (DoS) It occurs by the unintentional failure of nodes or malicious action. The simplest DoS attack tries to exhaust the resources available to the victim node, by sending extra unnecessary packets and thus prevents legitimate network users from accessing services or resources to which they are entitled. DoS attack is meant not only for the adversary’s attempt to subvert, disrupt, or destroy a network, but also for any event that diminishes a network’s capability to provide a service. In wireless sensor networks, several types of DoS attacks in different layers might be performed. At physical layer the DoS attacks could be jamming and tampering, at Data link layer, collision, exhaustion, unfairness, at network layer, neglect and greed, homing, misdirection, black holes and at transport layer this attack could be performed by malicious flooding and asynchronization. >The Wormhole attack One node in the network (sender) sends a message to another node in the network (receiver node).Then the receiving node attempts to send the message to its neighbours. The neighbouring nodes think the message was sent from the sender node (which is usually out of range), so they attempt to send the message to the originating node, but it never arrives since it is too far away. Wormhole attack is a significant threat to wireless sensor networks, because, this sort of attack does not require compromising a sensor in the network rather, it could be performed even at the initial phase when the sensors start to discover neighbouringinformation. the traffic from a particular area through a compromised node, creating a metaphorical sinkhole with the adversary at the centre. Sinkhole attacks typically work by making a compromised node look especially attractive to surrounding nodes with respect to the routing algorithm. Sinkhole attacks are difficult to counter because routing information supplied by a node is difficult to verify. As an example, a laptop-class adversary has a strong power radio transmitter that allows it to provide a high-quality route by transmitting with enough power to reach a wide area of the network. >Passive Information Gathering An intruder with an appropriately powerful receiver and well-designed antenna can easily pick off the data stream. Interception of the messages containing the physical locations of sensor nodes allows an attacker to locate the nodes and destroy them. Besides the locations of sensor nodes, an adversary can observe the application specific content of messages including message IDs, timestamps and other fields. > Node Capturing Wormhole attacks are difficult to counter because routing information supplied by a node is difficult to verify. A particular sensor might be captured, and information stored on it might be obtained by an adversary. > The Sybil attack > False or Malicious Node In this attack, a single node i.e. a malicious node will appear to be a set of nodes and will send incorrect information to a node in the network. The incorrect information can be a variety of things, including position of nodes, signal strengths, making up nodes that do not exist. Most of the attacks against security in wireless sensor networks are caused by the insertion of false information by the compromised nodes within the network. >Hello flood attacks Authentication and encryption techniques can prevent an outsider to launch a Sybil attack on the sensor network. However, an insider cannot be prevented from participating in the network, but he should only be able to do so using the identities of the nodes he has compromised. Public key cryptography can prevent such an insider attack, but it is too expensive to be used in the resource constrained sensornetworks. > Selective Forwarding attack It is a situation when certain nodes do not forward many of the messages they receive. The sensor networks depend on repeated forwarding by broadcast for messages to propagate throughout the network. > Sinkhole attacks In a sinkhole attack, the adversary’s aim is to lure nearly all The Hello flood attacks can be caused by a node which broadcasts a Hello packet with very high power, so that a large number of nodes even far away in the network choose it as the parent. All messages now need to be routed multihop to this parent, which increases delay. IV.DEFENSE MECHANISMS This section highlights the preventive measures of all the attacks mentioned above.It is to be noted that the list would be very vast if I try to exhaustively list all the preventive measures. So the list is restricted to only a handful of the solutions. > DOS prevention The mechanisms to prevent DoS attacks include payment for network resources, pushback, strong authentication and identification of traffic. One security technique uses authentication streams to secure the reprogramming process. This divides a program binary into a series of messages, each of which contains a hash of the next message. This mechanism ensures that an intruder can’t hijack an ongoing program transmission, even if he or she knows the hashing mechanism. This is because it would be almost impossible to construct a message that matches the hash contained in the previous message. A digitally signed advertisement, which contains the program name, version number, and hash of the first message, ensures that the process is securely initiated. We can defeat many threats using existing encryption and authentication mechanisms, and other techniques (such as identifying jamming attacks) can alert network administrators of ongoing attacks or trigger techniques to conserve energy on affected devices. >Wormhole attack prevention The mechanism to combat the wormhole attack include, DAWWSEN, a proactive routing protocol based on the construction of a hierarchical tree where the base station is the root node, and the sensor nodes are the internal or the leaf nodes of the tree. A great advantage of DAWWSEN is that it doesn’t require any geographical information about the sensor nodes, and doesn’t take the time stamp of the packet as an approach for detecting a wormhole attack, which is very important for the resource constrained nature of the sensor nodes. >Sybil prevention The mechanisms to prevent against Sybil attacks are to utilize identity certificates. The basic idea is very simple. The setup server, before deployment, assigns each sensor node some unique information. The server then creates an identity certificate binding this node’s identity to the assigned unique information, and downloads this information into the node. To securely demonstrate its identity, a node first presents its identity certificate, and then proves that it possesses or matches the associated unique information. This process requires the exchange of several messages. Merkle hash