Feng Li, Jie Wu, Avinash Srinivasan

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks 1 Haojin Zhu Zhaoyu Gao Mianxiong Dong Zhenfu.
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Wireless Sensor Networks COE 499 Energy Aware Routing
Authors: Ioannis Komnios Sotirios Diamantopoulos Vassilis Tsaoussidis ComNet Group.
Ahmed Osama. What is Delay Tolerant Network?What is Delay Tolerant Network? DTN- WINC- Nile University2 IntroductionChallengesSummary S S D D No continuous.
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Research into the hybridization of the PRoPHET and ERP network routing algorithms George Mason University INFS 612 (Spring 2013) Project Group 4: Richard.
Dynamic Routing in Mobile Ad Hoc Network 報告者:呂佐鴻 指導教授:李鴻璋.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
Chien-Shiu Lin, Wei-Shyh Chang, Ling-Jyh Chen, Cheng-Fu Chou, and Ting-Kai Huang.
William Stallings Data and Computer Communications
Presented by Edith Ngai MPhil Term 3 Presentation
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
Chapter 9: Testing a Claim
Enabling QoS Multipath Routing Protocol for Wireless Sensor Networks
Delay-Tolerant Networks (DTNs)
Key Distribution in DTNs
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
Introduction to Wireless Sensor Networks
Chapter 9: Testing a Claim
Delay-Tolerant Security Key Administration (DTKA)
Sensor Network Routing
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Kevin Lee & Adam Piechowicz 10/10/2009
ITIS 6010/8010 Wireless Network Security
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Witness-based Detection of Forwarding Misbehavior in Wireless Networks
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Chapter 9 Testing a Claim
Chapter 9: Testing a Claim
Chapter 9: Testing a Claim
Chapter 9: Testing a Claim
Chapter 9: Testing a Claim
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Changing the paradigm in forwarding : How transform daemons to angels?
Chapter 9: Testing a Claim
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Potential L2 security options for UL BCS
Presentation transcript:

Feng Li, Jie Wu, Avinash Srinivasan Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets Feng Li, Jie Wu, Avinash Srinivasan

Delay-Tolerant Networking DTN stands for: Delay Tolerant Networking Disruption Tolerant Networking Disconnection Tolerant Networking EX: Buses on the road Contact with other encounter buses Contact with road side AP

DTN and Wireless Network E2E Connectivity Continues Frequent Disconnection Propagation Delay Short Long Transmission Reliability High Low Link Data Rate Symmetric Asymmetric An end-to-end link may never exist in DTN

Opportunistic Networks DTN Routing Considering contact types Knowledge Based No knowledge Flooding, Controlled Flooding, coding based Partial Knowledge Prediction using past history Contact patterns Delay Tolerant Networks (DTN) Opportunistic Networks Scheduled Networks Predictable Networks

Who can help sending the message? Suppose “A” want to send a message to “C” Tell “C” his professor is very ANGRY!!! I’ve met C 2 times a day B 5 times a day A D Your professor is very ANGRY!!! C 4 times a week E

Metric-based DTN routing protocol Using Past contact history to predict future contacts. C 5 D 10 E 3 B B 5 E 7 C 7 E 2 A D C B 3 D 2 E

MaxProp [J. Burgess, UMass, INFOCOM 2006] No knowledge, flooding based MaxProp uses several mechanisms to route packets in a DTN: At each TransOpp, packets are scheduled in an order based on: Likelihood of delivery to destination Packets with low hop-counts are prioritized. When storage is low, packets are deleted in reverse order. MaxProp reports delivery of packets globally, to clear buffers. Hoplists reduce repeated propagation

However...... If a node provides forged numbers of contacts. It is just like a “BLACKHOLE” I’ve meet every one 99 times a day B A D C E

Main Contribution of this paper Examining Blackhole attacks Basic: forged metrics Adv : Tailgating source or destination nodes Introduce the notion of encounter ticket Verifiable contact evidence Proposing and encounter prediction system Utilizing the time information record in encounter ticket to avoid the advanced Blackhole attacks. Real trace driven simulation prove the proposed method. (UMass DiselNet)

