© 2005, it - instituto de telecomunicações. Todos os direitos reservados. Anonymity in Wireless Networks Under Traffic Analysis Attacks Hugo Moreira de.

Slides:



Advertisements
Similar presentations
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Advertisements

Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Security Issues in Wireless Sensor Networks -Ninad Naik.
Bandwidth-Efficient, Energy-Constrained Short Range Wireless Communications.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Multicasting in Mobile Ad-Hoc Networks (MANET)
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Security Issues In Sensor Networks By Priya Palanivelu.
Security in Ad Hoc Networks Steluta Gheorghiu Universitat Politecnica de Catalunya Departament d’Arquitectura de Computadors.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Optimal Data Compression and Forwarding in Wireless Sensor Networks Bulent Tavli, Mehmet Kayaalp, Ibrahim E. Bagci TOBB University of Economics and Technology.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
© 2005, it - instituto de telecomunicações. Todos os direitos reservados. Gerhard Maierbacher Scalable Coding Solutions for Wireless Sensor Networks IT.
Lower-Layer Security in Mobility Yih-Chun Hu. Wireless Physical Layer Security The problem: prevent the jamming of broadcast to a group of nodes, some.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
© 2005, it - instituto de telecomunicações. Todos os direitos reservados. System Level Resource Discovery and Management for Multi Core Environment Javad.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Secure Local Data Aggregation and Delay Tolerant Dissemination in VANETs.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks – Chris Karlof, Naveen Sastry & David Wagner Dr. Xiuzhen Cheng Department of Computer.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
INC 1 Wireless MIMO Switching Fanggang Wang and Soung C. Liew INC Seminar 26/01/2011.
Pushing the Limits of Wireless Networks Prof. Dina Katabi Jan 9, 2006.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks I-Hong Hou.
1 Mitigate the Bottleneck of Underwater Acoustic Sensor Networks via Priority Scheduling Junjie Xiong, Michael R. Lyu, Kam-Wing Ng.
Ad Hoc Network.
S& EDG: Scalable and Efficient Data Gathering Routing Protocol for Underwater Wireless Sensor Networks 1 Prepared by: Naveed Ilyas MS(EE), CIIT, Islamabad,
Energy-aware Node Placement in Wireless Sensor Networks Global Telecommunications Conference 2004 (Globecom 2004) Peng Cheng, Chen-Nee Chuah Xin Liu UCDAVIS.
We hope that it is more important to know where you are going than to get there quickly. SNU INC Lab. A Survey of Energy Efficient Network Protocols for.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
© 2007, it - instituto de telecomunicações. Todos os direitos reservados. Beyond 2020 Content Centric Networking 50 PhD Graduates Celebration Event Aalborg,
A Critical Analysis on the Security of IoTs
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Doc.: IEEE /0070r2 SubmissionSlide 1 Efficient Error Control Using Network Coding for Multicast Transmission Date: Authors: DooJung.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Power-aware Routing in Wireless Sensor Network Lee, Chen-Pang.
Patent technology for USN Jinho Son Real-Time System Lab.
VANET.
Contention-based protocols with Reservation Mechanisms
SPINS: Security Protocols for Sensor Networks
Why ? VOIP Analysis using OPNET Objective
مادسیج، شبکه آموزشی پژوهشی دانشجویان ایران
Computer Security Network Security
امنیت شبکه علی فانیان
Mobile ad hoc networking: imperatives and challenges
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Security of Wireless Sensor Networks
Subject Name: Adhoc Networks Subject Code: 10CS841
Can they transmit simultaneously
CS 575 – Drexel University – Fall 2007
Aggregation.
An Overview of Security Issues in Sensor Network
Traffic Filter based Wakeup Service
Presentation transcript:

© 2005, it - instituto de telecomunicações. Todos os direitos reservados. Anonymity in Wireless Networks Under Traffic Analysis Attacks Hugo Moreira de Sousa Pinto Professor Daniel Lucani Professor João Barros

2 Security in Communications  Measures to deter violations that involve the transmission of information  Anonymity – hiding the parties involved in a communication Anonymity in Wireless Networks Under Traffic Analysis Attacks IJUP - 18th February 2011  Authentication  Access Control  Data Integrity  Non Repudiation  Data Confidentiality  Scheduling mechanisms  Dummy transmissions  Wireless Networks  Session anonymity

3 Problem Setup Anonymity in Wireless Networks Under Traffic Analysis Attacks IJUP - 18th February 2011 A1A2A3 Wireless Line network  Types of sessions  Unicast Sessions:  e.g. VoIP conversation  Multicast Sessions:  e.g. Sharing a picture A1A2 A1A2A3 A1 A2 A1 -> {A2,A3} Possible sessions A1 A2 A2 A3 A1 A3 A1 -> {A2, A3} A2 -> {A1, A3} A3 -> {A1, A2}

4 Scheduling – 3 node line network  Pattern 1  Pattern 2 Anonymity in Wireless Networks Under Traffic Analysis Attacks IJUP - 18th February 2011 t1t1 t2t2 t3t3 t4t4 A1 A2xxxx A3 t1t1 t2t2 t3t3 t4t4 A1x A2xx A3x Possible sessions A1 A2 A2 A3 A1 A3 A1 -> {A2, A3} A2 -> {A1, A3} A3 -> {A1, A2} Not Anonymous Anonymous Possible sessions A1 A2 A2 A3 A1 A3 A1 -> {A2, A3} A2 -> {A1, A3} A3 -> {A1, A2} Possible sessions A1 A2 A2 A3 A1 A3 A1 -> {A2, A3} A2 -> {A1, A3} A3 -> {A1, A2}

5 Design Objectives  Provide session anonymity Anonymity in Wireless Networks Under Traffic Analysis Attacks IJUP - 18th February 2011 t1t1 t2t2 t3t3 t4t4 t5t5 t6t6 A1 A2 A3 A4 A5 A6  Maximize throughput  Minimize energy  Possibility of simultaneous transmissions  Scalable to longer networks A1A2A3A4A5A6 t1t1 t2t2 t3t3 t4t4 t5t5 t6t6 A1X A2 A3 A4X A5 A6 t1t1 t2t2 t3t3 t4t4 t5t5 t6t6 A1X A2XX A3XX A4XX A5XX A6X

6 Cost of anonymity Anonymity in Wireless Networks Under Traffic Analysis Attacks IJUP - 18th February 2011 A1A2A3A4A5 K=3  For k>=5 we have free anonymity in terms of throughput

7 Conclusions and future work  Session anonymity  No cost in throughput  High cost in energy if the network size is too long  Use of transmission mechanisms such as network coding  Double throughput  Reduce energy consumption by half  Study trade-offs between anonymity and cost  Look into different network topologies Anonymity in Wireless Networks Under Traffic Analysis Attacks IJUP - 18th February 2011