Location Cloaking for Location Safety Protection of Ad Hoc Networks

Slides:



Advertisements
Similar presentations
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Advertisements

Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
C LOAKING AND M ODELING T ECHNIQUES FOR LOCATION P RIVACY PROTECTION Ying Cai Department of Computer Science Iowa State University Ames, IA
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
F EELING - BASED L OCATION P RIVACY P ROTECTION FOR L OCATION - BASED S ERVICES CS587x Lecture Department of Computer Science Iowa State University Ames,
Processing Monitoring Queries on Mobile Objects Lecture for COMS 587 Department of Computer Science Iowa State University.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
A Distributed Clustering Framework for MANETS Mohit Garg, IIT Bombay RK Shyamasundar School of Tech. & Computer Science Tata Institute of Fundamental Research.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes JieJun Kong Dapeng Wu Xiaoyan Hong and Mario Gerla.
Multi-hop-based Monte Carlo Localization for Mobile Sensor Networks
Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Secure In-Network Aggregation for Wireless Sensor Networks
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Presented by Edith Ngai MPhil Term 3 Presentation
Spatial Data Management
Prof. Yu-Chee Tseng Department of Computer Science
VANET.
Mesh-based Geocast Routing Protocols in an Ad Hoc Network
Feeling-based location privacy protection for LBS
Introduction to Wireless Sensor Networks
Virtual Domain and Coordinate Routing in Wireless Sensor Networks
Intrusion Tolerance for NEST
What's the buzz about HORNET?
SocialMix: Supporting Privacy-aware Trusted Social Networking Services
CSE 4340/5349 Mobile Systems Engineering
Presented by Prashant Duhoon
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Location Privacy.
Mobile ad hoc networking: imperatives and challenges
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Effective Replica Allocation
Motion-Aware Routing in Vehicular Ad-hoc Networks
Protocols.
Efficient Flooding Techniques for Mobile Ad Hoc Networks
Communication Driven Remapping of Processing Element (PE) in Fault-tolerant NoC-based MPSoCs Chia-Ling Chen, Yen-Hao Chen and TingTing Hwang Department.
Dong Xuan*, Sriram Chellappan*, Xun Wang* and Shengquan Wang+
Protocols.
Presentation transcript:

Location Cloaking for Location Safety Protection of Ad Hoc Networks Department of Computer Science Iowa State University Ames, Iowa, 50011 http://www.cs.iastate.edu/~yingcai

Outline What is location safety How to achieve location safety Stationary ad hoc networks Mobile ad hoc networks Performance evaluation Closely related work Conclusion

Why disclosing location information Location information adds a new dimension to ad hoc networking Location-based routing Leverage nodes’ location information in path discovery and packet forwarding Much more efficient and scalable than topology-based routing Location-oriented applications e.g., enemy detection in battlefield

Dilemma Disclosing location information presents a major threat to network safety Knowing the position of a node allows an adversary to locate and destroy it physically

Location Safety Protection Goal Allow nodes to reveal their location Yet make it practically infeasible for one to locate them based on such information

Location Safety Protection Goal Allow nodes to reveal their location Yet make it practically infeasible for one to locate them based on such information Observation An adversary can always comb through a whole region to locate all nodes inside it However, if the region is too large, the cost can be prohibitively high

Location Safety Protection Key Idea Instead of its exact position, a node can report it is inside some spatial region, called a cloaking box Reducing location resolution to achieve a desired level of safety protection

Location Safety Protection Key Idea Instead of its exact position, a node can report it is inside some spatial region, called a cloaking box Reducing location resolution to achieve a desired level of safety protection

Location Safety Protection Key Idea Instead of its exact position, a node can report it is inside some spatial region, called a cloaking box Reducing location resolution to achieve a desired level of safety protection Lower node density less attractive for the adversary to locate/destroy the nodes inside higher safety level

Safety Level Safety level of a cloaking box The ratio of the box’s area and the number of nodes inside

Safety Level Safety level of a cloaking box Safety level of a network The ratio of the box’s area and the number of nodes inside Safety level of a network A network is protected at a safety level θ, if the adversary cannot find any region whose safety level is less than θ based on nodes’ disclosed location

How to compute cloaking box For safety protection Each cloaking box must satisfy the safety level requirement

How to compute cloaking box For safety protection Each cloaking box must satisfy the safety level requirement A sequence of cloaking boxes must not be correlated to identify an area with a safety level less than θ Correlation attack

How to compute cloaking box For safety protection Each cloaking box must satisfy the safety level requirement A sequence of cloaking boxes must not be correlated to identify an area with a safety level less than θ For network performance Each cloaking box needs to be as small as possible Correlation attack

A Naïve approach A node broadcasts to query its nearby nodes’ location, and then identify the smallest region that meets the safety requirement Problems 1. Require nodes to report their exact location 2. Difficult to determine the query broadcast region The node actually reveals it is inside the broadcast region What if the safety level of the region is not enough?

