Trusted Routing in IoT Dr Ivana Tomić In collaboration with:

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Mobile Ad Hoc Networks
NDN in Local Area Networks Junxiao Shi The University of Arizona
Denial of Service in Sensor Networks Szymon Olesiak.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wireless Sensor Network Security Anuj Nagar CS 590.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Optimal Activation of Intrusion Detection Agents for Wireless Sensor Networks Yulia Ponomarchuk and Dae-Wha Seo Kyungpook National University, Republic.
IPCCC’111 Assessing the Comparative Effectiveness of Map Construction Protocols in Wireless Sensor Networks Abdelmajid Khelil, Hanbin Chang, Neeraj Suri.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Components and Network Architecture for Galvanic Coupled Cyber Physical Body Network [1] ICNIRP (International Commission on Non-Ionizing Radiation Protection).
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
KAIS T Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua MobiCom ‘05 Presentation by.
A Critical Analysis on the Security of IoTs
Computer Science and Engineering 1 Mobile Computing and Security.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
1 Data Overhead Impact of Multipath Routing for Multicast in Wireless Mesh Networks Yi Zheng, Uyen Trang Nguyen and Hoang Lan Nguyen Department of Computer.
Lightweight security protocols for the IoT
Intrusion Detection Based on Traffic Analysis in Wireless Sensor Networks Yulia Ponomarchuk and Dae-Wha Seo Department of Electrical Engineering and Computer.
Fixing the replicated Nodes in mobile Sensor Networks GUIDED BY Mr. N.SHIVA KUMAR Presented by K.Sumathy (08c117) C.Bindu Prasad (08c19)
In the name of God.
The Internet of Things for Health Care
Wireless Sensor Networks
CompTIA Security+ Study Guide (SY0-401)
IMPROVING OF WIRELESS MESH NETWORKS.
Name: Patrick Zwane Advisor: Dr. Kai-Wei Ke Date: 14 July 2017
University of Maryland College Park
Architecture and Algorithms for an IEEE 802
VANET.
A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks Name: Patrick Zwane University: National Taipei University of.
17th International Conference on E-health Networking, Applications & Services Healthcom 2015 Boston, USA On Resilience of Wireless Mesh Routing Protocol.
Data Collection and Dissemination
Algorithms for Big Data Delivery over the Internet of Things
Ad-hoc Transport Layer Protocol (ATCP)
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
Adaptable safety and security in v2x systems
CompTIA Security+ Study Guide (SY0-401)
Presenter: Patrick N. zwane Advisor: Dr. Kai-Wei Kevin Ke 21/09/2018
Mobile ad hoc networking: imperatives and challenges
Cognitive Radio Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
MESSAGE PROJECT CONTRIBUTION
Security Of Wireless Sensor Networks
Speaker:Chen-Yu Tseng Advisor : Dr. Ho-Ting, Wu
Data Collection and Dissemination
Detecting Denial-of-Service Attacks against Sensor Networks
Autonomous Network Alerting Systems and Programmable Networks
An Overview of Security Issues in Sensor Network
Deployment Optimization of IoT Devices through Attack Graph Analysis
Presentation transcript:

Trusted Routing in IoT Dr Ivana Tomić In collaboration with: Research Associate Prof. Julie A. McCann and Imperial College London AESE group Email: i.tomic@imperial.ac.uk

Outline Sensors and Sensor Networks – Are these the most Critical Components in IoT? What is the Security & Cyber Risk in IoT? How big is the Loss of Data due to the Break in Routing Paths? How to establish a Trusted Routing in IoT? I. Tomić, J. A. McCann. “Trusted Routing In IoT"

Sensors and networks: A value-creation framework A heavy reliance on wireless communications (typically a best-effort network). A range of communication protocols to satisfy the communication needs of diverse applications. Wireless Sensor Network many low-cost, low-power devices communicating wirelessly with BS Sources of information I. Tomić, J. A. McCann. “Trusted Routing In IoT"

IoT systems differ from traditional IT systems? Environment: physical exposure of IoT devices Resources: sensors are low-cost, low-power, resource constrained devices Variety: more types of devices and different types of networks in IoT Volume: billions of IoT devices compared to millions of IT devices  Consequences: disruption of IoT systems could lead to large economic losses and have a significant impact on the welfare of people BUT it also creates new opportunities for all that information to be compromised! I. Tomić, J. A. McCann. “Trusted Routing In IoT"

