Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication 2006. 2 2006. 11. 28 Jeon, Seung.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Mobile Ad Hoc Networks
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Wearable Badge for Indoor Location Estimation of Mobile Users MAS 961 Developing Applications for Sensor Networks Daniel Olguin Olguin MIT Media Lab.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Fault-Tolerant Target Detection in Sensor Networks Min Ding +, Dechang Chen *, Andrew Thaeler +, and Xiuzhen Cheng + + Department of Computer Science,
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
A Low-Cost Method to Thwart Relay Attacks in Wireless Sensor Networks Reza Shokri Tutors: Panos Papadimitratos, Marcin Poturalski 29 January 2008.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 16th Lecture Christian Schindelhauer.
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, and Srdjan ˇCapkun Department of Computer Science, ETH Zurich Attacks on Public WLAN-based.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
Sensor Positioning in Wireless Ad-hoc Sensor Networks Using Multidimensional Scaling Xiang Ji and Hongyuan Zha Dept. of Computer Science and Engineering,
A Survey of Secure Location Schemes in Wireless Networks /5/21.
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
1 Some Security Challenges for Mesh Networks Jean-Pierre Hubaux EPFL Switzerland Joint work with Imad Aad, Naouel Ben Salem, Levente Buttyan, Srdjan Capkun,
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Relative Accuracy based Location Estimation in Wireless Ad Hoc Sensor Networks May Wong 1 Demet Aksoy 2 1 Intel, Inc. 2 University of California, Davis.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
Performance Study of Localization Techniques in Zigbee Wireless Sensor Networks Ray Holguin Electrical Engineering Major Dr. Hong Huang Advisor.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
An Efficient Localization Algorithm Focusing on Stop-and-Go Behavior of Mobile Nodes IEEE PerCom 2011 Takamasa Higuchi, Sae Fujii, Hirozumi Yamaguchi and.
NDSS 2004Hu and Evans, UVa1 Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans [lingxuan, Department.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Cooperative Location-Sensing for Wireless Networks Charalampos Fretzagias and Maria Papadopouli Department of Computer Science University of North Carolina.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Presented by Edith Ngai MPhil Term 3 Presentation
Packet Leashes: Defense Against Wormhole Attacks
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors
Secure Location Verification and Stabilization
Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran
Secure Verification of Location Claims
Wireless Mesh Networks
Security in SDR & cognitive radio
Presentation transcript:

Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung Woo

2 / 18  Introduction  Position attack and distance estimation techniques  Verifiable Multilateration (VM)  Secure positioning in Sensor network  Conclusion Contents

3 / 18 Introduction  Positioning and distance estimation techniques for wireless network Vulnerable to attack from internal and external attacks  Internal attack Internal attacker can report false position and distance information  External attack External attacker can modify (spoof) the measured positions and distances of nodes  The secure positioning mechanism is necessary

4 / 18 Positioning Attacks  Distance enlargement and reduction attack Internal attacker External attacker Claimant Verifier

5 / 18 Attacks on network systems [1]  Global Positioning system (GPS) Satellites based system 3-D positioning with an accuracy of around 3m Limitation  Not available for indoor and dense urban positioning  Civilian GPS was never designed for secure positioning  Can be spoofed by GPS satellite simulator (External attack)  The authority or another mobile node have no way to verify the correctness of node’s position (Internal attack)

6 / 18 Attacks on network systems [2]  Ultrasound (US) positioning Measuring time of flight (TOF) of the sound signal between two node Limitation  Only available in indoor systems  Vulnerable to distance reduction and enlargement attacks  Enlargement attack  Attackers can send Jamming or replaying signals  Reduction attack  Attackers can send faster signals

7 / 18 Attacks on network systems [3]  Radio (RF) positioning Based on the transmitted and received signal strength RF TOF-based systems  Node measures their mutual distance based on the time of propagation of the signal  External attacker can only increase distance  Distance is based on the signal speed  Internal attackers can increase and decrease distance  By reporting false report signal RF distance bounding techniques  Allows nodes to distance bound to others  Prevents an internal attackers from reducing the measured distance

