Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.

Slides:



Advertisements
Similar presentations
Marković Miljan 3139/2011
Advertisements

Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
TDMA Scheduling in Wireless Sensor Networks
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Introduction to Wireless Sensor Networks
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Mica: A Wireless Platform for Deeply Embedded Networks Jason Hill and David Culler Presented by Arsalan Tavakoli.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wireless Sensor Network Security Anuj Nagar CS 590.
Supervisor: Mr. Hai Vortman. The ultimate goal Creating a wireless sensor network using Bluetooth technology.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Key management in wireless sensor networks Kevin Wang.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
CS2510 Fault Tolerance and Privacy in Wireless Sensor Networks partially based on presentation by Sameh Gobriel.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
1 of 29 A One-Shot Dynamic Optimization Methodology for Wireless Sensor Networks Arslan Munir 1, Ann Gordon-Ross 1+, Susan Lysecky 2, and Roman Lysecky.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Grammati Pantziou 1, Aristides Mpitziopoulos 2, Damianos Gavalas 2, Charalampos Konstantopoulos 3, and Basilis Mamalis 1 1 Department of Informatics, Technological.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
1 Extended Lifetime Sensor Networks Hong Huang, Eric Johnson Klipsch School of Electrical and Computer Engineering New Mexico State University December.
Multi-Resolution Spatial and Temporal Coding in a Wireless Sensor Network for Long-Term Monitoring Applications You-Chiun Wang, Member, IEEE, Yao-Yu Hsieh,
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
Using Polynomial Approximation as Compression and Aggregation Technique in Wireless Sensor Networks Bouabdellah KECHAR Oran University.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
LiSP: A Lightweight Security Protocol for Wireless Sensor Networks TAEJOON PARK and KANG G. SHIN The University of Michigan Presented by Abhijeet Mugade.
Bounded relay hop mobile data gathering in wireless sensor networks
Secure In-Network Aggregation for Wireless Sensor Networks
1 of 21 Online Algorithms for Wireless Sensor Networks Dynamic Optimization Arslan Munir 1, Ann Gordon-Ross 2+, Susan Lysecky 3, and Roman Lysecky 3 1.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Toward a Packet Duplication Control for Opportunistic Routing in WSNs Georgios Z. Papadopoulos, Julien Beaudaux, Antoine Gallais, Periklis Chatzimisios,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
SWAN simulation A Simulation Study of Denial of Service Attacks on Wireless Ad-Hoc Networks Samuel C. Nelson, Class of 2006, Dept. of Computer Science,
MCEEC: MULTI-HOP CENTRALIZED ENERGY EFFICIENT CLUSTERING ROUTING PROTOCOL FOR WSNS N. Javaid, M. Aslam, K. Djouani, Z. A. Khan, T. A. Alghamdi.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
I-Hsin Liu1 Event-to-Sink Directed Clustering in Wireless Sensor Networks Alper Bereketli and Ozgur B. Akan Department of Electrical and Electronics Engineering.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
Reliability of Wireless sensors with code attestation for intrusion detection Ing-Ray Chen, Yating Wang, Ding-Chau Wang Information Processing Letters.
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin 1 Pasd Putthapipat 1 Deng Pan 1 Niki Pissinou 1.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Sensor Fusion-based Event Detection in Wireless Sensor Networks Majid Bahrepour, Nirvana Meratnia, Paul Havinga Presented by: Stephan Bosch.
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Prepared by: Ameer Sameer Hamood University of Babylon - Iraq Information.
Structured parallel programming on multi-core wireless sensor networks Nicoletta Triolo, Francesco Baldini, Susanna Pelagatti, Stefano Chessa University.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Energy Efficiency Energy consumption is the most important factor to determine the life of sensor network. since sensors networks has low power resources,
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
In the name of God.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Introduction to Wireless Sensor Networks
Adhoc and Wireless Sensor Networks
Presentation transcript:

Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University Brno

Wireless Sensor Network (WSN) Highly distributed network which consists of many low-cost sensor nodes and a base station (or sink) that gathers the observed data for processing. Source:

Typical sensor node (TelosB) Microcontroller ▫8 MHz, 10 kB RAM External memory ▫1 MB Radio ▫2.4 GHz, 250 kbps Battery ▫2 x AA (3 V) Sensors ▫Temperature, light, humidity, …

Security Sensor nodes: ▫Communicate wirelessly. ▫Have lower computational capabilities. ▫Have limited energy supply. ▫Can be easily captured. ▫Are not tamper-resistant. WSNs are deployed in hostile environment. WSNs are more vulnerable than conventional networks by their nature.

Attacker model Passive attacker ▫Eavesdrops on transmissions. Active attacker ▫Alters data. ▫Drops or selectively forwards packets. ▫Replays packets. ▫Injects packets. ▫Jams the network. => can be detected by Intrusion Detection System.

Intrusion detection system (IDS) IDS node can monitor packets addressed to itself. IDS node can overhear and monitor communication of its neighbors.

IDS techniques Many techniques have been proposed to detect different attacks. We can measure: ▫Packet sent & delivery ratio. ▫Packet sending & receiving rate. ▫Carrier sensing time. ▫Sending power. And monitor: ▫Packet alteration. ▫Dropping.

IDS optimization Sensor nodes are limited in their energy and memory. Better IDS accuracy usually requires: ▫Energy (network lifetime). ▫Memory (restriction to other applications).  Trade-off between IDS accuracy and WSN performance and lifetime. High-level aim: Framework for (semi)automated design and optimization of IDS parameters.

Why do we simulate WSN? Time of implementation and runtime (e.g. battery depletion). Simulation of hundreds or thousands sensor nodes. Verifiability of results. Repeatability of tests. Protocols that work during simulations may fail in real environment because of simplicity of the model. ▫Thorough comparison of simulators with reality can be found in [SSM11].

IDS optimization framework Figure: Andriy Stetsko

Simulator Input: candidate solution represented as a simulation configuration. ▫Number of monitored neighbors. ▫Max. number of buffered packets. ▫… Output: statistics of a simulation. ▫Detection accuracy. ▫Memory and energy consumption. Simulation: specific WSN running predefined time configured according to the candidate solution.

Optimization engine Input: statistics from the simulator. ▫Detection accuracy. ▫Memory and energy consumption. Output: new candidate solution(s) in form of simulation configurations. ▫Number of monitored neighbors. ▫Max. number of buffered packets. ▫… Algorithms: evolutionary algorithms, particle swarm optimization, simulated annealing, …

Evolutionary algorithms Source: Inspired in nature.

Pareto front Single aggregate objective function Set of non-dominated solutions.

Our test case Pareto front. Source: [SSSM13]

Multi-objective evolutionary algorithms What did the evolution find? Source: [SSSM13]

Conclusion Utilization of MOEAs in unexplored areas of research. MOEAs enable to choose between optimized solutions according to our requirements. Main goal: working IDS framework for WSNs. ▫Design of robust solutions for large WSNs, enabling detection of various attacks.

Acknowledgments This work was supported by the project VG , programme BV II/2 - VS, of the Ministry of the Interior of the Czech Republic.

Thank you for your attention.

References [SSM11] A. Stetsko, M. Stehlík, and V. Matyáš. Calibrating and comparing simulators for wireless sensor networks. In Proceedings of the 8th IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS '11, pages , Los Alamitos, CA, USA, IEEE Computer Society. [SSSM13] M. Stehlík, A. Saleh, A. Stetsko, and V. Matyáš. Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks. Submitted to 12th European Conference on Artificial Life. [SMS13] A. Stetsko, V. Matyáš, and M. Stehlík. A Framework for optimization of intrusion detection system parameters in wireless sensor networks. Prepared for a journal submission.