Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.

Slides:



Advertisements
Similar presentations
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Advertisements

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Tzu-Hsuan Shan 2006/11/06 J. Winter, Y. Xu, and W.-C. Lee, “Prediction.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
Authors: Joaquim Azevedo, Filipe Santos, Maurício Rodrigues, and Luís Aguiar Form : IET Wireless Sensor Systems Speaker: Hao-Wei Lu sleeping zigbee networks.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
2004 IEEE International Conference on Mobile Data Management Yingqi Xu, Julian Winter, Wang-Chien Lee.
1 Y-MAC: An Energy-efficient Multi-channel MAC Protocol for Dense Wireless Sensor Networks Youngmin Kim, Hyojeong Shin, and Hojung Cha International Conference.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
A Framework for Energy- Saving Data Gathering Using Two-Phase Clustering in Wireless Sensor Networks Wook Chio, Prateek Shah, and Sajal K. Das Center for.
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
WP4 deliverable Critical Infrastructure Protection: Attack Prevention Solutions and Attacks.
Computer Networks Group Universität Paderborn TANDEM project meeting Protocols, oversimplification, and cooperation or: Putting wireless back into WSNs.
Tarun Bansal, Bo Chen and Prasun Sinha
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
ELECTIONEL ECTI ON ELECTION: Energy-efficient and Low- latEncy sCheduling Technique for wIreless sensOr Networks Shamim Begum, Shao-Cheng Wang, Bhaskar.
Tufts Wireless Laboratory Tufts University School Of Engineering Real-Time Data Services for Cyber Physical Systems Zhong Zou.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Node Reclamation and Replacement for Long-lived Sensor Networks Bin Tong, Wensheng Zhang, and Chuang Wang Department of Computer Science, Iowa State University.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming Hongbo Liu, Yingying Chen Department of ECE Stevens Institute.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
I-Hsin Liu1 Event-to-Sink Directed Clustering in Wireless Sensor Networks Alper Bereketli and Ozgur B. Akan Department of Electrical and Electronics Engineering.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks Bugra Gedik Ling Liu Philip S. Yu IEEE Transactions on Parallel and Distributed.
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection Authors: Robert Mitchell, Ing-Ray Chen Presented by: Ting Hua.
IEEE COMMUNICATIONS LETTERS, VOL. 9, NO. 9, SEPTEMBER 2005 Zhen Guo,
In the name of God.
MAC Protocols for Sensor Networks
Jamming for good: a fresh approach to authentic communication in WSNs
Protocols for Wireless Sensor Networks
Hacker Detection in Wireless sensor network
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Aziz Nasridinov and Young-Ho Park*
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Infer: A Bayesian Inference Approach towards Energy Efficient Data Collection in Dense Sensor Networks. G. Hartl and B.Li In Proc. of ICDCS Natalia.
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Protocols.
An Overview of Security Issues in Sensor Network
A Distributed Clustering Scheme For Underwater Sensor Networks
Protocols.
Presentation transcript:

Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk 712-749, Republic of Korea hrcho@yu.ac.kr Abstract. A wireless sensor network (WSN) is often partitioned into a set of spatial clusters to save energy for data collection. Each cluster includes sensor nodes with similar sensing data, and only a few sensor nodes (samplers) report their sensing data to a base node. Then the base node may predict the missed data of non- samplers using the spatial correlation between sensor nodes. The problem is that the WSN is vulnerable to internal security threat such as node compromise. If the samplers are compromised and report incorrect data intentionally, then the WSN should be contaminated rapidly due to the process of missed data predic-tion at the base node. In this paper, we propose three algorithms to detect compro-mised nodes for secure data collection in the WSN. The proposed algorithms are novel in the sense that they are completely integrated into the underlying data col-lection algorithms. Experiment results indicate that the proposed algorithms can detect compromised nodes with a high accuracy and an energy-efficient manner. Key words: Wireless sensor network, Security, Data collection, Node compro-mise, Performance evaluation 1 Introduction The primary function of a wireless sensor network (WSN) is to collect data for ob- servation and analysis of physical phenomena [4,7]. In periodic data collection, every node reports periodically its sensing data to the base node. Many researches prefer the periodic approach because it enables arbitrary data analysis at the base node [1,3,9]. A spatial clustering is a representative way of saving energy in periodic data collection [1, 5]. It partitions the network into a set of clusters where a cluster includes sensor nodes with similar sensing data. For each cluster, only a few sensor nodes (samplers) report their data to the base node. All the rest of sensor nodes can save their energy by keeping in sleep mode. The base node may predict the missed data using the spatial correlation between sensor nodes. The WSN is vulnerable to security threats both external and internal due to unreli- able wireless channels, unattended operation of sensor nodes, and resource constraint [2]. Node compromise is a major type of internal attacks. Compromised sensor nodes release all the security information to the adversary. Then, the adversary can easily launch internal attacks with data alteration, message negligence, selective forwarding, and jamming. Note that the node compromise is especially problematic for periodic - 99 -

