Defending against Search-based Physical Attacks in Sensor Networks

Slides:



Advertisements
Similar presentations
Physical Layer Security
Advertisements

Using Cramer-Rao-Lower-Bound to Reduce Complexity of Localization in Wireless Sensor Networks Dominik Lieckfeldt, Dirk Timmermann Department of Computer.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Coverage by Directional Sensors Jing Ai and Alhussein A. Abouzeid Dept. of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Introduction to Wireless Sensor Networks
Tufts Wireless Laboratory Tufts University School Of Engineering Energy-Efficient Structuralized Clustering for Sensor-based Cyber Physical Systems Jierui.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
1 School of Computing Science Simon Fraser University, Canada PCP: A Probabilistic Coverage Protocol for Wireless Sensor Networks Mohamed Hefeeda and Hossein.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Mobility Improves Coverage of Sensor Networks Benyuan Liu*, Peter Brass, Olivier Dousse, Philippe Nain, Don Towsley * Department of Computer Science University.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
SMART: A Scan-based Movement- Assisted Sensor Deployment Method in Wireless Sensor Networks Jie Wu and Shuhui Yang Department of Computer Science and Engineering.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
Talha Naeem Qureshi Joint work with Tauseef Shah and Nadeem Javaid
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering.
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors Weikuan Yu Dept. of Computer and Info. Sci. The Ohio State University.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
Localization and Secure Localization. Learning Objectives Understand why WSNs need localization protocols Understand localization protocols in WSNs Understand.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Variable Bandwidth Allocation Scheme for Energy Efficient Wireless Sensor Network SeongHwan Cho, Kee-Eung Kim Korea Advanced Institute of Science and Technology.
Data Transmission Mechanism for Multiple Gateway System Xuan He, Yuanchen Ma and Mika Mizutani, 6th International Conference on New Trends in Information.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Simulation of DeReClus Yingyue Xu September 6, 2003.
Centralized Transmission Power Scheduling in Wireless Sensor Networks Qin Wang Computer Depart., U. of Science & Technology Beijing Edward Y. Hua Wireless.
SenSys 2003 Differentiated Surveillance for Sensor Networks Ting Yan Tian He John A. Stankovic Department of Computer Science, University of Virginia November.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 1 Sriram Chellappan, Xiaole Bai, Bin Ma ‡ and Dong Xuan Presented by Sriram.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
In the name of God.
Jamming for good: a fresh approach to authentic communication in WSNs
Protocols for Wireless Sensor Networks
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Distributed Energy Efficient Clustering (DEEC) Routing Protocol
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
Wireless Mesh Networks
Dong Xuan Department of Computer Science and Engineering
Wireless Sensor Networks and Internet of Things
DK presents Division of Computer Science, KAIST
An Overview of Security Issues in Sensor Network
A Distributed Clustering Scheme For Underwater Sensor Networks
Dong Xuan*, Sriram Chellappan*, Xun Wang* and Shengquan Wang+
Presentation transcript:

Defending against Search-based Physical Attacks in Sensor Networks                                                                                                 Defending against Search-based Physical Attacks in Sensor Networks                   Wenjun Gu, Xun Wang, Sriram Chellappan, Dong Xuan and Ten H. Lai Presented by Dong Xuan xuan@cse.ohio-state.edu Department of Computer Science and Engineering The Ohio State University                                                                                                                                                                                                                                                                                                                                                                                                                                                

Physical Attacks: What and Why? Physical attacks: destroy sensors physically Physical attacks are inevitable in sensor networks Sensor network applications that operate in hostile environments Volcanic monitoring Battlefield applications Small form factor of sensors Unattended and distributed nature of deployment Different from other types of electronic attacks Can be fatal to sensor networks Simple to launch Defending physical attacks Tampering-resistant packaging helps, but not enough We propose a sacrificial node based defense approach to search-based physical attacks Physical attacks can permanently destroy the sensors, which are different from electronic attacks such as jamming attacks, which tries to interfere the radio channels and interrupt the sensor networks’ operation. Emphasize that physical attacks are simple to lunch.

Outline Physical attacks in sensor networks Modeling search-based physical attacks Defending against search-based physical attacks Performance evaluations Related work Final remarks

Physical Attacks – A General Description Two phases Targeting phase Destruction phase Two broad types of physical attacks Blind physical attacks Search-based physical attacks

Blind Physical Attacks Due to the brute-force destruction methods and blindly selecting attack areas

Search-Based Physical Attacks It is hard for the attacker to get the exact location of the sensors, but it can isolate a relatively small area for each detection sensor.

