Secure Location Verification and Stabilization

Slides:



Advertisements
Similar presentations
Distributed Algorithm for a Mobile Wireless Sensor Network for Optimal Coverage of Non-stationary Signals Andrea Kulakov University Sts Cyril and Methodius.
Advertisements

RRC 04/05 ITU Information meeting September Computer methods for planning Ken Hunt Rapporteur for Chapter 10.
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
The Capacity of Wireless Networks
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Clustering k-mean clustering Genome 559: Introduction to Statistical and Computational Genomics Elhanan Borenstein.
Surface Reconstruction From Unorganized Point Sets
 Distance Problems: › Post Office Problem › Nearest Neighbors and Closest Pair › Largest Empty and Smallest Enclosing Circle  Sub graphs of Delaunay.
4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Voronoi Diagram Presenter: GI1 11號 蔡逸凡
Discrete geometry Lecture 2 1 © Alexander & Michael Bronstein
Wireless Broadcasting with Optimized Transmission Efficiency Jehn-Ruey Jiang and Yung-Liang Lai National Central University, Taiwan.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Bayesian Filtering for Location Estimation D. Fox, J. Hightower, L. Liao, D. Schulz, and G. Borriello Presented by: Honggang Zhang.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
GS 3 GS 3 : Scalable Self-configuration and Self-healing in Wireless Networks Hongwei Zhang & Anish Arora.
Secure Location Verification Using Radio Broadcast Adnan Vora, Mikhail Nesterenko 4/27/04.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
Selected topics in distributed computing Shmuel Zaks
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Approximation algorithms for TSP with neighborhoods in the plane R 郭秉鈞 R 林傳健.
MIDPOINT CIRCLE & ELLIPSE GENERARTING ALGORITHMS
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
Void Traversal for Guaranteed Delivery in Geometric Routing
Computer Network Lab. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks SenSys ’ 03 Xiaorui Wang, Guoliang Xing, Yuanfang.
Computer Science 1 Using Clustering Information for Sensor Network Localization Haowen Chan, Mark Luk, and Adrian Perrig Carnegie Mellon University
Anish Arora Ohio State University Mikhail Nesterenko Kent State University Local Tolerance to Unbounded Byzantine Faults.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Computer Graphics CC416 Lecture 04: Bresenham Line Algorithm & Mid-point circle algorithm Dr. Manal Helal – Fall 2014.
Computer Graphics Lecture 06 Circle Drawing Techniques Taqdees A. Siddiqi
Randomized Incremental Algorithm for Delaunay Triangulation (DT) CS Gates 219 October 19, 3:00 – 4:20 Richard Zhang (for Leo G.) Disclaimer: All.
Prof. Yu-Chee Tseng Department of Computer Science
Algorithms for Big Data: Streaming and Sublinear Time Algorithms
Verifying Stability of Network Protocols
Image Morphing © Zooface Many slides from Alexei Efros, Berkeley.
Packet Leashes: Defense Against Wormhole Attacks
Vineet Mittal Should more be added here Committee Members:
MPC and Verifiable Computation on Committed Data
Jordan Adamek Mikhail Nesterenko Sébastien Tixeuil
Fundamentals of Cellular Networks (Part I)
Chapter Three Part I Output Primitives CS 380.
Unsupervised Learning
Haim Kaplan and Uri Zwick
Craig Schroeder October 26, 2004
Enumerating Distances Using Spanners of Bounded Degree
Nearest-Neighbor Classifiers
Fault-tolerant Consensus in Directed Networks Lewis Tseng Boston College Oct. 13, 2017 (joint work with Nitin H. Vaidya)
Su Yi (RPI) Yong Pei (Univ. of Miami) Shivkumar Kalyanaraman (RPI)
Introduction Wireless Ad-Hoc Network
Secure Verification of Location Claims
Wireless Mesh Networks
Bill Kramer Discussion of “Tracking a Moving Object with a Binary Sensor Network” Javed Aslam, Zack Butler, Florin Constantin, Valentino.
The Coverage Problem in a Wireless Sensor Network
Distributed Error- Confinement
Speaker : Lee Heon-Jong
Cellular Systems.
M. Mock and E. Nett and S. Schemmer
Presentation transcript:

