Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference.

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Chapter 4 Distributed Bellman-Ford Routing
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Chabot College Chapter 2 Review Questions Semester IIIELEC Semester III ELEC
Urban Multi-Hop Broadcast Protocol for Inter-Vehicle Communication Systems Δημόκας Νικόλαος Data Engineering Laboratory, Aristotle University of Thessaloniki.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Introduction to Wireless Sensor Networks
VDR: Proactive element Conclusions VDR reaches 3.5% more nodes than VDR-R and 9% more nodes than our modified random walk routing strategy (RWR) VDR shows.
1 Routing Techniques in Wireless Sensor networks: A Survey.
1 Distributed Adaptive Sampling, Forwarding, and Routing Algorithms for Wireless Visual Sensor Networks Johnsen Kho, Long Tran-Thanh, Alex Rogers, Nicholas.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
1 Enhancing Source-Location Privacy in Sensor Network Routing P. Kamat, Y. Zhang, W. Trappe and C. Ozturk Proceedings of the 25th IEEE Int. Conference.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
William Stallings Data and Computer Communications 7th Edition
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Switching Techniques Student: Blidaru Catalina Elena.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering POWER-SPEED A Power-Controlled Real-Time Data Transport Protocol for Wireless Sensor-Actuator.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Anonymous Communication -- a brief survey
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
SIA: Secure Information Aggregation in Sensor Networks B. Przydatek, D. Song, and A. Perrig. In Proc. of ACM SenSys 2003 Natalia Stakhanova cs610.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Trading Structure for Randomness in Wireless Opportunistic Routing Szymon Chachulski, Michael Jennings, Sachin Katti and Dina Katabi MIT CSAIL SIGCOMM.
Network Layer (2). Review Physical layer: move bits between physically connected stations Data link layer: move frames between physically connected stations.
Structure-Free Data Aggregation in Sensor Networks.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Data and Computer Communications Chapter 7 Circuit Switching and Packet Switching.
Network Layer.
Protocols for Wireless Sensor Networks
Introduction to Wireless Sensor Networks
ODMRP Enhancement.
Introduction to Wireless Sensor Networks
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Presented by Prashant Duhoon
Infer: A Bayesian Inference Approach towards Energy Efficient Data Collection in Dense Sensor Networks. G. Hartl and B.Li In Proc. of ICDCS Natalia.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
PRESENTATION COMPUTER NETWORKS
Switching Techniques.
Viet Nguyen Jianqing Liu Yaqin Tang
Network Layer.
Exploring Energy-Latency Tradeoffs for Sensor Network Broadcasts
Presentation transcript:

Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Natalia Stakhanova cs610

Sensor networks Security threats  concerns with data security necessity to protect content of the data packages transferred through the network  privacy threats associated with sensors devices necessity to secure the transmission of the data, for ex. location of the sensor node providing particular information  Presented work addresses this issue

Example: pander-hunter game  Sensors are monitoring the habitat of pandas once panda is observed - the information is reported to the base station hunter desires to capture panda  Assumptions one panda, one hunter and one base station hunter is equipped with rich memory and power resources and is able to identify the immediate sender knowing signal strength and the angle of the arrived message

Privacy metrics  the safety period number of messages initiated by the sensor monitoring the panda.  the capture likelihood the probability that hunter can capture panda within a specified time period.

Considered routing protocols  Two baseline techniques flooding  message is broadcasted to all neighbors single-path routing  message is routed to one of the neighbors  Improvements for these techniques each technique is associated with behavioral hunter model

Performance: baseline routing protocols Patient hunter model hunter waits at the base station for message moves to the immediate sender of that message repeats until reaches the source node The safety period is the same as the length of the shortest routing path. single-path routing flooding The capture likelihood is high with single source routing, much lower with probabilistic routing

Improvement: routing with fake sources  introduce new sources that inject fake messages into the network two challenges:  How to chose fake source  Rate of fake messaging

Routing with fake sources  Fake source source is h hops away, sends message to the sink sink sends a message into opposite direction once message reached node in h hops away from sink it becomes a fake source  Rate of fake messaging Slow rate → hunter finds the real source fast At the rate of the real messaging → hunter struggles between fake and real source High rate → hunter is kept at the fake source fake source real source

Performance: routing with fake sources  Fast speed of fake messaging provides good privacy!  … But it won’t work for more sophisticated hunter Perceptive hunter model hunter is able to detect deception for ex. can keep the history of visited nodes

Improvement: phantom routing  Introduces two phases: random walk  message is routed in random fashion for h hops flooding/single-path routing  after h hops message is routed using baseline technique Random walk Flooding

Phantom routing: further improvement  Pure random walk might not be efficient → directed random walk a sector based directed random walk  each node partitions neighbors into two sets S1, S2 (for ex. east/west)  if message is sent to node in S1, then every node forwards it to the neighbors in set S1 only a hop-based directed random walk  must know the hop count between sink and all nodes  partition node into 2 sets: with hop count mine

Performance: phantom routing  Safety period for phantom single-source routing is higher than for phantom flooding single-path routing flooding Why: probability in single-source routing that message will intersect hunter’s path is small in flooding this probability is still large

Performance: phantom routing  The capture likelihood - number of transmissions per message increases linearly for both techniques single-path routing flooding However Safety period increase is more dramatic So combined -> more privacy

Performance: phantom routing  Caution hunter model hunter limits its listening time at node after timeout hunter returns to the previous node However … does not provide more benefits hunter does not make much progress towards the real source Safety period is higher, while capture likelihood is lower

Privacy in mobile sensor network  Mobility adds privacy Fast moving panda alone is sufficient to provide source privacy using single-source routing In phantom routing the privacy increases

Conclusion  Majority of the research efforts are focused on data security  There are some works on protecting privacy associated with network devices not appropriate for sensor networks  This is one of the first efforts to address sensor location privacy in sensor network

???