Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

6/3/2014 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
Dynamic Location Discovery in Ad-Hoc Networks
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
Range-Based and Range-Free Localization Schemes for Sensor Networks
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Robust Range-Independent Localization for Wireless Sensor Networks Radha Poovendran Joint work with Loukas Lazos Network Security Lab University of Washington.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
GPS-less Low-Cost Outdoor Localization for Very Small Devices Nirupama Bulusu, John Heidemann, and Deborah Estrin.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu, David Evans Jason Buckingham CSCI 7143: Secure Sensor Networks November 2, 2004.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 16th Lecture Christian Schindelhauer.
SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks Radha Poovendran Network Security Lab University of Washington Protocol Exchange.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks - Zang Li, Wade Trappe, Yanyong Zhang, Badri Nath Presented By: Vipul.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Range-free Localization Schemes for Large Scale Sensor Networks
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Wireless Sensor Network Security Anuj Nagar CS 590.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Secure Localization: Location Verification and detection of Malicious nodes in WSN Advisor: Dr. Tricia Chigan Presenter: Solomon Ayalew 3/16/20121.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Sensor Positioning in Wireless Ad-hoc Sensor Networks Using Multidimensional Scaling Xiang Ji and Hongyuan Zha Dept. of Computer Science and Engineering,
A Survey of Secure Location Schemes in Wireless Networks /5/21.
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Localization With Mobile Anchor Points in Wireless Sensor Networks
Architectures and Applications for Wireless Sensor Networks ( ) Localization Chaiporn Jaikaeo Department of Computer Engineering.
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors Weikuan Yu Dept. of Computer and Info. Sci. The Ohio State University.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
September 16,2003 MobiCom'03 University of Virginia 1 Range-Free Localization Schemes in Large Scale Sensor Networks Tian He Chengdu Huang Brian.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Localization and Secure Localization. The Problem The determination of the geographical locations of sensor nodes Why do we need Localization? –Manual.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
Localization and Secure Localization. Learning Objectives Understand why WSNs need localization protocols Understand localization protocols in WSNs Understand.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
Network/Computer Security Workshop, May 06 The Robustness of Localization Algorithms to Signal Strength Attacks A Comparative Study Yingying Chen, Konstantinos.
6.4 Global Positioning of Nodes Advanced Operating Systems Ruizhe Ma September 28, 2015.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
WIRELESS SENSOR NETWORK 1 ASIS KUMAR TRIPATHY Department of Information Technology
Scalable and Distributed GPS free positioning for Sensor Networks Rajagopal Iyengear and Biplab Sikdar IEEE International Conference on Communications.
Range-Free Localization Schemes in Large Scale Sensor Networks
Packet Leashes: Defense Against Wormhole Attacks
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors
Presented by Prashant Duhoon
6.4 Global Positioning of Nodes
Attack-Resistant Location Estimation in Sensor Networks
Wireless Sensor Network Localization Overview
Fast Localization for Emergency Monitoring and Rescue in Disaster Scenarios Based on WSN SPEAKER:Jyun-Ying Yu ADVISOR:DR. Kai-Wei Ke DATE:2018/05/04.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Wireless Mesh Networks
Wireless Sensor Networks and Internet of Things
A schematic overview of localization in wireless sensor networks
An Overview of Security Issues in Sensor Network
Presentation transcript:

SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA

Problem: Enabling nodes of a wireless sensor network to determine their location even in the presence of malicious adversaries. Design Goal: Decentralized implementation Resource efficiency Robustness against security threats

Outline Overview SeRloc Algorithm Comparison & Simulation Conclusion

Overview What is Localization System? How to determine position? (Schemes) 1.range-dependent GPS, Active Badge, Active Bat, Cricket 2.range-independent DV-hop, amorphous localization, APIT, Centroid Why security?

Range-dependent Location System Time of arrival (TOA) Angle of arrival Signal strength RF, acoustic, infrared and ultrasound Disadvantages (x1,y1); (x2,y2);(x3,y3)

SeRloc Algorithm Network Model Location Determination Security Scheme Threat Analysis

Network Model N: unknown locations L: known locations and orientations, “locators” spatial homogeneous Poisson point process

SeRloc: Location Determination Secure Range-Independent Localization a. the locator’s coordinates b. the angles of the antenna boundary lines c. R: the locator-sensor-communication range d. Overlapping region e. CoG (Center of Gravity)

Step 1: Locators heard Step 2: Search area

Determination of the search area A rectangular area of size less than A rectangular area of size greater than

Step 3: Overlapping region-Majority vote Step 4: Location estimation

SeRloc: Security Scheme Encryption: Global symmetric key Sensor s & locator shares pairwise key Locator ID authentication Collision-resistant hash function (e.g. MD5) Beacon of locator Li

SeRloc: Threat Analysis Types: Wormhole / Sybil / Compromised nodes Wormhole attack Packet leshes: geographical / temporal Time measuring in challenge-reply scheme

Wormholes 1. Sector uniqueness property : area of locators heard by origin point : area of locators heard by s

Wormholes 2. Communication range violation property A sensor cannot hear two locators that are more than 2R apart

the first message: q = k − 1 the last message: q = 0 All locators wait for a q ∗ Ts time

SeRloc: Threat Analysis Sybil Attack and Compromised nodes Multiple network entities Assume sensor identities Assume locators (Not directly heard)

Outline Overview SeRloc Algorithm Comparison & Simulation Conclusion

Comparison Dv-hop and Amorphous localization

Comparison APIT localization 5

Simulation Localization Error vs. Locators heard Localization Error vs. Antenna Sectors Localization Error vs. Sector Error Localization Error vs. GPS Error Communication Cost vs. Locators Heard

Conclusion Secure localization in WSN Range independent Decentralized Security mechanisms Threats Higher accuracy and fewer locators