Proposed Technique Basic idea Partition network domain recursively into a set of subdomains, each with a safety level at least θ Each node uses its containing subdomain as its cloaking box

Proposed Technique Basic idea Partition network domain recursively into a set of subdomains, each with a safety level at least θ Each node uses its containing subdomain as its cloaking box Challenges 1. Partitioning needs to be done in a fully distributed manner 2. No node shall reveal its exact position

Stationary Ad Hoc Networks Nodes are deployed in a domain D Area(D)/#Nodes is no less than θ Nodes start to do partitioning at time t0 Partitioning is done round by round Each round has a fixed time duration D

Partitioning Algorithm Each node sets its partition P to D Refine P round by round Broadcast a packet PLUS(NID, P) within P Collect the PLUS packets from nodes in P during a time period T Calculate the safety level S(P) If S(P)≥2θ Divide P into two equal halves Set P as the one containing the node’s current position Go to the next round of partitioning If S(P)<2θ Take P as its cloaking box Stop partitioning D

Partitioning Algorithm Each node sets its partition P to D Refine P round by round Broadcast a packet PLUS(NID, P) within P Collect the PLUS packets from nodes in P during a time period T Calculate the safety level S(P) If S(P)≥2θ Divide P into two equal halves Set P as the one containing the node’s current position Go to the next round of partitioning If S(P)<2θ Take P as its cloaking box Stop partitioning D

Partitioning Algorithm Each node sets its partition P to D Refine P round by round Broadcast a packet PLUS(NID, P) within P Collect the PLUS packets from nodes in P during a time period T Calculate the safety level S(P) If S(P)≥2θ Divide P into two equal halves Set P as the one containing the node’s current position Go to the next round of partitioning If S(P)<2θ Take P as its cloaking box Stop partitioning D

Partitioning Algorithm Each node sets its partition P to D Refine P round by round Broadcast a packet PLUS(NID, P) within P Collect the PLUS packets from nodes in P during a time period T Calculate the safety level S(P) If S(P)≥2θ Divide P into two equal halves Set P as the one containing the node’s current position Go to the next round of partitioning If S(P)<2θ Take P as its cloaking box Stop partitioning D

Partitioning Algorithm Each node sets its partition P to D Refine P round by round Broadcast a packet PLUS(NID, P) within P Collect the PLUS packets from nodes in P during a time period T Calculate the safety level S(P) If S(P)≥2θ Divide P into two equal halves Set P as the one containing the node’s current position Go to the next round of partitioning If S(P)<2θ Take P as its cloaking box Stop partitioning D

Is Partitioning Safe? A node reveals its location P when it broadcasts a PLUS packet in P It is guaranteed P’s safety level is no less than θ Recursive partitioning makes the correlation attack impossible Any two partitions P1 and P2 either do not overlap at all, or one contains the other completely Situation like never happens

Some Concerns A node may be compromised Inject multiple PLUS packets to enlarge cloaking boxes This attack can be prevented using authentication techniques Add a certificate field in PLUS packet Allow a node to verify the sender of a packet

Mobile ad hoc networks D Initialization Each node finds its cloaking box right after the deployment Adjust partitioning when necessary Each node monitors its movement against its current partition P If a node moves into a new partition P’ Broadcast a LEAVE packet in P Broadcast a JOIN packet in P’ D

Performance Study Performance metrics Simulate a mobile ad hoc network Cloaking area Communication overhead Simulate a mobile ad hoc network Nodes initiate partitioning right after deployment. (overhead Cinit) Nodes move following a random walk, and adjust partitioning when necessary (overhead Cupdate) Node distribution follows a Normal distribution Variance v is smaller, distribution is more skewed v = 0.5, 0.1, 0.05

Evaluation Results A more skewed distribution results in a larger cloaking area in average a smaller Cinit a larger Cupdate (most cases)

Related 1: Encryption Encrypt location information to make it intelligible only to certain node Problems The destination node may be compromised In some cases, location information cannot be encrypted

Related 2: Anonymous Routing Make routes untraceable to protect important nodes Problems Do not provide location safety protection A node can be destroyed whenever it is located, regardless of its importance

Related 3: Privacy-aware LBS Location disclosed in LBS may be correlated with restricted spaces for subject identification Service anonymity protection Location privacy protection Problems Assume some central server for location depersonalization Location privacy is different from location safety

Conclusion We define the concept of location safety protection We propose to reduce location resolution to achieve a desired level of safety protection We present a novel distributed technique for location cloaking

Thanks!