Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games William Kozma Jr., and Loukas Lazos Dept. of Electrical and Computer Engineering University.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
A Survey of Secure Wireless Ad Hoc Routing
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.
CSE University of Washington Multipath Routing Protocols in AdHoc Networks.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
A Reputation Based Scheme for Stimulating Cooperation Aruna Balasubramanian, Joy Ghosh and Xin Wang University at Buffalo (SUNY), Buffalo, NY {ab42, joyghosh,
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Ad Hoc Wireless Routing COS 461: Computer Networks
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Mobile Routing protocols MANET
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Wireless Sensor Networks COE 499 Energy Aware Routing
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.
On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Eunyoung Chang 1 CS 6204 Mobile Computing.  Problem  Proposed Approaches  COMMIT Approaches  THE SYSTEM MODEL  The COMMIT Protocol  Protocol Analysis.
Fundamentals of Computer Networks ECE 478/578
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
MAC Protocols for Sensor Networks
Trusted Router and Collaborative Attacks Bharat Bhargava.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Ad-hoc Networks.
Environment-Aware Reputation Management for Ad Hoc Networks
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Mobile ad hoc networking: imperatives and challenges
ITIS 6010/8010 Wireless Network Security
Detecting Denial-of-Service Attacks against Sensor Networks
Presentation transcript:

Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games William Kozma Jr., and Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona

n1n1 S D n2n2 n3n3 n4n4 n5n5 Ad hoc networks lack a network infrastructure Limited communication range Nodes rely on multi-hop routes to communicate Any node may act as a router Routing in Ad Hoc Networks 2 r Routing implemented on the basis of collaboration Implicit trust placed on intermediate routers Routing implemented on the basis of collaboration Implicit trust placed on intermediate routers William Kozma Jr. and Loukas Lazos, SecureComm 2009

Node Misbehavior Nodes may be compromised physically or remotely S ophisticated users - alter software/hardware of their device Adversaries with intimate knowledge of node operation One type of misbehavior is packet dropping Selfishness – Refuse to forward packets to conserve energy Maliciousness – Refuse to forward packets to degrade network performance 3 n1n1 S D n2n2 n3n3 n4n4 n5n5 William Kozma Jr. and Loukas Lazos, SecureComm 2009

The Misbehavior Identification Problem Given a path P SD from source S to destination D, identify misbehaving nodes that drop packets, in a resource efficient manner 4 William Kozma Jr. and Loukas Lazos, SecureComm 2009 n1n1 S D n2n2 n3n3 n4n4 n5n5

Current Solutions Acknowledgment-Based Schemes (e.g., 2ACK, Liu et. al., Byzantine fault detection, Awerbuch et. al.) Packets acknowledged 2 hops or more upstream Reputation-Based (e.g., CONFIDANT,, Buchegger et. al.) Rely on message overhearing to verify forwarding Credit-Based (e.g., Sprite, Zhong et. al.)) Provide incentive for a node to cooperate n1n1 n2n2 n3n3 n4n4 n5n5 n6n6 S D $ $ $ $ $ $ 5 William Kozma Jr. and Loukas Lazos, SecureComm 2009 All schemes incur overhead on a per-packet basis

Research Goal Per-packet behavior evaluation is too expensive in Energy (operating in promiscuous mode) Performance (must observe instead of sleeping or communicating concurrently) Communication (may consume more bandwidth) Critical questions Can we perform per-packet evaluation without per-packet monitoring (or very low per-packet overhead)? What is the penalty we have to tradeoff? William Kozma Jr. and Loukas Lazos, SecureComm

Implicit Node Monitoring William Kozma Jr. and Loukas Lazos, SecureComm n1n1 n2n2 n3n3 n4n4 n5n5 n6n6 S D Audit Request Audit Reply Audit Request Audit Reply Nodes record a proof of packets they receive/forward Some nodes are audited to provide proof of behaving Multiple proofs are combined to identify misbehavior Use the honest to identify the malicious

Analogy to Rényi-Ulam Games Rényi-Ulam game: the game of 20 questions Questioner wins if ω is determined in at most q questions Responder has a limited number of lies Winning strategy: a strategy that wins regardless of how lies occur 8 Question Questioner Responder Secret Value: ω Reply William Kozma Jr. and Loukas Lazos, SecureComm 2009 The process of combining multiple audits to identify a misbehaving node is analogous to Rényi-Ulam games Ω = [1, 2, …,n]ω q ℓ Search space ℓ

