Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.

Slides:



Advertisements
Similar presentations
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Advertisements

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Application of Bayesian Network in Computer Networks Raza H. Abedi.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Introduction to Wireless Sensor Networks
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Tzu-Hsuan Shan 2006/11/06 J. Winter, Y. Xu, and W.-C. Lee, “Prediction.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
Key management in wireless sensor networks Kevin Wang.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
An Energy-efficient Target Tracking Algorithm in Wireless Sensor Networks Wang Duoqiang, Lv Mingke, Qin Qi School of Computer Science and technology Huazhong.
Authors: Joaquim Azevedo, Filipe Santos, Maurício Rodrigues, and Luís Aguiar Form : IET Wireless Sensor Systems Speaker: Hao-Wei Lu sleeping zigbee networks.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
2004 IEEE International Conference on Mobile Data Management Yingqi Xu, Julian Winter, Wang-Chien Lee.
1 Y-MAC: An Energy-efficient Multi-channel MAC Protocol for Dense Wireless Sensor Networks Youngmin Kim, Hyojeong Shin, and Hojung Cha International Conference.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
WIRELESS SENSOR NETWORKS: POWER RELATED ISSUES Jay Wiley, # CSE 7344,Computer Networks and Distributed Systems II Dr. Golla.
TRUST, Spring Conference, April 2-3, 2008 Taking Advantage of Data Correlation to Control the Topology of Wireless Sensor Networks Sergio Bermudez and.
A Framework for Energy- Saving Data Gathering Using Two-Phase Clustering in Wireless Sensor Networks Wook Chio, Prateek Shah, and Sajal K. Das Center for.
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
WP4 deliverable Critical Infrastructure Protection: Attack Prevention Solutions and Attacks.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
Computer Networks Group Universität Paderborn TANDEM project meeting Protocols, oversimplification, and cooperation or: Putting wireless back into WSNs.
Tarun Bansal, Bo Chen and Prasun Sinha
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
ELECTIONEL ECTI ON ELECTION: Energy-efficient and Low- latEncy sCheduling Technique for wIreless sensOr Networks Shamim Begum, Shao-Cheng Wang, Bhaskar.
Tufts Wireless Laboratory Tufts University School Of Engineering Real-Time Data Services for Cyber Physical Systems Zhong Zou.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
I-Hsin Liu1 Event-to-Sink Directed Clustering in Wireless Sensor Networks Alper Bereketli and Ozgur B. Akan Department of Electrical and Electronics Engineering.
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Max do Val Machado Raquel A. F. Mini Antonio A. F. Loureiro DCC/UFMG DCC/PUC Minas DCC/UFMG IEEE ICC 2009 proceedings Advisor : Han-Chieh Chao Student.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks Bugra Gedik Ling Liu Philip S. Yu IEEE Transactions on Parallel and Distributed.
IEEE COMMUNICATIONS LETTERS, VOL. 9, NO. 9, SEPTEMBER 2005 Zhen Guo,
Hacker Detection in Wireless sensor network
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Aziz Nasridinov and Young-Ho Park*
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Presentation transcript:

Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk , Republic of Korea Abstract. A wireless sensor network (WSN) is often partitioned into a set of spatial clusters to save energy for data collection. Each cluster includes sensor nodes with similar sensing data, and only a few sensor nodes (samplers) report their sensing data to a base node. Then the base node may predict the missed data of non-samplers using the spatial correlation between sensor nodes. The problem is that the WSN is vulnerable to internal security threat such as node compromise. If the samplers are compromised and report incorrect data intentionally, then the WSN should be contaminated rapidly due to the process of missed data predic-tion at the base node. In this paper, we propose three algorithms to detect compro-mised nodes for secure data collection in the WSN. The proposed algorithms are novel in the sense that they are completely integrated into the underlying data col-lection algorithms. Experiment results indicate that the proposed algorithms can detect compromised nodes with a high accuracy and an energy-efficient manner. Key words: Wireless sensor network, Security, Data collection, Node compro-mise, Performance evaluation 1 Introduction The primary function of a wireless sensor network (WSN) is to collect data for ob- servation and analysis of physical phenomena [4,7]. In periodic data collection, every node reports periodically its sensing data to the base node. Many researches prefer the periodic approach because it enables arbitrary data analysis at the base node [1,3,9]. A spatial clustering is a representative way of saving energy in periodic data collection [1, 5]. It partitions the network into a set of clusters where a cluster includes sensor nodes with similar sensing data. For each cluster, only a few sensor nodes (samplers) report their data to the base node. All the rest of sensor nodes can save their energy by keeping in sleep mode. The base node may predict the missed data using the spatial correlation between sensor nodes. The WSN is vulnerable to security threats both external and internal due to unreli-able wireless channels, unattended operation of sensor nodes, and resource constraint [2]. Node compromise is a major type of internal attacks. Compromised sensor nodes release all the security information to the adversary. Then, the adversary can easily launch internal attacks with data alteration, message negligence, selective forwarding, and jamming. Note that the node compromise is especially problematic for periodic