data collection, where only the samplers may report data to the base node. If the sam- plers are compromised and report incorrect data intentionally, then the WSN should be contaminated rapidly due to the process of missing data prediction at the base node. This means that detecting and defending against node compromise are inevitable tasks to guarantee the correctness of data collection at the WSN. In this paper, we propose three algorithms to detect node compromise for secure data collection in a WSN. The proposed algorithms are based on the spatial clustering and tries to detect compromised nodes with an energy-efficient manner. Unlike previous security algorithms for the WSN [2,6, 8], our algorithms consider the underlying data collection architectures. The security task is completely integrated into the underlying data collection algorithm. This enables our algorithms to optimize energy consumption for message transmission and sampling. 2 Algorithms for Node Compromise Detection 2.1 Monitoring by Neighbors (MBN) At MBN, every neighbor node of a sampler has a role to a watchdog that monitors the message sent from the sampler. To detect compromised samplers, MBN requires that a cluster header (CH) has complete location information of every sensor node in its cluster to identify neighbor nodes of the sampler. Furthermore, each sensor node is assumed to have a correlation vector to its neighbor nodes in the cluster. Suppose that a sensor node ss is selected as a sampler. ss notifies itself to the CH, and the CH wakes up the sensor nodes in nbr(ss). For each node si ∈ nbr(ss), it reads its sensing data and overhears the message from ss. If the sensing data sent from ss is not strongly correlated to that of si, si reports to the CH. If majority in nbr(ss) report to the CH, the CH decides that ss is compromised. The underlying assumption of MBN is that majority in nbr(ss) are not compromised. However, if the assumption is not hold, MBN would fail to detect compromised samplers. 2.2 Monitoring by Cluster Head (MBCH) At MBCH, the CH has a role to detect the compromised node. MBCH modifies the data collection procedures such that (1) at least three samplers of a cluster are selected for each data-sampling period, and (2) samplers are required to send their sensing data to the CH. The CH determines some samplers as compromised nodes if their sensing data are not strongly correlated from those of majority samplers. The CH forwards sensing data to the base node only for samplers it decides not to be compromised. Since MBCH is based on majority consensus between samplers, MBCH would be more accurate as the number of samplers increase. If there are only a few samplers, small number of com- promised samplers would lead to a wrong decision at the CH. This shows an interesting tradeoff between energy consumption and security enforcement. - 100 -

3 Concluding Remarks References - 101 - 2.3 Monitoring by Hybrid (MBHB) Both MBN and MBCH cause false negative errors in the sense that they could not detect compromised samplers. MBHB tries to prevent the false negative error by com- bining MBN and MBCH. It consists of two phases to detect the node comprise. At the first phase, the majority vote is performed by neighbor nodes of each sampler, which is similar to MBN. If the sampler gets a majority vote, the CH determines it as a compro- mised node. At the second phase, similar to MBCH, the CH performs another checking of majority consensus among samplers passing the first phase. Some sampler may also be decided as a compromised node in this phase. The CH forwards sensing data to the base node only for samplers passing both phases. 3 Concluding Remarks The WSN is vulnerable to security threats both external and internal due to unreli- able wireless channels, unattended operation of sensor nodes, and resource constraint. In this paper, we proposed three algorithms to detect compromised nodes in WSN. They are monitoring by neighbors (MBN), monitoring by cluster head (MBCH), and a hybrid algorithm of MBN and MBCH (MBHB). Every algorithm is based on spa-tial clustering and tries to detect compromised nodes with energy-efficient manner. The performance study indicates that MBHB can detect compromised nodes with the most energy-efficient manner. Furthermore, it can detect every compromised node even the case when half of entire sensor nodes are compromised. References H. Cho, “Distributed Multidimensional Clustering based on Spatial Correlation in Wireless Sensor Networks,” Computer Systems Science and Engineering 26 (2011). X. Du, “Detection of Compromised Sensor Nodes in Heterogeneous Sensor Networks,” Proc. Int Conf Communications (2008). B. Gedik, L. Liu, and P. Yu, “ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks” IEEE Trans Parallel and Distributed Syst 18 (2007). K. Jang, J. Kang, and H. Kouh, “A Cluster Formation Scheme with Remaining Energy Level of Sensor Nodes in Wireless Sensor Networks,” The Journal of IWIT 9 (2009). T. Le, N. Pham, and H. Choo, “Towards a Distributed Clustering Scheme based on Spatial Correlation in WSNs,” Proc. Int. Wireless Communications and Mobile Computing Conf (2008). F. Liu, X. Cheng, and D. Chen, “Insider Attacker Detection in Wireless Sensor Networks” Proc. IEEE Int Conf Computer Communications (2007). C. Nam, K. Jang, and D. Shin, “Energy-Efficient Data Aggregation and Dissemination based on Events in Wireless Sensor Networks,” The Journal of IWIT 11 (2011). A. Stetsko, L. Folkman, and V. Matya, “Neighbor-based Intrusion Detection for Wireless Sensor Networks,” Proc. Int Conf Wireless and Mobile Communications (2010). S. Yun and H. Cho, “An Energy-Efficient Periodic Data Collection using Dynamic Cluster Management Method in Wireless Sensor Network,” Journal of IEMEK 5 (2010). - 101 -