8 / 18 Attacks on network systems [4]  Distance bounding Prevent distance reduction Internal attacker External attacker Distance bound

9 / 18 Secure positioning protocol  Distance bounding protocol A Verifier node can verify that a claimant nodes being at certain distance Vulnerable to distance enlargement attacks but not to distance reduction attacks  Authenticated ranging protocol Assumes that the claimant and the verifiers are mutually trusted  Claimant nodes report its processing time to the verifier which then computes the range based on the report times Do not need high speed HW than distance bound Same resistance to External attackers  Not resistant to distance reduction of internal attackers

10 / 18 Verifiable Multilateration  Verifiable Multilateration (VM) Secure computation and verification of the positions  Verifiers can specify the position reported by nodes Proposition of VM  The position of device in two (three) dimension can be computed to three or four reference point Characteristic of VM  At least three reference points  Computations performed by an authority

11 / 18 Verifiable Multilateration  Verifiable Multilateration algorithm [1] The verifiers perform distance bounding to the claimant  With power range of verifiers The authority computes an estimate position from all of the verifiers The authority runs the following test  δ-test  Distance bounding - Distance in verifiers and claimants < δ  Point in the triangle test  Whether claimant point is within the triangle of verifiers  If both tests are positive, the authority accepted as real, otherwise the position is rejected  otherwise, the authority regard it as the enlargement attack

12 / 18 Verifiable Multilateration  Verifiable Multilateration algorithm [2] Verifier Claimant 1. Distance bounding Verifier 2. Estimation of claimants 3. δ-test 4. Triangle Position test

13 / 18 Security properties of VM  Verifiable Multilateration (VM) with several protocol VM with distance bounding  An external attacker cannot cheat any positions within the triangle  The attacker can owns several devices and each device authenticate to the authority VM with authenticated ranging  Protection against external attacker, but not against untrusted claimants  Most suitable for mutually trusted positioning systems

14 / 18 Positioning in sensor network  Threat analysis More severe than if positioning is performed directly to base stations  Temporal or permanent displacement of the nodes undetected to the verifier Attacks by internal attacker are simpler and more harmful than those performed by external attackers  Internal attackers can modify the computed network topology by reporting non-existing links

15 / 18 Positioning in sensor network  Direct sensor positioning Sensors are being positioned directly by the landmark stations The verification depends on the number of verifiers and their power ranges Optimal number of verifiers In L*L area,  N=[(2L/R)+3][(2L/R)+1]/2 An optimal placement of verifiers is much more efficient than their random placement  But the random placed verifiers can prevent the cloning attack

16 / 18 Positioning in sensor network  Cooperative Positioning (SPINE) Sensors measure distance bounds to their neighbors  The distance bounds are verified using VM The positions of the nodes are computed by the neighbor sensors BDV (Basic Distance Verification)  Verification triangles around claimants with verifiers and its neighbors  Verification triangles around verifiers and its neighbors  The measured distance bounds are verified in all triangles, by performing VM

17 / 18 Positioning in sensor network  Security analysis of BDV The resistance of BDV to attacks  Depends on the number and on the mutual dependence of triangles  K verification triangle in network If the triangles are node disjoint  Can resists up to 2k distance enlargement If the triangles are node joint and edge-disjoint  Can resists up to 2k distance enlargement by external attackers  Not resist attacks by a single compromised node adjacent to the spoofed distance If the triangles are edge joint  the BDV can resists to up to k+1 distance enlargements by external attackers

18 / 18 Conclusion  Security analysis Analyzing positioning and distance estimation techniques The effective techniques for secure positioning  Verifiable Multilateration (VM) techniques shows good performance compared to other techniques  The proposal techniques in sensor network : SPINE Mode detailed analysis and implementation of distance bounding is necessary