Wenjia Li Anupam Joshi Tim Finin May 18th, 2010

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
SEEKER: An Adaptive and Scalable Location Service for Mobile Ad Hoc Networks Jehn-Ruey Jiang and Wei-Jiun Ling Presented by Jehn-Ruey Jiang National Central.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks Maxim Raya, Panos Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux INFOCOM 2008.
Secure and Trustworthy Data Management for Vehicular Cyber Physical Systems Dr. Wenjia Li Assistant Professor in Computer Science New York Institute of.
Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks - IEEE October 2007 CMSC Advanced Computer Networks Oleg Aulov CMSC.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Alert Correlation for Extracting Attack Strategies Authors: B. Zhu and A. A. Ghorbani Source: IJNS review paper Reporter: Chun-Ta Li ( 李俊達 )
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
High-integrity Sensor Networks Mani Srivastava UCLA.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games William Kozma Jr., and Loukas Lazos Dept. of Electrical and Computer Engineering University.
Fault Tolerant Routing in Mobile Ad hoc Networks Yuan Xue and Klara Nahrstedt Computer Science Department University of Illinois.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks Tanya Roosta (EECS, Berkeley) In Collaboration With: Sameer Pai (ECE, Cornell)
Intrusion Detection Based on Traffic Analysis in Wireless Sensor Networks Yulia Ponomarchuk and Dae-Wha Seo Department of Electrical Engineering and Computer.
Fixing the replicated Nodes in mobile Sensor Networks GUIDED BY Mr. N.SHIVA KUMAR Presented by K.Sumathy (08c117) C.Bindu Prasad (08c19)
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
MAC Protocols for Sensor Networks
Presented by Edith Ngai MPhil Term 3 Presentation
TAODV: A Trusted AODV Routing Protocol for MANET
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
Giannis F. Marias, Vassileios Tsetsos,
Environment-Aware Reputation Management for Ad Hoc Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
ITIS 6010/8010 Wireless Network Security
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.
Protocols.
Cross-layer Analysis for detecting Wireless Misbehavior
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
A Vehicular Ad Hoc Network Intrusion Detection System Based on BUSNets
Protocols.
Presentation transcript:

Wenjia Li Anupam Joshi Tim Finin May 18th, 2010 SMART: A SVM-based Misbehavior Detection and Trust Management Framework for MANETs Wenjia Li Anupam Joshi Tim Finin May 18th, 2010

Outline Introduction and Motivation Related Work Outlier Detection Algorithm Performance Evaluation Conclusion and Future Work 18 November 2018

 Ad Hoc Networks are extremely vulnerable to various misbehaviors Introduction Basic features of mobile ad hoc networks Open and unreliable transmission medium Data are easily disclosed to unwanted third parties Node mobility and constantly changing topology Data communication may be frequently disrupted Absence of pre-deployed infrastructure Selfish nodes refuse to forward packets for others  System performance severely downgraded Limited power supply for each node Consequence: SHORT transmission range and LIMITED computation capability  Ad Hoc Networks are extremely vulnerable to various misbehaviors 18 November 2018

Misbehavior Detection An important method to protect MANETs from BOTH external attackers AND internal compromised nodes Current misbehavior detection mainly relies on a predefined threshold to detect misbehaviors Threshold-based intrusion detection: set a threshold for each kind of misbehavior, and alert only when the number of misbehaviors exceeds the threshold Drawbacks of threshold Hard to define beforehand How can we accurately predict an adversary’s attack pattern? Need to adjust frequently Adjust according to the changing topology and node mobility Easy to exploit A smart adversary reduces its misbehaviors JUST below the threshold 18 November 2018

Motivating Scenario I 18 November 2018

Trust Management Evaluation of how trustworthy a node will be based on the observations to its previous behaviors Two types of observations Direct observation (First-hand information) Observations made by a node ITSELF Indirect observation (Second-hand information) Observations obtained from OTHER nodes Majority of current trust management schemes model trust in form of ONE single scalar Observations to all types of misbehaviors are used to derive ONE single trust value for each node Neither expressive nor accurate in complicated scenarios 18 November 2018

Motivating Scenario II 18 November 2018

SMART SVM-based misbehavior detection and trust manage -ment framework Outlier detection technique is used for behavioral data collection Misbehaviors generally deviate from normal behaviors  misbehaving nodes can be viewed as outliers SVM technique is used to identify misbehaving nodes Incorporate previous knowledge on misbehaviors to detect unknown misbehaviors Multi-dimensional trust management Divide trustworthiness into several dimensions (for example 3) Each dimension of trustworthiness is derived by a subset of misbehaviors 18 November 2018