Assumptions Each node has a fixed buffer for carrying messages Transmission opportunities are limited both duration and bandwidth Each node holds a unique ID and a public/private key pair Each Packet has a delay requirement D Nodes communicate using radio transmission Becoming neighbors when they are within the range Generate an encounter ticket

Encounter Ticket Generation Each node has A private key (RK) A public key (PK) Issued by the PKI (public key infrastructure) Signed by the CA’s(certificate authority) private key How to use these key for authentication Exchange certificate if first meet Using nodes public key Authenticate it to the CA The encounter record is encrypted by the destination nodes private key Can’t be forged

The Process of Encounter Exchange

Encounter Ticket Generation Hash function of concatenation (A,B,t) Node A contact node B at time t encryption using node A’s private key. Packet ID

Are We Safe Now? Could we prevent from Blackhole attack by using encounter tickets? Encounter records can’t be forged. Advanced Blackhole attack Tailgating source or destination node B C A

Robust History Interpretation Nodes need to interpret an attacker’s tailgating pattern. Make an observation based on accumulated encounter history Procedure Generate evolving graph based on contact history Make an observation based on the graph Encounter prediction and decision making

Generate evolving graph based on contact history

Make an observation based on the graph We want to know: Whether a path over time exists on which the packet can traverse within delay requirement “D“ A journey: existing a path start at “ts” end at “td” “td” < “D”

Four Possible Situation in Observation Success +1 failure +1 overlap success +1 overlap failure +1 success +1

Encounter prediction and decision making Success(existing a path) : α Failure: β Can’t decide which node is better without further evaluating Destination C α 5 β B A Destination C α 2 β 1 D

Deciding which node’s competence Follow Dempster-Shafer theory Mathematical theory of evidence based on belief functions plausible reasoning combine separate pieces of information (evidence) to calculate the probability of an event.

Deciding which node’s competence - Follow Dempster-Shafer theory Node A has a packet, has a proposition on node B’s competence. X: All states under A’s consideration P(X): All possible subset of X According to Dempster-Shafer theory the next step is to find proper mass assignment of X in “P(X)”

Deciding which node’s competence - Follow Dempster-Shafer theory Using Bayesian inference to connect observation results with the mass assignment for “P(X)” statistical model in which evidence or observations are used to update or to newly infer the probability that a hypothesis is true. Use Beta Distribution is used here in Bayesian inference

Deciding which node’s competence - Follow Dempster-Shafer theory Initial: Beta(1,1) When an observation is made Success Beta(α+1, β) Failure Beta(α, β +1)

Deciding which node’s competence - Follow Dempster-Shafer theory The distribution of Beta(α, β) represent the delivery likelihood The mass of “P(X)” should based on Beta(α, β)

Deciding which node’s competence - Follow Dempster-Shafer theory Assign a proper mass of Node B We know the number success and failure journeys But we don’t know the uncertainty Uncertainty u: (defined in their previous work) u=1 when α = β = 1 Certainty = 1-u

Deciding which node’s competence - Follow Dempster-Shafer theory The set {B is competent}

Deciding which node’s competence - Follow Dempster-Shafer theory Decision Rule: A node should select and forward the packets to the most competent forwarders with sufficient contact evidences. Substituting the delivery likelihood matric by

An example t1 ~ t4, success t4 ~ t7, failure t7 ~ t9, failure A generates a packet for G with D = 3 at time t9 and c = 1 B is an attacker Observation t1 ~ t4, success t4 ~ t7, failure t7 ~ t9, failure B: α =2, β =3 ,u=0.48, b = 0.208 C: α =3, β =2 ,u=0.48, b = 0.312

Simulation and Analysis Setup trace-driven simulation Real trace from UmassDieselNet 33 Nodes Assign at most 5 attackers can exist

Delivery rate with\without tickets

Packet attract with\without tickets

Delivery Rate in Different Attacks

Conclusion Strength Weakness Proposing an encounter ticket scheme to secure the evidence of contacts. Using Dempster-Shafer theory to decied a proper node’s competence Weakness Some errors on the paper (weird) Message overhead to the certificate authority Encoding and decoding complexity When there are lots of nodes