1 Wireless Networks Lecture 37 Transport Protocols/Security in WSN Part IV Dr. Ghalib A. Shah.

Slides:



Advertisements
Similar presentations
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Advertisements

Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols.
Distributed Hop-by-Hop Rate Adjustment for Congestion Control in Sensor Networks Presented by: Manmohan Voniyadka Sapna Dixit Vipul Bhasin Vishal Kumar.
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols II.
1-1 Transport Layer. 1-2 Motivation  What is expected out of a transport protocol for sensor networks ? Reliability, QoS (e.g., delay guarantees, priority.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
Transport Protocol in Wireless Sensor Networks. Motivation  What is expected out of a “transport” protocol for sensor networks ? Reliability, congestion.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
Mehmet C. Vuran Vehbi C. Gungor Özgür B. Akan School of Electrical & Computer Engineering Georgia Institute of Technology Atlanta, GA {mcvuran,
CIS 725 Wireless networks. Low bandwidth High error rates.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
1 TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Hai Yan Computer Science & Engineering University of Connecticut.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks – Chris Karlof, Naveen Sastry & David Wagner Dr. Xiuzhen Cheng Department of Computer.
Mobile Communications: Mobile Transport Layer Mobile Communications Chapter 10: Mobile Transport Layer  Motivation  TCP-mechanisms  Indirect TCP  Snooping.
Asstt. Professor Adeel Akram.  Motivation  TCP mechanisms  Indirect TCP  Snooping TCP  Mobile TCP  Fast retransmit/recovery  Transmission freezing.
Wireless Sensor Networks COE 499 Energy Aware Routing
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
ESRT: Event to Sink Reliable Transport in Sensor Networks Yogesh S., O. Akan, I. Akyildiz (GaTech) ECE 256 Spring 2009.
GARUDA: Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks Seung-Jong Park et al IEEE Transactions on mobile computing.
Sensor Network Security: Survey Team Members Pardeep Kumar Md. Iftekhar Salam Ah. Galib Reza 110/28/2015.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan Networks and Mobile Systems Group MIT Computer Science and.
Improving TCP Performance over Wireless Networks
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Mobile Transport Layer  Motivation  TCP-mechanisms  Indirect TCP  Snooping TCP  Mobile TCP  Fast retransmit/recovery  Transmission freezing  Selective.
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Topics discussed in this section:
Introduction to Wireless Sensor Networks
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
TCP Vegas: New Techniques for Congestion Detection and Avoidance
Transport layer.
Process-to-Process Delivery, TCP and UDP protocols
PART 5 Transport Layer Computer Networks.
Ad-hoc Transport Layer Protocol (ATCP)
Transport Layer Unit 5.
Routing Metrics for Wireless Mesh Networks
Lecture 45 Review of Lectures Dr. Ghalib A. Shah
Tarun Banka Department of Computer Science Colorado State University
IT351: Mobile & Wireless Computing
Security Of Wireless Sensor Networks
Congestion Control (from Chapter 05)
Transport Protocols for Sensor Networks
Net 323 D: Networks Protocols
TCP for Wireless Networks
Distributed Systems CS
Congestion Control (from Chapter 05)
CSE 313 Data Communication
Security of Wireless Sensor Networks
Protocols.
Congestion Control (from Chapter 05)
Collection Tree Protocol
Congestion Control (from Chapter 05)
An Overview of Security Issues in Sensor Network
Congestion Control (from Chapter 05)
Computer Networks Protocols
Protocols.
Distributed Systems CS
Presentation transcript:

1 Wireless Networks Lecture 37 Transport Protocols/Security in WSN Part IV Dr. Ghalib A. Shah

2 Outlines  Transport Protocols for WSN  TCP/UDP for WSN  Protocols ►PSFQ ►ESRT ►CODA  Security Threats in WSN  TinySec  Motivations of Link Layer security  TinySec Design goals  Semantic Secure Encryption in TinySec

3 Last Lecture  Routing Challenges and Design Issues ►Deployment, Routing method, heterogeneity, fault tolerance, power, mobility etc  Routing Protocols ►SPIN ►Directed Diffusion ►ACQUIRE ►LEACH ►TEEN/APTEEN ►GAF ►GEAR ►SPEED