Related Work Misbehavior detection in MANETs Selfish node VS. malicious node Selfishness: Merely want to preserve resource (battery power, bandwidth), so may deny forwarding packets or route requests Maliciousness: Intentionally want to disrupt the network services, so may take any action to meet this goal Packet drop, modification, misroute, fake RTS requests, etc. Intrusion detection system (IDS) for MANETs IDS sensor deployed on each node NOT energy-efficient Cluster-based IDS by Huang et al. Efforts to identify routing misbehaviors “Watchdog” & “Pathrater” by Marti et al. 18 November 2018

Related Work (Cont.) Trust management for MANETs Goal: to evaluate behaviors of other nodes and consequently decide the trustworthiness for each node based on the behavior assessment Various trust management schemes CONFIDANT by Buchegger et al. Four components: a Monitor, a Reputation System, a Trust Manager, and a Path Manager CORE by Michiardi et al. Identifies selfish nodes and forces them to cooperate Only positive observations are exchanged Node evaluation scheme by Ren et al. Second-hand observations only shared by a subset of neighbors (“trustworthy neighbors”) 18 November 2018

Framework Overview Four components Two stages Behavioral data collection Trust management SVM-based misbehavior detection Misbehavior mitigation Two stages Training stage Detection stage 18 November 2018

Behavioral Data Collection Five steps for the training stage Neighbor observation Local view formation Local observation exchange View combination Global view formation and data labeling One step for detection stage 18 November 2018

Local observation and view formation Outgoing Packet B Incoming Packet Incoming Packet A 2: Packet Modified 1 2 1: Packet Dropped Abuse RTS requests Radio Range Notes: PDR – Packet Drop Rate PMR – Packet Modification Rate RTS – RTS Rate 3 PDR PMR RTS 1 0.30 0 0 0 0.26 0 0 0 0.17 3: RTS Flood Observer Observed Nodes 18 November 2018

View Combination Motivation: Node mobility and channel collision can make the neighbor observation results inaccurate Example scenario Outgoing Packet A Incoming Packet A 1 1: Packet Dropped Radio Range Observer Observed Nodes 18 November 2018

View Combination (Cont.) Dempster-Shafer Theory (DST): combine separate pieces of observations (evidences) to calculate the probability of malicious behaviors Basics: lack of evidence can NOT be viewed as the refutal to this evidence Solution: a node can either hold a positive opinion or have no opinion to the misbehavior of its neighbor NO opinion is called “Environment” in this case (Θ) How to combine separate pieces of evidences – Dempster’s Rule of combination 18 November 2018

Multi-dimensional Trust Management All trust values initialized to be 1 (trust value  [0, 1]) Trust values adjusted based on observation results Both first-hand information and second-hand information Three dimensions of trust Collaboration trust Behavioral trust Reference trust 18 November 2018

SVM-based Misbehavior Detection Three steps in detection stage Behavioral data combination Misbehavior detection Behavioral data update and exchange 18 November 2018

Performance Evaluation Simulation setup Parameter Value Simulation area 600m  600m Number of nodes 50, 100, 200 Transmission range 60m, 90m, 120m Simulation Duration 900s Mobility pattern of nodes Random waypoint Number of bad nodes 5, 10, 20 Node motion speed 5m/s, 10m/s, 20m/s 18 November 2018

Performance Metrics Four metrics Precision Recall Communication Overhead (CO) Convergence Time (CT) 18 November 2018

Simulation Scenario I Precision and Recall with Different Number of Nodes (Area: 600m ×600m, Radio Range: 120m, Speed: 5m/s ) 18 November 2018

Simulation Scenario II Precision and Recall with Different Motion Speed (Area: 600m ×600m, Radio Range: 120m, Num of Nodes: 100 ) 18 November 2018

Simulation Scenario III Precision and Recall with Different Radio Ranges (Area: 600m ×600m, Num of Nodes: 100, Node Speed: 5m/s ) 18 November 2018

Simulation Scenario IV CR with Different Percentage of Bad Nodes (Num. of Nodes: 100, Area: 600m ×600m, Range: 120m, Speed: 5m/s ) 18 November 2018

Adversary Model Three adversary models Short-term Ever-changing Comprehensive 18 November 2018

Effect of Different Adversary Models Simulation Scenario V Effect of Different Adversary Models 18 November 2018

Conclusion and Future Work SVM-based misbehavior detection and trust management framework for MANETs Outlier detection for behavioral data collection SVM for misbehavior detection Multi-dimensional trust management Several simulation scenarios have validated the correctness and efficiency of our approach Future work How to properly determine trustworthiness DIRECTLY from the SVM classifier Incorporation of context information to SVM classifier 18 November 2018

The End Questions Comments 18 November 2018