SD n1n1 n2n2 n3n3 n4n4 n5n5 Rényi-Ulam Game: Misbehaving Node Identification: Misbehavior Identification as a Rényi-Ulam Game QuestionerResponder ω ≤ y ? Secret Value: ω in Ω Yes Did you see packets X? Yes || Proof Questioner Search Space ω 9 William Kozma Jr. and Loukas Lazos, SecureComm 2009 Response Question Responder

Types of Rényi-Ulam Games Two questioning modes: Batch Adaptive Two types of questions: Cut questions Membership questions QuestionerResponder Q1Q1 Q2Q2 Q3Q3 R1R1 R2R2 R3R3 Q1Q1 R1R1 Q2Q2 R2R2 Q3Q3 R3R3 Ω = [1, 2, 3, 4, 5, 6, 7, 8, 9, 10] Ω = [1, 2, 3, 4, 5, 6, 7, 8] Q: Is ω ≤ 8?A: Yes Ω = [3, 4, 5, 6, 7, 8] Q: Is ω ≤ 2?A: No Ω = [3, 4, 5, 6, 7, 8] Q: Is ω  A = {3, 4, 5, 6, 7, 8} ?A: Yes Ω = [3, 7, 8] Q: Is ω  A = {4, 5, 6} ?A: No Ω = [1, 2, 3, 4, 5, 6, 7, 8, 9, 10] 10 William Kozma Jr. and Loukas Lazos, SecureComm 2009 Goal: Devise a strategy to always find ω in the least number of questions

Implementing Cut Questions X i : Set of packets forwarded by node n i Is the misbehavior node upstream of audited node n i ( ω ≤ y )? |X S ∩ X i | ≈ |X S |: n i claims misbehavior occurs downstream (ω ≥ y ) |X S ∩ X i | << |X S |: n i claims misbehavior occurs upstream (ω ≤ y) n1n1 n2n2 n3n3 n4n4 n5n5 n6n6 S D 11 Behaving Node Suspicious Node William Kozma Jr. and Loukas Lazos, SecureComm 2009

Adaptive Auditing with Cut Questions 12 n1n1 n2n2 n3n3 n4n4 n5n5 n6n6 S D Pelc’s questioning strategy [Pelc ‘89]: Binary search requiring log 2 k questions; determine value ω' ℓ questions on if ω' = ω; total # of questions log 2 k + ℓ Auditing Strategy: V = P SD = {n 1,…,n k } |X S ∩ X i | ≈ |X S |: V = {n i,…,n k } |X S ∩ X i | << |X S |: V = {n 1,…,n k } Winning strategy: q = log 2 |P SD | + 2 (|M| + 1) audits Behaving Node Suspicious Node William Kozma Jr. and Loukas Lazos, SecureComm 2009 Misbehaving Link

Node Identification One misbehaving node Path division: exclude nodes in turn Path expansion: add node to remove misbehaving link Multiple misbehaving nodes Identification process repeated |M| + 1 times 13 n1n1 n2n2 n3n3 n4n4 n5n5 n6n6 S D Behaving Node Suspicious Node nαnα nβnβ William Kozma Jr. and Loukas Lazos, SecureComm 2009

How About Colluders? 14 n1n1 n2n2 n3n3 n4n4 n5n5 n6n6 S D Colluding nodes can cause incorrect convergence To avoid framing n 3, n 4 are simultaneously audited Since |X 3 ∩ X 4 | ≈ |X 3 |, then |M|≥2 Partition P SD into P Sn 3, P n 4 D ; search independently Behaving Node Suspicious Node 34 William Kozma Jr. and Loukas Lazos, SecureComm 2009

