A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom 2006 19.6.30.

Slides:



Advertisements
Similar presentations
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Routing Security in Ad Hoc Networks
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Trustworthiness Management in the Social Internet of Things
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
High-integrity Sensor Networks Mani Srivastava UCLA.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks Tanya Roosta (EECS, Berkeley) In Collaboration With: Sameer Pai (ECE, Cornell)
Contents of the Talk Preliminary Materials Motivation and Contribution
Presented by Edith Ngai MPhil Term 3 Presentation
TAODV: A Trusted AODV Routing Protocol for MANET
Talal H. Noor, Quan Z. Sheng, Lina Yao,
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Delay-Tolerant Networks (DTNs)
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Trustworthiness Management in the Social Internet of Things
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
Packet Leashes: Defense Against Wormhole Attacks
The Beta Reputation System
Giannis F. Marias, Vassileios Tsetsos,
Wireless Sensor Network Architectures
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Environment-Aware Reputation Management for Ad Hoc Networks
DARPA Proposer’s Day for
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Mobile ad hoc networking: imperatives and challenges
ITIS 6010/8010 Wireless Network Security
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Spectrum Sharing in Cognitive Radio Networks
Cross-layer Analysis for detecting Wireless Misbehavior
Lecture 4a Mobile IP 1.
Cryptography and Network Security
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Morteza Kheirkhah University College London
Presentation transcript:

A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom 2006 19.6.30

Background Trust Distributed computer networks – A well studied concept in sociology and psychology. Distributed computer networks – Ad hoc network, sensor networks and P2P network – Rely on collaboration among network participants. To secure distributed networks – Traditional: data integrity,confidentiality, authentication, etc – New non-cryptography based security approach:trust evaluation. Traditional schemes aim to secure ad hoc routing protocols focus on preventing attackers from entering the network through secure key distribution/authentication and secure neighbor discovery. Those schemes, however, are not effective in situations where malicious nodes have gained access to the network, or some nodes in the network have been compromised. Trust function: Provide an incentive for good behavior. Provide a prediction of one’s future behavior. Detect malicious and selfish entities. 19.6.30

Outline Trust Evaluation Foundation Attacks and Protection – Trust concept, notation, metric, models Attacks and Protection – Bad-mouthing; on-off; conflicting-behavior; etc. Trust management system and its applications in Ad hoc networks. – Secure routing; Malicious node detection 19.6.30

Trust Concept in Computer Networks The most appropriate interpretation of trust in computer networks is belief. – One entity believes that the other entity will act in a certain way, or believes that the network will operate in a certain way. 19.6.30

Trust Notation and Metrics Notation of of Trust relationship: – {Subject:agent,action} – The subject trusts the agent to perform an action. Subject - usually represents one entity; can be a group of entities; Agent - one entity, a group of entities, or even the network; Action - an action performed (or a property possessed) by the agent. Case 1: If the subject believes that the agent will perform the action for sure, subject “trust” the agent to perform the action. no uncertainty; Case 2: If the subject believes that the agent will not perform the action for sure, subject “trust” the agent not to perform the action. no uncertainty; Case 3: If the subject has no idea of whether the agent will perform the action or not, subject does not have trust in the agent. Highest uncertainty. What is the physical meaning of these trust values? Uncertainty ↔ Trustworthiness 19.6.30

Entropy-based Trust Metric Trust value (T):measures uncertainty and is a function of entropy. p :the probability with which the agent will perform the action in the subject’s point of view p ↔ T: one-to-one mapping 19.6.30

Trust Models Estimate trust value based on direct observation Estimate trust value based on recommendations (third parties’ opinion) – Trust propagation. Concatenation trust propagation Multipath trust propagation Trust model: calculate trust via trust propagation 19.6.30

Axioms of Trust Propagation Axiom 1: Concatenation propagation of trust does not increase trust. Axiom 2: Multipath propagation of trust does not reduce trust. Axiom 3: Trust based on multiple recommendations from a single source should not be higher than that from independent sources. Trust models should satisfy all the axioms. Trust models are not unique. Action-r is to make recommendation of other nodes about performing action. The value of Rab is positive 19.6.30

Entropy-based model Concatenation trust propagation Multipath trust propagation 19.6.30

Probability-based model S positive and F negative feedback Pr(observation|P = p)=B(S + 1; F + 1). Beta(7,2) 19.6.30

Probability-based model Concatenation trust propagation 19.6.30

Probability-based model Multipath Propagation 19.6.30

Outline Trust Evaluation Foundation Attacks and Protection – Trust concept, notation, metric, models Attacks and Protection – Bad-mouthing; on-off; conflicting-behavior; etc. Trust management system and its applications in Ad hoc networks. – Secure routing; malicious node detection 19.6.30

