The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks Tanya Roosta (EECS, Berkeley) In Collaboration With: Sameer Pai (ECE, Cornell)

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Topology Control II.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Patrick Tague, David Slater, and Radha Poovendran Network Security.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
TRUST, Spring Conference, April 2-3, 2008 Taking Advantage of Data Correlation to Control the Topology of Wireless Sensor Networks Sergio Bermudez and.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
1 Meeyoung Cha and DK Lee Advisor - Sue Moon (Korea Advanced Institute of Science and Technology) IEEE INFOCOM 2005 Student Workshop Split-n-Save : Path.
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
Impact of Selfish Nodes on Route Discovery in Mobile Ad Hoc Networks Impact of Selfish Nodes on Route Discovery in Mobile Ad Hoc Networks Qi Zhang and.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
A Novel Mechanism for Flooding Based Route Discovery in Ad Hoc Networks Jian Li and Prasant Mohapatra GlobeCom’03 Speaker ︰ CHUN-WEI.
1 SmartGossip: An Adaptive Broadcast Service for Wireless Sensor Networks Presented By Thomas H. Hand Duke University Adapted from: “ SmartGossip: An Adaptive.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
CSE 6590 Fall 2009 Routing Metrics for Wireless Mesh Networks 1 12 November, 2015.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
MANET: Introduction Reference: “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”; S. Corson and J.
1 Gossip-Based Ad Hoc Routing Zygmunt J. Haas, Joseph Halpern, LiLi Cornell University Presented By Charuka Silva.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
به نام خدا سيد عليرضا كارداني مجتبي اميرخاني Path Set Selection in Mobile Ad Hoc Networks زمستان 1382.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
Routing Metrics and Protocols for Wireless Mesh Networks Speaker : 吳靖緯 MA0G0101.
“LPCH and UDLPCH: Location-aware Routing Techniques in WSNs”. Y. Khan, N. Javaid, M. J. Khan, Y. Ahmad, M. H. Zubair, S. A. Shah.
Abstract 1/2 Wireless Sensor Networks (WSNs) having limited power resource report sensed data to the Base Station (BS) that requires high energy usage.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
Routing Metrics for Wireless Mesh Networks
Routing Metrics for Wireless Mesh Networks
A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks Name: Patrick Zwane University: National Taipei University of.
Mesh-based Geocast Routing Protocols in an Ad Hoc Network
Introduction to Wireless Sensor Networks
Multi-channel, multi-radio wireless networks
Routing Metrics for Wireless Mesh Networks
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Presentation transcript:

The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks Tanya Roosta (EECS, Berkeley) In Collaboration With: Sameer Pai (ECE, Cornell) Phoebus Chen (EECS, Berkeley) Prof. Shankar Sastry (EECS, Berkeley) Prof. Stephen Wicker (ECE, Cornell) April 2, 2008

2 Outline Introduction Problem Setup Attack Scenarios Simulation Setup and Parameters Results Current/Future Work

3 Introduction Generally the focus of routing protocols for sensor networks: – Energy-efficiency – Guaranteed throughput – Usually involves a non-adversarial setting Sensor networks are deployed and left unattended – Susceptible to attacks – Must design networks with security in mind Our work – Determine the statistical impact of different attacks on sensor network routing – Determine performance of different families of routing protocols under particular attack scenarios

4 Problem Setup We abstract away the details of specific attacks and specific routing protocols Instead we focus on characterizing the statistics of attacks on different classes of routing algorithms Routing Protocols: – Single-path & Multi-path routing protocols – Deterministic and Probabilistic routing protocols Attack Scenarios – Adversary has compromised some number of nodes within the sensor network and has subverted their normal operations – Mote-class, insider attackers alter the data and forward it as normal – Attacks differ by the locations of the attackers within the network topology

5 Single-Path Routing Deterministic Single-path Routing – Minimum-weight path routing – Edges are assigned weights – Packets sent on path minimizing sum of weights on edges contained in the path Probabilistic Single-path Routing – Like a directed random walk on a graph – Each node assigns a probability to each neighbor node (e.g. uniform assignment) – Packet sent to next-hop neighbor chosen based on the assigned probability – Achieves load-balancing in a statistical sense

6 Multi-path Routing Protocols Deterministic Multi-path Routing – k-shortest node-disjoint paths – k-shortest edge-disjoint paths Probabilistic Multi-path Routing – Each node in the network broadcasts packets to all neighbors with some probability – Extreme case is probabilistic flooding

7 Attack Scenarios Uniformly distributed attack: – The attacker compromises a number of k nodes uniformly at random.

8 Attack Scenarios Random walk attack: – The attacker chooses a node to compromise uniformly at random and then performs a directed random walk towards the periphery of the network.

9 Attack Scenarios Spatial attack: – The attacker chooses a node to compromise uniformly at random and also compromises all nodes within a set preset radius.

10 Simulator Secure Sensor Network Routing Simulator SSNRS – Built in MATLAB to evaluate routing protocols in the attack scenarios – Discrete packet-time marching simulator – Allows for use of: Different channel models Routing topologies Routing protocols Attack scenarios

11 Parameters Used in Simulations

12 Baseline Average Energy Expenditure

13 Results: Uniform Attack

14 Results: Directed Random Walk

15 Results: Spatial Attack

16 Results Routing performance falls sharply with increasing number of uncooperative nodes (insider attackers) The performance degrades for most families of routing protocols Single-path routing performs worst with increasing number of uncooperative nodes Multi-path routing performs best, but comes at an increased energy cost

17 Results (cont.) The uniformly distributed attackers scenario is most detrimental to successful end-to-end packet delivery Spatial attacks are highly clustered, attacking nodes have a lower probability of being on a path from the source to the destination Random walk attacks have performance degradation results between the other two attack scenarios Probabilistic routing protocols are best to preserve confidentiality.

18 Current and Future Work Problem: We need a way to mitigate misbehavior in ad hoc and sensor networks – Nodes not forwarding data correctly (uncooperative nodes) during routing can cause major problems – Only those nodes that are behaving correctly (cooperating) should be authorized to have access to the data Solution: A trust system for wireless ad hoc and sensor networks – A trust value is a networked node’s belief (probability) in the ability of other nodes in the network to pass necessary data from this node while preserving data integrity and confidentiality A local metric for predicting the future behavior of other networked nodes Assists any node in distinguishing reliable forwarding nodes (cooperative nodes) from unreliable forwarding ones (uncooperative nodes) Goal: To develop robust trust systems for wireless ad hoc and sensor networks

19 References 1. “The Inherent Security of Routing Schemes in Ad Hoc and Sensor Networks”. Tanya Roosta, Sameer Pai, Phoebus Chen, Shankar Sastry, Stephen Wicker. In proceedings of the IEEE Globecom 2007, Washington D.C USA.