Adaptive Auditing with Membership Questions Dhagat’s questioning strategy [ Dhagat ‘92]: Perform a binary-based search while checking for contradicting answers Let V i = Ω = {1,…,k}; divide V i into two equal subsets A = {1,…,k/2}, B = {k/2,…,k} “Is ω  A?” then V i+1 = A “Is ω  B?” then V i+1 = B Else contradiction among answers; return to previous stage (V i-1 ) Winning strategy if q = 15 QuestionerResponder ω = 9 Is ω  A = {1, 2, 3, 4, 5} ? No V = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10} Is ω  B = {6, 7, 8, 9, 10} ? Yes V = {6, 7, 8, 9, 10} Is ω  A = {6, 7, 8} ? No V = {6, 7, 8, 9, 10} Is ω  B = {9, 10} ? No V = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10} William Kozma Jr. and Loukas Lazos, SecureComm 2009

Adaptive Auditing with Membership Questions n1n1 n2n2 n3n3 n4n4 n5n5 n6n6 S D Membership questions constructed from two audits “Is n M  A = {n 1,…,n 4 }?” implies |X 1 X 4 | << |X 1 | Auditing Strategy V 1 = P SD = {n 1,…,n k }; A = {n 1,…,n i }, B = {n i,…,n k } If |X 1 ∩ X i | << |X 1 |, V i+1 = A, else If |X i ∩ X k | << |X i |, V i+1 = B, else Return to previous stage if contradiction found (V i-1 ) Select a new n i to prevent repetitive lies Worst case: q ≤ 4 log 2 (|P SD |) + 2 (|M| + 1) audits Behaving Node Suspicious Node 16 U ? William Kozma Jr. and Loukas Lazos, SecureComm 2009

Commit to a claim of a set of packets X i received/forwarded Bloom filters provide a compact representation of a membership set X i v: m-bit vector Creating Audit Replies h1h1 h2h2 hkhk … x x x William Kozma Jr. and Loukas Lazos, SecureComm 2009

Source sends audit request Defines the duration and starting packet number Audited node adds packets to its Bloom filter Signs filter with its private key and sends it back to the source Signed Bloom filter acts as a commitment to packets forwarded Source computes: Evaluating Responses (1) n1n1 n2n2 n3n3 n4n4 n5n5 n6n6 S D 18 Audit Request X4X4 sig 4 (X 4 ) William Kozma Jr. and Loukas Lazos, SecureComm 2009 Per packet evaluation without per-packet overhead; Only m-bit vector sent to source

Impact of Mobility Addition/Removal of an honest node does not affect REAct Misbehaving node added to P SD Added to V; as if there from start of search Added outside of V; as if two colluding nodes existed in P SD Misbehaving node removed from P SD Performance resumed 19 n1n1 n2n2 n3n3 n4n4 n5n5 SD nαnα n1n1 n2n2 n3n3 n4n4 n5n5 SD nαnα n1n1 n2n2 n3n3 n4n4 n5n5 SD n1n1 n2n2 n3n3 n5n5 SD William Kozma Jr. and Loukas Lazos, SecureComm 2009

Performance Evaluation Metrics of interest: Communication Overhead Identification Delay Compared our scheme to: CONFIDANT (reputation-based scheme) 2ACK (acknowledgment-based scheme) AWERBUCH (acknowledgment-based scheme) For CONFIDANT, defined energy for overhearing as 0.5 times the energy for transmission For 2ACK, varied percent of packets acknowledged, p = {1, 0.5, 0.1} 20 William Kozma Jr. and Loukas Lazos, SecureComm 2009

Communication Overhead 21 William Kozma Jr. and Loukas Lazos, SecureComm 2009

Communication Overhead for 2 Misbehaving Nodes William Kozma Jr. and Loukas Lazos, SecureComm

Identification Delay William Kozma Jr. and Loukas Lazos, SecureComm

Communication Overhead for 1 Misbehaving Node 24 William Kozma Jr. and Loukas Lazos, SecureComm 2009

Communication Overhead as a Function of Audit Size William Kozma Jr. and Loukas Lazos, SecureComm

Identification Delay 26 William Kozma Jr. and Loukas Lazos, SecureComm 2009

Communication Overhead 27 William Kozma Jr. and Loukas Lazos, SecureComm 2009

Take Away Remarks For resource-constrained networks, per-packet behavior evaluation is too resource demanding We can trade identification delay for communication and energy efficiency Showed a logarithmic increase in # of transmitted messages with path size Showed small increase in identification delay compared to savings Differentiation of maliciousness from bad channel conditions, congestion and collisions is not yet clear (or an easy problem to solve) 28 William Kozma Jr. and Loukas Lazos, SecureComm 2009