Modeling Search-based Physical Attacks Sensor network signals Passive signal and active signal Attacker capacities Signal detection Attacker movement Attacker memory Attack Model Attacker objective Attack procedure and scheduling Passive signals include heat, vibration, magnetic signals which are parts of the constant physical characteristics of the sensors. Active signals on the other hand include communication messages, beacons, query messages etc., that are part of normal communications between sensors in the network. Signal strength, active, passive signal detection range, active signal frequency cluster-head: large active signal detection range, cluster-head rotation frequency The cluster-head rotation is used to balance the power consumption and reduce the damage due to the destruction of the cluster-head Isolation/detection accuracy Attacker moving and destruction speed

Signal Detection di: Estimated distance θ: Isolation accuracy Direction/Angle of arrival πri2: Isolation/sweeping area ri =di *θ Attacker’s detection capacity is stronger than that of sensors

Network Parameters and Attacker Capacities f: Active signal frequency Rnoti: message transmission range Ra: The maximum distance the attacker is detected by active sensors Rs: Sensing range Rps: Max. distance for passive signal detection Ras: Max. distance for active signal detection v: Attacker moving speed M: Attacker memory size

Attacker Objective and Attack Procedure AC: Accumulative Coverage EL: Effectively Lifetime, the time period before the coverage falls below a threshold α Objective: Decrease AC AC measures both coverage and lifetime of sensor networks. During the scheduling of attack activities, the attacker needs to choose between normal sensors and the cluster-head if the time cost to destroy them is same Need more time to reach cluster-heads and the corresponding sweeping areas are larger.

Discussions on Search-based Physical Attacks Differentiate sensors detected by active/passive signals Sensors detected by passive signals are given preference Scheduling the movement when there are multiple detected sensors Choose sensors detected by passive signals first Choose the one that is closest to the attacker Optimal scheduling? Due the dynamics of the attack process, it is hard to get the optimal path in advance

Defending against Search-based Physical Attacks Assumptions Sensors can detect the attacker or Destroyed sensors can be detected by other sensors Attacker’s detection capacity is stronger than sensors, but not unlimited A simple defense approach Our sacrificial node based defense approach

A Simple Defense Approach : Attacker : Sensor Rnoti s3 s7 Rnoti Rnoti s1 s4 s2 s6 s5

Our Defense Approach Adopting Sacrificial Nodes (sensors) to improve monitoring of the attacker and to increase the protection areas A sacrificial node is a sensor that keeps active in proximity of the attacker in order to protect other sensors at the risk of itself being detected and destroyed Attack Notifications from victim sensors States Switching of receiver sensors of Attack Notifications to reduce the number of detected sensors

Defense Protocol 1: receive AN, not be sacrificial node 2: receive AN, 3: not receive AN, receive SN 4: T1 expires 5: T2 or T3 expires 6: destroyed by attacker Sending (nonsacrificial node) Sensing (sacrificial node) Destroyed Sleeping 1 5 4 2 6 3

An Illustration of Our Defense Approach : Attacker : Sensor Rnoti s3 s7 Rnoti Rnoti s1 s4 s2 s6 s5

Discussions on Our Defense Protocol Trade short term local coverage for long term global coverage Sacrificial nodes compensate the weakness of sensors in attack detection Our defense is fully distributed Sacrificial node selection Who should be sacrificial nodes? State switching - timers When to switch to sensing/sleeping state to prevent detection? When to switch back to sensing/sending state to provide coverage?

Sacrificial Node Selection Principle The more the potential nodes protected can be, higher is the chance to be sacrificial node Solution Utility function u(i) is computed by each sensor based on local information Sensor i decides to be sacrificial node if u(i) >= Uth Uth = β * Uref (0<β<1); Uref = N * π* R2noti / S

Utility Function u(i) What is the basic idea of u(i)? The more nodes being protected, the larger u(i) is Overlap is discounted Distance matters Theorem 1: The utility function u(i) is optimal in terms of minimizing the expected mean square error between u(i) and uopt(i)

State Switching D(i): Random delay for SN message T(i): timers for states switching

Performance Evaluation Network parameters: S: 500 * 500 m2 N: 2000 α: 0.5 f: 1 / 60 second Rnoti: 20 m Ra: 0.1 m Rs: 10 m Attack parameters: Rps: 5 m Ras: 20 m v: 1 m/second M: 2000 Protocol parameters: β: 0.7 Δt: 0.01 second T: 20 seconds

Defense Effectiveness under Different Network Parameters

Defense Effectiveness under Different Attacker Parameters

Related Work Blind physical attack: Jamming attack: X. Wang et al. Lifetime Optimization of Sensor Networks under Physical Attacks, ICC, 2005 Jamming attack: D. Wood et al. Jam: A Jammed-Area Mapping Service for Sensor Networks, RTSS, 2003 Other electronic attacks: C. Karlof et al. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, WSNA, 2003 WSN security survey: A. Perrig et al. Security in Wireless Sensor Networks, Communications of the ACM, 2004

Final Remarks Physical attacks are patent and potent threats to sensor networks We modeled Search-based Physical attacks We proposed a Sacrificial Node-assisted approach to defend against physical attacks Viability of future sensor networks is contingent on their ability to defend against physical attacks

Thank You !