Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
Wireless Sensor Networks: Perimeter Security By Jeremy Prince, Brad Klein, Brian Wang, & Kaustubh Jain.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
CS 599 Intelligent Embedded Systems1 Adaptive Protocols for Information Dissemination in Wireless Sensor Networks W.R.Heinzelman, J.kulik, H.Balakrishnan.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Wireless Sensor Network Security Anuj Nagar CS 590.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
Reliability of Wireless Sensors with Code Attestation for Intrusion Detection Presented by: Yating Wang.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
TRUST, Spring Conference, April 2-3, 2008 Taking Advantage of Data Correlation to Control the Topology of Wireless Sensor Networks Sergio Bermudez and.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Effect of Redundancy on Mean Time to Failure of Wireless Sensor Networks Anh Phan Speer, Ing-Ray Chen Paper Presented by: Misha, Neha & Vidhya CS 5214.
Wireless Ad-Hoc Networks
SoftCOM 2005: 13 th International Conference on Software, Telecommunications and Computer Networks September 15-17, 2005, Marina Frapa - Split, Croatia.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
A Distributed Coordination Framework for Wireless Sensor and Actor Networks Tommaso Melodia, Dario Pompili, Vehbi C.Gungor, Ian F.Akyildiz (MobiHoc 2005)
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
Ching-Ju Lin Institute of Networking and Multimedia NTU
A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye, and B. Sikdar Department of Electrical, Computer and systems Engineering.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Bing Wang, Wei Wei, Hieu Dinh, Wei Zeng, Krishna R. Pattipati (Fellow IEEE) IEEE Transactions on Mobile Computing, March 2012.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
Reliability of Wireless sensors with code attestation for intrusion detection Ing-Ray Chen, Yating Wang, Ding-Chau Wang Information Processing Letters.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin 1 Pasd Putthapipat 1 Deng Pan 1 Niki Pissinou 1.
Energy Efficiency Energy consumption is the most important factor to determine the life of sensor network. since sensors networks has low power resources,
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
Ahoy: A Proximity-Based Discovery Protocol Robbert Haarman.
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection Authors: Robert Mitchell, Ing-Ray Chen Presented by: Ting Hua.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
IEEE COMMUNICATIONS LETTERS, VOL. 9, NO. 9, SEPTEMBER 2005 Zhen Guo,
In the name of God.
Introduction Wireless devices offering IP connectivity
Group Multicast Capacity in Large Scale Wireless Networks
Presented by: Rohit Rangera
Distributed Energy Efficient Clustering (DEEC) Routing Protocol
Bluetooth Based Smart Sensor Network
SEP routing protocol in WSN
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Protocols.
Security in SDR & cognitive radio
An Overview of Security Issues in Sensor Network
Distributed Minimum-Cost Clustering for Underwater Sensor Networks
Hongchao Zhou, Fei Liu, Xiaohong Guan
Protocols.
Presentation transcript:

Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu Reliability Analysis of Wireless Sensor Networks with Distributed Code Attestation CS 5214 Paper Presentation Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu

Outline Introduction System and performance models Related works Contribution Notations and basic ideas System and performance models System model and assumptions Performance model Numerical results and analysis Environment setup Results Conclusion Questions CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Introduction As we know the capacity of the battery is becoming the bottleneck for the development to the mobile devices. For instance, the standby time for the cell-phones, laptops, etc. The wireless sensor networks which are broadly deployed in many safety-critical applications, such as health, construction and military are also facing the same problem of the energy shortage. And in such cases, the problem might cause some vital consequences. While less attestation would lower the security for the whole system, thus, the tradeoff between the energy and the security attracts most of the researchers’ attention. CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Introduction This paper analyzes the reliability of a homogeneous wireless sensor network executing a distributed code attestation protocol with neighbor sensor nodes serving as code verifiers. By considering the tradeoff between energy exhaustion vs. security vulnerability for causing sensor node failures, we can identify how often distributed code attestation should be performed as well as how many neighbor sensors should serve as code verifiers per attestation event to maximize the system lifetime without compromising performance. CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Related works Existing work on code attestation mostly focused on the protocol design for performing code attestation, and verification of the protocol design. “SCUBA: secure code update by attestation in sensor networks” (by A. Seshadri, et al. Proc. 2006 ACM Workshop on Wireless Security.) assumed the existence of a trusted third party capable of verifying if a SN is compromised through a challenge-response mechanism. To avoid a single point of failure “Distributed software-based attestation for node compromise detection in sensor networks” (by Y. Yang, et al. Proc. 2007 IEEE Symposium on Reliable Distributed Systems) extended centralized code attestation to distributed code attestation by using designated servers or just neighbor SNs to a target SN. CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Contribution This paper concerns the effect of distributed code attestation on the reliability and performance of WSNs, taking into account both security failure and energy exhaustion failure. Compared with existing work, the contribution of this work is that we address reliability and performance issues of distributed code attestation by identifying operational settings to execute distributed code attestation such that the WSN lifetime is maximized without compromising performance. CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Notations (for system model & assumptions) n/π 𝑟 𝑆𝑁 2 : intensity to a spatial Poisson process. 𝑟 𝑆𝑁 : the SN radio range. T: time interval. 𝑛 𝑣 : the number of verifiers. (# threshold verifiers) 𝑃 𝑓𝑝 : false positive probability (misdiagnose a good SN as a bad SN). 𝑃 𝑓𝑛 : false negative probability (misidentify a bad SN as a good node). q: the probability that one SN will be attested. 𝐹 𝑐 (𝑡): distribution function. 𝑃 𝑟 : recovery prob. 𝐸 𝑠 : sensor reading and reporting energy 𝐸 𝑅 : packet routing energy 𝐸 𝑐 : running code attestation energy 𝐸 𝑣 : sending message energy 𝐸 𝑟 : recovery energy CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Notations (for performance model) 𝑃 𝑓𝑝 𝐷𝐶𝐴 : false positive probability for DCA 𝑃 𝑓𝑛 𝐷𝐶𝐴 : false negative probability for DCA 𝑛 𝑚 : the majority of the verifiers. 𝑛 𝑔 (𝑡): the number of good SNs out of n at time t. 𝑛 𝑏 (𝑡): the number of bad SNs out of n at time t. 𝑛 ∗ 𝑔 (𝑡): # good SNs out of n at time t. (after attestation) 𝑛 ∗ 𝑏 (𝑡): # bad SNs out of n at time t. (after attestation) CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Basic ideas The code of a compromised SN would be different from that of a normal SN. Hence by inspecting if the code is still the same as what originally was put in, the system can detect whether the SN has been compromised. Challenge-response mechanism is used to send the attestation and the requests. CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