Secure Location Verification and Stabilization Adnan Vora and Mikhail Nesterenko Kent State University r β k acceptance zone

Location Verification problem description have: protected asset ensure: access to asset only if the principal is in correct location applications: wireless network access keyless car starting secure gate opening perimeter protection and friendly force identification, etc. appeal immediate practical benefits non-traditional approach to security effective algorithmic solutions

Outline problem statement basic solution description and properties immediate applications: securing arbitrary zones extensions improving efficiency operating with non-circular signal propagation protecting against directional antennas using random sensor placement stabilization and fault-tolerance

Problem Statement stated informally in[SSW’03] actors (potentially malicious) prover(s) arbitrary protection zone a set of RF-capable verifiers problem specify: placement rules for verifiers prover  verifiers communication protocol so that the verifiers accept the correct prover only if it is inside the protection zone and reject otherwise protocol is secure if a prover anywhere outside protection zone is rejected protection zone verifiers prover assumptions prover authentication not required verifiers are trusted intra-verifier communication is reliable and secure signal propagation is perfectly omni-directional (unit-disk)

Previous Approaches use limited signal propagation speed (e.g. ultrasound) a verifier radios prover prover buzzes back verifier computes roundtrip time and calculates distance limitations uncertainties of two mediums: sound and ether (echos, varying propagation speeds) extra hardware needed: sounders and microphones requires sequential verification (and time synchronization between verifiers) RF prover .01secs=4ft sound verifiers

Outline problem statement basic solution description and properties immediate applications: securing arbitrary zones extensions improving efficiency operating with non-circular signal propagation protecting against directional antennas using random sensor placement stabilization and fault-tolerance

Basic Solution idea use broadcast nature of RF signal propagation specifics separate roles of verifiers acceptor – receives signal from prover inside protection zone rejector – receives signal from outside prover solution communication protocol: prover broadcasts signal to distance x, if no decision – increases distance by x prover is accepted if only acceptors hear from prover, rejected otherwise, informed of decision placement rules: to come x x accepted prover x acceptors rejector rejected prover

Rejection Zone rejection zone – prover (correct or malicious) is never accepted Lemma 1 [VN04] a point on a plane is in rejection zone if it is closer to the nearest rejector than the nearest acceptor Theorem 1 sensor placement is secure iff the rejectors’ Voronoi cells cover the area outside the protection zone rejection zone rejector rejector acceptor Voronoi diagram rejector rejector

Acceptance and Ambiguity Zones rejector rejector acceptance zone – correct prover is always accepted ambiguity zone – prover may (not) be accepted acceptor acceptance zone ambiguity zone rejector rejector x correct prover rejected why ambiguity zone exists malicous prover accepted Lemma 2: a point is in acceptance zone if it is x closer to the nearest acceptor than to the nearest rejector

Securing Polygons protection gap – largest distance from point in rejection zone to nearest point outside protection zone – measures how far rejection zone encroaches upon protection zone protection is complete if protection gap is zero Lemma 3 n-sided convex polygon is completely protected with n+1 verifiers Lemma 4 in this case, if the protection zone contains a circle of radius r, the acceptance zone contains an open disk of radius r-x/2 Theorem 2 An arbitrary n-sided polygonal protection zone can be completely secured with O(n) verifiers rejection zone ambiguity zone acceptance zone x/2 protection zone boundary

Securing Arbitrary Protection Zones ambiguity gap – largest distance from a point in ambiguity zone to nearest point outside protection zone Theorem 3 the number of verifiers required to secure an arbitrary-shaped protection zone of area S and perimeter P with constant ambiguity gap is in O(P+S) Proof outline: divide protection zone in squares with constant side t (number of such squares is in O(P+S)) , protect each square individually with 5 verifiers t acceptance zone x

