SLICT: Secure Localized Information Centric Things

Slides:



Advertisements
Similar presentations
Energy-efficient distributed algorithms for wireless ad hoc networks Ramki Gummadi (MIT)
Advertisements

Chris Karlof and David Wagner
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
MicroCast: Cooperative Video Streaming on Smartphones Lorenzo Keller, Anh Le, Blerim Cic, Hulya Seferoglu LIDS, Christina Fragouli, Athina Markopoulou.
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
NDN in Local Area Networks Junxiao Shi The University of Arizona
A Presentation by: Noman Shahreyar
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
Introduction to Wireless Sensor Networks
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Geo – Routing in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
Receiver Based Forwarding for Wireless Sensor Networks Rodrigo Fonseca OASIS Retreat January 2005 Joint work with Ana Sanz Merino, Ion Stoica.
Security Issues In Sensor Networks By Priya Palanivelu.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Georouting in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Intel ® Research mote Ralph Kling Intel Corporation Research Santa Clara, CA.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Enabling Dependable Communication in Cyber-Physical Systems with a Wireless Bus Federico Ferrari PhD Defense October 18, 2013 — Zurich, Switzerland Computer.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Adaptive Control-Based Clock Synchronization in Wireless Sensor Networks Kasım Sinan YILDIRIM *, Ruggero CARLI +, Luca SCHENATO + * Department of Computer.
Geographic Hash Table S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin and F. Yu.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Heavy and lightweight dynamic network services: challenges and experiments for designing intelligent solutions in evolvable next generation networks Laurent.
A Study of Wireless Virtual Network Computing Kiran Erra.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Zone Sharing: A Hot-Spots Decomposition Scheme for Data-Centric Storage in Sensor Networks Mohamed Aly Nicholas Morsillo Panos K. Chrysanthis Kirk Pruhs.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
4/19/20021 TCPSplitter: A Reconfigurable Hardware Based TCP Flow Monitor David V. Schuehler.
Hot Interconnects TCP-Splitter: A Reconfigurable Hardware Based TCP/IP Flow Monitor David V. Schuehler
Ching-Ju Lin Institute of Networking and Multimedia NTU
Communication in heterogeneous ad hoc grid Shan Natarajan.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
指導教授:許子衡 教授 學 生:黃群凱 2016/2/251 Proceedings of the 2008 IEEE International Conference on Vehicular Electronics and Safety Columbus, OH, USA. September 22-24,
Building Wireless Efficient Sensor Networks with Low-Level Naming J. Heihmann, F.Silva, C. Intanagonwiwat, R.Govindan, D. Estrin, D. Ganesan Presentation.
1 Packet Switching Outline Switching and Forwarding Bridges and Extended LANs.
Spatial Aware Geographic Forwarding for Mobile Ad Hoc Networks Jing Tian, Illya Stepanov, Kurt Rothermel {tian, stepanov,
Survey of Ad Hoc Network Routing Protocols Team Adhocracy Presentation 1 – April 5, 2007 Jason Winnebeck Benjamin Willis Travis Thomas.
Survey of Ad Hoc Network Routing Protocols Team Adhocracy Presentation 2 – April 12, 2007 Jason Winnebeck Benjamin Willis Travis Thomas.
Routing protocols for sensor networks.
Lightweight Cryptography for IoT
Dominik Kaspar, Eunsook Kim, Carles Gomez, Carsten Bormann
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
MOBILE AD-HOC NETWORKS
A Study of Wireless Virtual Network Computing
GPSR Greedy Perimeter Stateless Routing
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
Secure Group Key Distribution in Constrained Environments with IKEv2
Introduction to Wireless Sensor Networks
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks
Overview of Unicast Routing Protocols for Multihop Wireless Networks
Energy Efficient Scheduling in IoT Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
ICN, IoT and the Fog Enabling computation at the edge Marcel Enguehard
09/12/2018 Virtual Networks.
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Greedy Distributed Spanning tree routing (gdstr)
Information Centric Things
Protocols.
CMPE 252A : Computer Networks
Protocols.
Presentation transcript:

SLICT: Secure Localized Information Centric Things Marcel Enguehard, Ralph Droms, Dario Rossi 26 September 2016 Workshop on Information Centric Networking for 5G, Kyoto, 2016

Information Centric Things Constrained nodes Broadcast link Ad-hoc multihop network

Old idea, new method (Intanagonwiwat et al., MOBICOM’00) ICN for IoT? Old idea, new method (Intanagonwiwat et al., MOBICOM’00) Simplicity is better for constrained devices (Bacelli et al., ICN’14) Security model

Vanilla ICN forwarding for ICT is hard How do I find this name ? Interest /bA/f3/r301/temp “I want the temperature in the room 301 of building A” Explain name (building A, floor 3, room 301, temperature)

Forwarding for ICN-IoT nodes: challenges  Dynamic topology  Control traffic  Routing state Dynamic topology: interferences, duty cycling, etc. Control traffic: flood and learn Routing state: flood and learn does not scale as the number of names augment

Geographic forwarding for ICT is easier How do I find this position? Interest /coord/temp Interest /bA/f3/r301/temp location “I want the temperature in the room 301 of building A” Topological <-> Geographical location Name <-> geographical location

Geographic forwarding  Local control traffic  State = list of neighbours  Efficient delivery

GPSR – Greedy and perimeter mode Greedy forwarding Perimeter forwarding Karp et al., Mobicom’ 00

Geographic forwarding The SLICT framework Secure Localized Information Centric Things Association protocol Secure beaconing Geographic forwarding ICN stack over RIOT

Geographic forwarding for ICThings Data name: /g/locinf/rest/of/name FIB entry for /g/: Face: virtual face (all neighbours) Strategy: GPSR TLV for additional information

Geographic forwarding for ICThings – cont’d Forwarder module Extract name FIB module Get faces & strategy Strategy module Apply strategy Forward on selected faces Returns virtual face + wrapper to GPSR Computes next node in GPSR

Beaconing for ICThings Association Neighbourhood + location updates Association: See [1] Encryption through AES broadcast keys [1] A. Compagno, M. Conti and R. Droms. OnboardICNg: a secure protocol for on-boarding IoT devices in ICN, To appear at ACM ICN’16 Association Creates persistent /ndb/n2 pit entry Creates persistent /ndb/n2 pit entry Content message Name: /ndb/n2 Payload: coordinates, seq num Updates n2 position in DB Updates n2 position in DB

OpenMote Our IoT hardware ARM Cortex-M3 @ 32MHz AES+ECC hardware support 32KB RAM 512KB ROM Open source design

Cycle counter in M3 Evaluation setup #include <cc2538.h> #include <stdint.h> int main () { uint32_t nb_cycles; //Enables debug CoreDebug->DEMCR |= _VAL2FLD(CoreDebug_DEMCR_TRCENA,1); //Enables cycles counter DWT->CTRL |= _VAL2FLD(DWT_CTRL_CYCCNTENA,1); populate_tables (); //Reinitialises cycle counter DWT->CYCCNT = 0; perform_test (); nb_cycles = DWT->CYCCNT; ... }

Relative memory & CPU consumption Geographic forwarding has a smaller memory and CPU footprint Geographic forwarding has a smaller memory footprint

Forwarding vs cryptography/communication Geo TLV Communication & cryptography costs estimated thanks to: Shafagh et al. Talos: Encrypted Query Processing for the Internet of Things, SenSys’ 15 Precise sources for energy consumption

Geographic forwarding can outperform vanilla ICN in memory and CPU Conclusion Geographic forwarding can outperform vanilla ICN in memory and CPU More energy-consuming Cost of control traffic?