data collection, where only the samplers may report data to the base node. If the sam-plers are compromised and report incorrect data intentionally, then the WSN should be contaminated rapidly due to the process of missing data prediction at the base node. This means that detecting and defending against node compromise are inevitable tasks to guarantee the correctness of data collection at the WSN. In this paper, we propose three algorithms to detect node compromise for secure data collection in a WSN. The proposed algorithms are based on the spatial clustering and tries to detect compromised nodes with an energy-efficient manner. Unlike previous security algorithms for the WSN [2,6, 8], our algorithms consider the underlying data collection architectures. The security task is completely integrated into the underlying data collection algorithm. This enables our algorithms to optimize energy consumption for message transmission and sampling. 2 Algorithms for Node Compromise Detection 2.1 Monitoring by Neighbors (MBN) At MBN, every neighbor node of a sampler has a role to a watchdog that monitors the message sent from the sampler. To detect compromised samplers, MBN requires that a cluster header (CH) has complete location information of every sensor node in its cluster to identify neighbor nodes of the sampler. Furthermore, each sensor node is assumed to have a correlation vector to its neighbor nodes in the cluster. Suppose that a sensor node s s is selected as a sampler. s s notifies itself to the CH, and the CH wakes up the sensor nodes in nbr ( s s ). For each node s i ∈ nbr ( s s ), it reads its sensing data and overhears the message from s s. If the sensing data sent from s s is not strongly correlated to that of s i, s i reports to the CH. If majority in nbr ( s s ) report to the CH, the CH decides that s s is compromised. The underlying assumption of MBN is that majority in nbr ( s s ) are not compromised. However, if the assumption is not hold, MBN would fail to detect compromised samplers. 2.2 Monitoring by Cluster Head (MBCH) At MBCH, the CH has a role to detect the compromised node. MBCH modifies the data collection procedures such that (1) at least three samplers of a cluster are selected for each data-sampling period, and (2) samplers are required to send their sensing data to the CH. The CH determines some samplers as compromised nodes if their sensing data are not strongly correlated from those of majority samplers. The CH forwards sensing data to the base node only for samplers it decides not to be compromised. Since MBCH is based on majority consensus between samplers, MBCH would be more accurate as the number of samplers increase. If there are only a few samplers, small number of com-promised samplers would lead to a wrong decision at the CH. This shows an interesting tradeoff between energy consumption and security enforcement

2.3 Monitoring by Hybrid (MBHB) Both MBN and MBCH cause false negative errors in the sense that they could not detect compromised samplers. MBHB tries to prevent the false negative error by com- bining MBN and MBCH. It consists of two phases to detect the node comprise. At the first phase, the majority vote is performed by neighbor nodes of each sampler, which is similar to MBN. If the sampler gets a majority vote, the CH determines it as a compro- mised node. At the second phase, similar to MBCH, the CH performs another checking of majority consensus among samplers passing the first phase. Some sampler may also be decided as a compromised node in this phase. The CH forwards sensing data to the base node only for samplers passing both phases. 3 Concluding Remarks The WSN is vulnerable to security threats both external and internal due to unreli- able wireless channels, unattended operation of sensor nodes, and resource constraint. In this paper, we proposed three algorithms to detect compromised nodes in WSN. They are monitoring by neighbors (MBN), monitoring by cluster head (MBCH), and a hybrid algorithm of MBN and MBCH (MBHB). Every algorithm is based on spa-tial clustering and tries to detect compromised nodes with energy-efficient manner. The performance study indicates that MBHB can detect compromised nodes with the most energy-efficient manner. Furthermore, it can detect every compromised node even the case when half of entire sensor nodes are compromised. References 1.H. Cho, “Distributed Multidimensional Clustering based on Spatial Correlation in Wireless Sensor Networks,” Computer Systems Science and Engineering 26 (2011). 2.X. Du, “Detection of Compromised Sensor Nodes in Heterogeneous Sensor Networks,” Proc. Int Conf Communications (2008). 3.B. Gedik, L. Liu, and P. Yu, “ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks” IEEE Trans Parallel and Distributed Syst 18 (2007). 4.K. Jang, J. Kang, and H. Kouh, “A Cluster Formation Scheme with Remaining Energy Level of Sensor Nodes in Wireless Sensor Networks,” The Journal of IWIT 9 (2009). 5.T. Le, N. Pham, and H. Choo, “Towards a Distributed Clustering Scheme based on Spatial Correlation in WSNs,” Proc. Int. Wireless Communications and Mobile Computing Conf (2008). 6.F. Liu, X. Cheng, and D. Chen, “Insider Attacker Detection in Wireless Sensor Networks” Proc. IEEE Int Conf Computer Communications (2007). 7.C. Nam, K. Jang, and D. Shin, “Energy-Efficient Data Aggregation and Dissemination based on Events in Wireless Sensor Networks,” The Journal of IWIT 11 (2011). 8.A. Stetsko, L. Folkman, and V. Matya, “Neighbor-based Intrusion Detection for Wireless Sensor Networks,” Proc. Int Conf Wireless and Mobile Communications (2010). 9.S. Yun and H. Cho, “An Energy-Efficient Periodic Data Collection using Dynamic Cluster Management Method in Wireless Sensor Network,” Journal of IEMEK 5 (2010)