Outline problem statement basic solution description and properties immediate applications: securing arbitrary zones extensions improving efficiency operating with non-circular signal propagation protecting against directional antennas using random sensor placement stabilization and fault-tolerance

Protecting against Directional Antennas assumption: fixed beamwidth β Theorem 5 an arbitrary shaped protection zone can be secured against malicious provers using O(r) verifiers where r is radius of inscribed circle proof outline: idea – place rejectors such that if acceptor is reached so is rejector inscribe circle with radius r place rejectors on circumference of co-centric circle of radius r-k, where k – constant, space rejectors 2k tan(β/2) apart place acceptor in the middle,  condition satisfied rejectors protection zone acceptance zone acceptor k r β 2k tan(β/2) malicious prover

Logarithmic Verification Time basic algorithm: number of verification attempts is d/x where d – protection zone diameter with more acceptors can be made logarithmic add acceptor placement rule: for every point in the acceptance zone, there exists integer i≥0, such that there are no rejectors closer to this point than x2i+1 and at least one acceptor between x2i and x2i+1 modify protocol: prover doubles its signal strength every verification attempt Theorem 5 modified protocol is correct and the maximum number of broadcasts is in O(logd)

Shrinking Ambiguity Zone basic algorithm: ambiguity zone size is proportional to x can be made arbitrarily small with additional verification attempts recall: ambiguity zone is due to discrete signal increments idea: tune signal strength if rejected modified protocol: if prover is rejected and the last signal increment is z, the prover decreases the signal strength by z/2 and rebroadcasts; if no decision, the prover increases the signal stregth by z/2 and rebroadcasts; process continues until prover accepted Theorem 6 the modified protocol is correct and the number of extra broadcast attempts is proportional log(b-a) prover a x/4 … b rejected no decision accepted

Complex Signal Propagation basic signal propagation model: unit-disk complex (more realistic) model: a ring of possible signal reception zone delineation for complex model: Lemma 6: a point is in rejection zone if it is at least y closer to nearest rejector than acceptor Lemma 7: a point is in acceptance zone if it is at least x+y closer to nearest acceptor than rejector results similar to basic model apply signal reception prover r definite never basic model prover r y definite possible never complex model

Random Verifier Placement modified problem verifiers are not aware of their location they are informed if they are inside or outside protection zone classification an outside verifier is rejector a verifier whose Voronoi neighbor is outside is rejector rest are acceptors Theorem 7 verification protocol with random placement of verifiers solves location verification problem border of protection zone rejectors boundary acceptance+ ambiguity zones

Implementation of Random Placement rejectors boundary acceptors outside verifiers inside verifers in practice radio neighborhood can be used to approximate Voronoi neighborhood need to ensure appropriate verifier density on the border of protection zone placement procedure verifiers have read-only bit signifying inside/outside placement classification procedure if verifier or its neighbors have outside bit set – verifier is rejector, acceptor otherwise

Outline problem statement basic solution description and properties immediate applications: securing arbitrary zones extensions improving efficiency operating with non-circular signal propagation protecting against directional antennas using random sensor placement stabilization and fault-tolerance

Stabilization of Random Placement observe: classification decision is local – depends only on neighborhood topology  very robust state correction – each verifier periodically checks the inside/outside bits of the neighbors and reevaluates its classification  global state stabilizes fault-contains adaptively in constant time/space/energy corrupt state

Other Extensions and Further Info distributed decision making – an acceptor only needs to contact neighboring rejectors fault-tolerant rejector sets – redundant rejector sets independently covering rejection zone provide extra security and fault-tolerance guarantees limited power provers – can be serviced with appropriately dense acceptor location details: A. Vora, M. Nesterenko "Secure Location Verification Using Radio Broadcast”, Techreport TR-KSU-CS-2004-01, http://www.cs.kent.edu/~mikhail/Research/tr-ksu-cs-2004-01.pdf