tree can be used as basic means of computing identity certificates. The Merkle hash tree is a vertex-labelled binary tree, where the label of each non-leaf vertex is a hash of the concatenation of the labels of its two child vertexes. The primary path of a leaf vertex is the set of vertexes on the path from the leaf to the root of the tree. The authentication path consists of the siblings of the vertexes on this primary path. Given a vertex, its authentication path, and the hash function, the primary path can then be computed, up to and including the root of the tree. This computed value of the root can then be compared with a stored value, to verify the authenticity of the label of the leaf vertex. >Passive information gathering prevention To minimize the threats of passive information gathering, strong encryption techniques need to be used. > Node capture prevention If a node has been compromised then how to exclude that node and that node only, from the sensor network is at issue. This issue is solved by Localized Encryption and Authentication protocol (LEAP). LEAP (localized encryption and authentication protocol) is an efficient protocol for inter-node traffic authentication. This protocol relies on a key sharing approach that authorizes in-network processing, and at the same time mitigates a number of possible attacks. > False or Malicious Node prevention This attack basically should be checked in the Routing layer itself. Details pertaining to the preventive measures for „false node‟ attack are out of the scope of this paper. >Hello flood attacks prevention This can be avoided by checking the bidirectional of a link, so that the nodes ensure that they can reach their parent within one hop. >Selective Forwarding attack prevention Multipath routing can be used to counter these types of selective forwarding attacks. Messages routed over paths whose nodes are completely disjoint are completely protected against selective forwarding attacks involving at most compromised Allowing nodes to dynamically choose a packet‟s next hop probabilistically from a set of possible candidates can further reduce the chances of an adversary gaining complete control of a data flow. >Sinkhole attacks prevention Such attacks are very difficult to defend against. One class of protocols resistant to these attacks is geographic routing protocols. Geographic protocols construct a topology on demand using only localized interactions and information and without initiation from the base station. V. CONCLUSION All of the previously mentioned security threats, the Hello flood attack, wormhole attack, Sybil attack, sinkhole attack, serve one common purpose that is to compromise the integrity of the network they attack. Also In the past, focus has not been on the security of WSNs, but with the various threats arising and the importance of data confidentiality, security has become a major issue. Although some solutions have already been proposed, there is no single solution to protect against every threat. In our paper I mainly focus on the security threats in WSN. I’ve presented the summery of the WSNs threats affecting different layers along with their defense mechanism. I conclude that the defense mechanism presented just gives guidelines about the WSN security threats; the exact solution depends on the type of application the WSN is deployed for. There’re many security mechanisms which are used in „layer-by-layer‟ basis as a security tool. Recently researchers are going for integrated system for security mechanism instead of concentrating on different layers independently. Through this paper I’ve tried to present the most common security threats in various layers and their most probable solution. ACKNOWLEDGEMENT I would gratefully and sincerely appreciate my supervisor: Assistant Prof. Shashikant B. Ahire. Their inspiring guidance, rich experience and sustained encouragement enabled me to develop an intensive understanding of my research area. Without the generous help of my supervisor, this work would not have been possible. I am honored to have Prof. Shashikant B. Ahire from A.C.Patil College as my opponent. I thank her for her kind support and helpful suggestions during the discussions in my MCA. REFERENCES [1]. Gaurav Jolly, Mustafa C. Kuşçu, Pallavi Kokate, et al. A Low-Energy Key Management Protocol for Wireless Sensor Networks, In Proceedings of the IEEE Workshop on Integrated Management of Power Aware Communications, Computing and Networking. [2]. Rabaey J.M., Ammer J., Karalar T., et al. PicoRadios for Wireless Sensor Networks: The Next Challenge in Ultralow Power Design, IEEE International Solid- State Circuits Conference. [3]. Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong, Security in Wireless Sensor Networks:Issues and Challenges,. [4]. Antonio de la Piedra, FedericoDominguez, Wireless Sensor Networks for Environmental Research: A Survey on Limitations and Challenges, EuroCon 2013. [5]. Saleh M., Khatib I. A., Throughput Analysis of WEP Security in Ad Hoc Sensor Networks, Proc. The Second International Conference on Innovations in Information Technology, Dubai. [6]. Chris Karlof *, David Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Ad Hoc Networks. [7] Feng Zhao,Leonidas Guibas,”Wireless Sensor Networks”,Morgan Kaufmann Publications[9.3]. [8] Adrian Perrig, John Stankovic, and David Wagner, “Security in wireless sensor networks”, Commun.ACM,47(6)[10.3]. [9] A.D. Wood and J.A. Stankovic,“ Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10[1.3]. [10]David R. Raymond and Scott F. Midkiff,(2008) "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, vol. 7, no. 1[2.3]. [11] Al-Sakib khan Pathan et.al, ”Security in wireless sensor networks: Issues and challenges” [7.3] [12]C. Karlof and D. Wagner, (2003). “Secure routing in wireless sensor networks:Attacks and countermeasures,” AdHoc Networks Journal, vol. 1, no. 2–3[8.3] [13] Zaw Tun and Aung Htein Maw,” Worm hole Attack Detection in Wireless Sensor networks”, proceedings of world Academy of Science, Engineering and Technology Volume 36[12.3]. [14]Rouba El Kaissi, Ayman Kayssi, Ali Chehab and Zaher Dawy” DAWWSEN: A Defense Mechanism against Wormhole attack In Wireless Sensor Network”,Proceedings of the Second International Conference on Innovations in Information Technology [13.3]. [15]A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks”,Computer, 35(10)[14.3]. [16]M. Zorzi and R. R. Rao, "Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Multihop Performance," IEEE Transactions on Mobile Computing, vol. 2, no. 4[15.3]. [17]D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly-resilient, energy-efficient multipath routing in wireless sensor networks,”Mobil Computing and Communications Review, vol. 4[16.3].