System model and assumptions Consider a homogeneous WSN in which SNs are deployed randomly and distributed according to a homogeneous spatial Poisson process (n/π 𝑟 𝑆𝑁 2 , 𝑟 𝑆𝑁 , T). Select neighbors 𝑛 𝑣 . While, some of the SNs will be compromised and attack the systme ( 𝑃 𝑓𝑝 , 𝑃 𝑓𝑛 ). CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

System model and assumptions Two types of attacks: Bad-mouthing attacks: it always votes “no” to a good node to increase the false positive probability of this good node being misidentified as a bad node Good-mouthing attacks: it always votes “yes” to another bad node to increase the false negative probability of this bad node being undetected by the system Since all nodes have an equal chance of being captured as they are being deployed randomly in the WSN operational area, the node compromise time may be considered as i.i.d. with a distribution function 𝐹 𝑐 (𝑡). CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

System model and assumptions Distribution function 𝐹 𝑐 (𝑡) input which provides knowledge about the environment hostility Recovery prob. 𝑃 𝑟 . depending on its accessibility to a sink node with code reload capability CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Performance model The 𝑃 𝑓𝑝 𝐷𝐶𝐴 and the 𝑃 𝑓𝑛 𝐷𝐶𝐴 : (1) (2) The first term in Equation 2 accounts for the case in which more than 1/2 of the verifiers selected from the neighbors are bad SNs who will perform good-mouthing attacks by always voting “yes” to this bad node to increase the chance of this bad node being undetected. CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Performance model The second term accounts for the case in which more than 1/2 of the verifiers selected from the neighbors are good SNs but unfortunately some of these good nodes mistakenly miss the target SN as a good node with probability 𝑃 𝑓𝑛 , resulting in more than 1/2 of the verifiers (some of those may be bad SNs) voting “yes” for the target node. CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Performance model The probability that a SN is compromised at time t, given that it was a good node at time t − T , is given by: The number of good neighbor SNs, 𝑛 𝑔 (𝑡), is equal to 𝑛 𝑔 (𝑡−𝑇) minus the number of newly compromised nodes over T i.e., On the other hand, the number of bad neighbor SNs at time t is given by: CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Performance model The bad and good neighbor SN populations are adjusted only when code attestation and recovery are performed. That is: There are two possible ways by which a SN is diagnosed as compromised: the SN is compromised and it is correctly identified as a bad SN with probability 1- 𝑃 𝑓𝑛 𝐷𝐶𝐴 the SN is not compromised and it is incorrectly misidentified as a bad SN with probability 𝑃 𝑓𝑝 𝐷𝐶𝐴 CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Performance model The amount of energy consumed by a SN in an interval [t, t+T ], denoted by 𝐸 𝑢 (𝑡), is given by: Consequently, a SN will exhaust its energy after 𝑁 𝑞 sensing and reporting periods, with 𝑁 𝑞 given by: CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Performance model Let 𝑅 𝑞 (𝑡) denote the probability that a SN returns valid sensing readings in the sensing and reporting interval [t, t+T ], which is exactly the same as the probability that the node is a good node at time t when it returns sensor readings. Because of node homogeneity, 𝑅 𝑞 (𝑡) can be computed by: And let 𝑅 𝑠 (𝑡) denote the probability that the WSN is still healthy: CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Performance model The Mean Time to Failure (MTTF) of the WSN, denoted by 𝐿 𝑠 , hence can be calculated by: CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Environment setup E: initial energy, 2.5 joules 𝐸 𝑠 : energy consumption by sensing event, 0.084 mjoules 𝐸 𝑅 : energy consumption by packet routing, 0.096 mjoules 𝐸 𝑐 : energy consumption by code attestation, 0.01 mjoules 𝐸 𝑣 : energy consumption by sending message, 0.024 mjoules 𝐸 𝑟 : energy consumption by recovery, 0.82 mjoules 𝑃 𝑓𝑝 : good nodes misidentify as bad nodes, less than 1-2% range 𝑃 𝑓𝑛 : bad nodes misidentify as good nodes, 1-2% range T: sensor reading time interval, 1 min range. λ: sensor compromised rate, range of once per 10 minutes to once per 30 minutes. q: probability that code attestation will be performed CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Results CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Results CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Results CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Results CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Conclusion Discovered the optimal operational settings for running distributed code attestation, including how often code attestation should be invoked and how many neighbor verifiers should be used per code attestation event, so that the embedded WSN lifetime is maximized without sacrificing performance. CS 5214 Paper Presentation Kaiqun Fu 11/27/2018

Questions CS 5214 Paper Presentation Kaiqun Fu 11/27/2018