4 Reliable Transport Protocols for Wireless Sensor Networks Sink-to-Node(s) Transport  Pump Slow Fetch Quickly (PSFQ)  Reliable Multi-Segment Transport (RMST)  Garuda Nodes-to-Sink Transport  Event-to-Sink Reliable Transport (ESRT)  End-to-End Reliable Event Transfer in WSNs Congestion Control  Congestion Detection and Avoidance (CODA)  Mitigating Congestion in WSNs

5 Why not TCP or its variants for WSN?  Higher overheads for short data transmissions.  Flow and congestion control cause unfair bandwidth for farther nodes.  Throughput degrades under wireless due to higher packet losses.  End-to-end congestion needs longer time to mitigate congestion, causing more congestion to occur.  End-to-end reliability consumes more energy and bandwidth than hop-by-hop.  Packet-based reliability, which is not required for event- driven applications

6 Why not UDP?  Lower over overheads but ►No congestion control ►No flow control ►No reliability

7 Pump Slowly, Fetch Quickly (PSFQ)  Nodes broadcast fragments, in-sequence to next hop, which stores and forwards. If a node detects gap it broadcasts a NACK. Hop-by-hop store and forward Application Reprogramming or re-tasking of sensor networks Features NACK, In sequence caching, Loss due to transmission drops not congestion, Hop-by-hop error recovery Goals Operate under high error rates, minimum support from underlying layers, low latency, minimize no of transmissions for lost detection and recovery Description Pump, Fetch, Report Msgs C.Y. Wan, A.T. Campbell, and L. Krishnamurthy, “PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks,” WSNA'02, Atlanta, Georgia, USA, September 28, 2002.

8 PSFQ Operations Pump Operation  User Node broadcasts a packet to its neighbors every Tmin  Decrements TTL and schedules a transmission ►Tmin < Ttransmit < Tmax ►If a node hears same transmission four times before Ttransmit it would cancel its transmission Fetch Operation  Sequence number gap is detected ►Node will send a NACK message upstream, NACK scope is 1 hop ►NACKs are generated every Tr; (Tr << Tmax) ►NACKs can be cancelled if neighbors have sent similar NACKs  Node enters ‘proactive fetch’ mode if last segment hasn’t been received and no packet has been delivered after Tpro = a * (Smax - Smin) * Tmax Report Operation  Used as a feedback/monitoring mechanism

When No Link Loss – Multi-Hop Forwarding takes place Error Recovery Control Messages are wasted Error recovery – Store and Forward. PSFQ Pump Operation. If not duplicate and in-order and TTL not 0 Cache and Schedule for Forwarding at time t (T min <t<T max ) lost Recover lost Recover 2 T min T max 21 t T min T max 1 1 1

10 PSFQ Problems with PSFQ  Uniformly distributed channel error model  Need fine tuning of timers for good results (Tmin, Tmax, Tr)  First Packet Delivery  Cache size limitation T proc 12 last-1 last PSFQ Proactive Fetch Operation lost 2 3 T min T max TrTr TrTr 2 2 PSFQ Fetch Operation. Recover 2

11 Event-to-Sink Reliable Transport (ESRT) for Wireless Sensor Networks  Event-to-sink reliability  Self-configuration  Energy awareness [low power consumption requirement!]  Congestion Control  Variation in complexity at source and sink. [computation complexity] S

12 ESRT’s Definition of Reliability  Reliability is measured in terms of the number of packets received. Or reporting frequency i.e., number of packets/decision interval.  Observed reliability: number of received data packets in decision interval at the sink.  Desired reliability: number of packets required for reliable event detection.  Normalized reliability = observed/desired.