The communication protocols have not been designed with a security goal in mind Denial of service, Man in the middle Attacks on reliability, Malicious code attack Multi-Layer Application Layer Transport Layer Network Layer Data Link Layer Physical Layer Data integrity attack, Energy drain attack, Desyncronisation attack Spoofing/replaying information, Selective forwarding/black holes, Sinkhole attack, Sybil attack, Node replication attacks, Wormhole attack, Hello flood attack Architecture WSN Layered Collision Jamming, Node tampering, Eavesdropping Jamming, External vs. Internal Attacks I. Tomić, J. A. McCann. “Trusted Routing In IoT"

The network level attacks can cause data loss and increase the data collection latency Network communication can be attacked, causing the loss of data which can compromise system functionality and cause failure. ? SENSITIVE DATA! TIME-CRITICAL DATA! 1 2 4 3 6 7 8 9 1 2 4 3 6 7 8 9 “I am the root!” 1 2 4 3 6 7 8 9 Blackhole attack Sinkhole attack Replay attack I. Tomić, J. A. McCann. “Trusted Routing In IoT"

Understanding the impact and consequences of an attack helps to prevent possible DoS Implementation: Contiki OS & Cooja (Contiki simulator), 100nodes random topology Observations: Each attack has it’s own signature wrt to the network performance. Two groups: 1. attacks that introduce additional data → reduced PDR and increased E2E delay 2. attacks that reduce no. of packets → reduced PDR and reduced E2E delay. I. Tomić, J. A. McCann. “Trusted Routing In IoT"

A novel self-healing scheme that detects and recovers from common attack scenarios I. Tomić, J. A. McCann. “Trusted Routing In IoT"

Each sensor builds a trust model of its neighbourhood to adapt routing decisions Pairwise trust between a node and its neighbours. Choose your routing paths accordingly. This allows data to flow around regions of the network affected by an attack. I. Tomić, J. A. McCann. “Trusted Routing In IoT"

A simple notification scheme propagates routing decisions from the affected areas to the sink Change due to a potentially malicious activity in the neighbourhood triggers the creation of mobile agents. They spread the information in network so that the damage of an attack is bounded. I. Tomić, J. A. McCann. “Trusted Routing In IoT"

Our solution reduces data loss due to the varied attack scenarios down to 1% (5% on average) Sinkhole attacks: a) 50 nodes, multiple attackers b) 25, 50 and 100 nodes, single attacker Replay attacks: a) 50 nodes, multiple attackers b) 25, 50 and 100 nodes, single attacker Blackhole attacks: a) 50 nodes, multiple attackers b) 25, 50 and 100 nodes, single attacker I. Tomić, J. A. McCann. “Trusted Routing In IoT"

It achieves low overheads of 1% and a detection reliability of 99 It achieves low overheads of 1% and a detection reliability of 99.3% tested across scenarios Overhead in 50 nodes network, multiple attackers a) sinkhole attack b) blackhole attack c) replay attack The sensitivity of our solution can be adjusted per user requirements by setting a sensitivity parameter α. While α = 0.9 gives the lowest number of false positives, we opted for more conservative approach and α = 0.7 which ensures a good sensitivity to all attacks with 99.3% detection reliability. I. Tomić, J. A. McCann. “Trusted Routing In IoT"

To conclude… Our experimental results showed high effectiveness in terms of data loss rate requiring low operational overheads for varied attack scenarios. • CISCO/Silicon Valley Community Foundation “Fog to FIELD” • S4 (EPSRC Programme Grant): Science for Sensor Systems Software [1] I. Tomić and J. A. McCann. “A Survey of potential security issues in existing wireless sensor network protocols”, IEEE Internet of Things Journal, 2017. [2] I. Tomić et al. “Run time self-healing security for wireless sensor networks”. July 2017. Under review. [3] https://labs.ripe.net/Members/ivana_tomic/iot-turning-evil I. Tomić, J. A. McCann. “Trusted Routing In IoT"

Thank you for your attention! I. Tomić, J. A. McCann. “Trusted Routing In IoT"