Bad Mouthing Attack Malicious nodes providing dishonest recommendations – Frame up good entities – Boost trust values of malicious peers Defense: Recommendation Trust – The action trust and recommendation trust records are maintained separately. Assign low weight to the recommendations from the nodes with low recommendation trust. Attacks and Protection Trust evaluation is an attractive target for attackers. Attackers’ goals – Damage the network, e.g. reduce performance – Keep their own trust value above a certain threshold. – Cause inaccurate trust records. good nodes have low trust value bad nodes have high trust value – Discourage cooperation 19.6.30

On-off Attack Time-domain inconsistence attack Dynamic Property of Trust: – The observation made long time ago should not carry the same weight as those made recently. – Forgetting Factor β (0 < β ≤ 1) actions at time t1 K actions at time t2 A simple scenario: – Stage 1: Behave well for 100 times – Stage 2: Behave badly for 100 times, – Stage 3: Stop doing anything for sometime – Stage 4: Behave well again. 19.6.30

On-off Attack When the system does not forget, i.e. β = 1, this attacker has positive trust value in stage (2). That is, this attacker can have good trust values even after he has performed many bad actions. When using a large forgetting factor, the trust value may not represent the latest status of the entity. When using a small forgetting factor β = 0.001, the attacker’s trust value drops rapidly after it starts behaving badly in stage (2). However, it can regain trust by simply waiting in stage (3) while the system will forget his bad behaviors quickly. Large β : trust value cannot keep up with users’ current status; Small β :Attackers can recover trust values by waiting. 19.6.30

On-off Attack-- Defense Solution: dynamic forgetting – When trust value is high, forget faster;When trust value is low, forget slower. Trust value can keep up with the entity’s current status after the entity turns bad. An entity can recover its trust value after some bad behaviors, but this recovery requires many good actions. 19.6.30

Conflicting Behavior Attack User-domain inconsistence. The attackers behave well to one group of users and behave badly to another group of users. These two groups develop conflicting opinions about the malicious users. T{A : X, action} = T1 (high) T{B: X, action} = T2 (low) – B provides recommendation about X to A – A compares B’s recommendation and A’s own experience – A will assign low recommendation trust to B. Two groups will not trust the recommendations from each others. 19.6.30

Conflicting Behavior Attack Group A: user 1,4-10 Group B: user 11-20 Attackers: 2,3 19.6.30

Other Attacks Sybil Attack: Newcomer Attack – Malicious node creates several faked IDs, then faked IDs can share or even take the blame, which should be given the malicious node. – Defense: Authentication Newcomer Attack – Malicious nodes can easily remove their bad history and significantly reduce the effectiveness of trust management. – Defense: access control policy and authentication 19.6.30

Outline Trust Evaluation Foundation Attacks and Protection – Trust concept, notation, metric, models Attacks and Protection – Bad-mouthing; on-off; conflicting-behavior; etc. Trust management system and its applications in Ad hoc networks. – Secure routing; malicious node detection 19.6.30

Communication Procedure Find multiple routes to the destination. Find the packet-forwarding trust worthiness of the nodes on the routes Selects a trustworthy route to transmit data. After the transmission, updates the trust record based on its observation of route quality. 19.6.30

Effects of Trust Management First, network throughput can be significantly degraded by malicious attackers. Second, after using trust management, the network performance can be recovered because it enables the route selection process to avoid less trustworthy node. Third, when the simulation time increases, trust management can bring the performance close to that in the scenario where no attackers are presented, since more and more accurate trust records are built over time. Trust evaluation can improve network throughput because the malicious node has less chance to be on the route, and can be detected. 19.6.30

Effects of Trust Management MDP FAR Recommendation mechanism improves the performance of malicious node detection. 19.6.30

Bad Mouthing Attack Bad mouthing attck has little effects to the throughput. 19.6.30

Bad Mouthing Attack Using recommendation trust in malicious node detection significantly improves detection rate. 19.6.30

On-off Attack When the same packet deliver ratio is achieved, the adaptive forgetting scheme results in the lowest trust value of malicious users. 19.6.30

Conflicting-behavior Attack R1:no recs to subgroup A, and honest to subgroup B R2:no recs to subgroup A, and no recs to subgroup B R3:bad recs to subgroup A, and no recs to subgroup B R4:bad recs to subgroup A, and honest to subgroup B In R1 and R4, attackers can in fact help the network performance; attackers have higher recommendation trust than good nodes. In R3, malicious nodes always have much lower recommendation trust than good nodes. In R2, attackers do not help the network by providing honest recommendations and can not be detected easily 19.6.30

Conflicting-behavior Attack When confliction behavior attack presents, using recommendation trust for malicious node detection can reduce detection rate. 19.6.30

19.6.30

Discussion What we can learn? Organization and expression Entropy-based model can partly explain the meaning of trust Attacks statement and Simulation design Effective with gray hole and bad mouthing attack 19.6.30

Discussion Need improvement Effective with On-off,confilictin-behavior attack?? Fig 14—Adaptive forgetting improves little V.D Other attacks Error Reporting Collusions … Formula Variable errors 19.6.30