13 ESRT ESRT Operations

14 Algorithm for ESRT  If congestion and low reliability: decrease reporting frequency aggressively. (exponential decrease)  If congestion and high reliability: decrease reporting to relieve congestion. No compromise on reliability (multiplicative increase)  If no congestion and low reliability: increase reporting frequency aggressively (multiplicative increase)  If no congestion and high reliability: decrease reporting slowing (half the slope)  Drawbacks ►Event-based reporting frequency not good for all the nodes

15 CODA: Congestion Detection and Avoidance  The transport of event impulses is likely to lead to varying degrees of congestion in the network.  CODA using channel sampling detects congestion and broadcasts this information to upstream nodes Application General Purpose (event-to-sink) Features Uses buffer occupancy and channel sampling to detect congestion, assumes event occurrence as source of congestion not wireless links or interference Goals minimize congestion both transient and persistent Description Open-loop hop-by-hop backpressure, Closed-loop multi- source regulation C.Y. Wan, S.B. Eisenman, and A.T. Campbell, “CODA: Congestion Detection and Avoidance in Sensor Networks,” The First ACM Conference on Embedded Networked Sensor Systems (Sensys03), Los Angeles, CA, USA. November, 2003.

16 CODA Congestion Detection  Accurate and efficient congestion detection is important ►Buffer queue length or Buffer occupancy – not a good measure of the congestion. ►Channel loading – sample channel at appropriate time to detect congestion. Open loop, hop-by-hop backpressure  A node broadcasts backpressure msgs to upstream nodes as long as it detects congestion  An upstream node decides whether to further propagate the msg or not, depending on its own local network condition

17 CODA Closed-loop, multi-source regulation  When a source event rate is greater than some max. theoretical throughput, it is more likely to contribute to congestion, so it enter into sink regulation  The sink sends ACKs at some predefined rate or certain no. of ACKs over a predefined period. If source does not gets necessary ACKs it decreases its rate Congestion detected 12 1,2,3 ACK 4,5,6 Congestio n detected 7,8 Regulate bit is set ACK Open loop, hop-by-hop backpressure Closed loop, multi-source regulation

18 Security threats in Sensor Networks  Use of wireless communications -In a broadcast medium, adversaries can easily eavesdrop on, intercept, inject and alter transmitted data.  Adversaries can Interact with networks from a distance by inexpensive radio transceivers and powerful workstations.  Resource consumption attacks. Adversaries can repeatedly send packets to drain nodes battery and waste network bandwidth, can steal nodes.  However, these threats are not addressed. Focus is on guaranteeing message authenticity, integrity and confidentiality

19 TINYSEC  Light weight and efficient link layer security package  A research platform that is easily extensible and has been incorporated into higher level protocols.  Developers can easily integrate into sensor network applications.

20 Motivation for Link layer security in Sensor Networks  End-End security Mechanisms : ►Suitable only for conventional networks using end-end communications where intermediate routers only need to view the message headers.  Why end-end security mechanisms not suitable for sensor networks? ►If message integrity checked only at the destination, the networks may route packets injected by an adversary many hops before they are detected. This will waste precious energy.  BUT, in Sensor networks ►In-network processing is done to avoid redundant messages-Requires intermediate nodes to have access to whole message packets and just not the headers as in conventional networks.  A link layer security mechanism can detect unauthorized packets when they are first injected onto the network.

21 Design Goals-Security Goals  A link layer security protocol should satisfy three basic security properties:  Access control and Message integrity - prevent unauthorized parties from participating  Confidentiality - keeping information secret form unauthorized parties  Explicit omission: Replay protection - an adversary eavesdropping a legitimate message sent b/w 2 authorized parties..replays it at a some time later

22 Design goals –Performance goals  A system using cryptography will incur increased overhead in length of the message.  Overhead limitations-REQUIRED  Increased message length results ►decreased message throughput ►increased latency ►Increased power consumption ( Sensor Networks) ►Carefully tune the strength of security mechanisms for reasonable security while limiting overheads

23 Design Goals-Ease of Use  Security Platform- ►Higher level security protocols can use Tinysec to create secure pair wise communication between neighboring nodes.  Transparency ►Application programmers are unsure of security parameters and can disable if standardized APIs are not provided ►Should be transparent to the user  Portability ►should fit into the radio stack so that porting the radio stack from one platform to another (ATmel, Intel, X86 etc) is a simple job.

24 Summary  Transport Protocols for WSN  TCP/UDP for WSN  Protocols ►PSFQ ►ESRT ►CODA  Security Threats in WSN  TinySec  Motivations of Link Layer security  TinySec Design goals  Semantic Secure Encryption in TinySec