Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
The Sybil Attack in Sensor Networks: Analysis & Defenses J. Newsome, E. Shi, D. Song and A. Perrig IPSN’04.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
SafeQ: Secure and Efficient Query Processing in Sensor Networks Fei Chen and Alex X. Liu Department of Computer Science and Engineering Michigan State.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Scalable and Distributed GPS free Positioning for Sensor Networks Rajagopal Iyengar and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute.
Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Lecture 09 Clustering-based Learning
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
A Framework for Energy- Saving Data Gathering Using Two-Phase Clustering in Wireless Sensor Networks Wook Chio, Prateek Shah, and Sajal K. Das Center for.
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang, Tian He, Yongdae Kim (ACM Infocom2007) Presenter : Justin.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
1 Deterministic Collision-Free Communication Despite Continuous Motion ALGOSENSORS 2009 Saira Viqar Jennifer L. Welch Parasol Lab, Department of CS&E TEXAS.
SIA: Secure Information Aggregation in Sensor Networks B. Przydatek, D. Song, and A. Perrig. In Proc. of ACM SenSys 2003 Natalia Stakhanova cs610.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
An Energy-Efficient Voting-Based Clustering Algorithm for Sensor Networks Min Qin and Roger Zimmermann Computer Science Department, Integrated Media Systems.
APL: Autonomous Passive Localization for Wireless Sensors Deployed in Road Networks IEEE INFOCOM 2008, Phoenix, AZ, USA Jaehoon Jeong, Shuo Guo, Tian He.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
J. Hwang, T. He, Y. Kim Presented by Shan Gao. Introduction  Target the scenarios where attackers announce phantom nodes.  Phantom node  Fake their.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks Name: Patrick Zwane University: National Taipei University of.
Surviving Holes and Barriers in Geographic Data Reporting for
Net 435: Wireless sensor network (WSN)
Protocols.
Protocols.
Presentation transcript:

Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis Infocom 2007 Slides by Alex Papadimitriou

Detecting Phantom Nodes in Wireless Sensor Networks Security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically located. Propose a secure localization mechanism that detects the existence of these nodes, phantom nodes. Most approaches depend on a few trusted entities (nodes or anchors), requiring at least the majority of these entities are not compromised. Based on a local map, a visual representation on the locations of neighbors of a node, which can be constructed correctly by verifying all location claims of its legitimate neighbors and filtering out phantom nodes generated by attacks.

Detecting Phantom Nodes in Wireless Sensor Networks Benefits: 1. A node’s compromised decision does not propagate to affect other nodes’ decisions. 2. Much less information exchange is required leading to less energy consumption. Major Contributions: 1. Two rules to prevent phantom nodes generating consistent ranging claims. 2. The approach recovers a local map agreed by the majority of consistent information. 3. The approach can use any ranging technique, not specially requiring distance bounding technique for location verification.

Detecting Phantom Nodes in Wireless Sensor Networks Assumptions: 1. Bidirectional channels 2. Reasonable network density 3. Two dimensions  The design only allows a node to claim about its distances to other neighboring nodes, not its own location.  Therefore the phantom node needs to fake a set of distances to all of its neighboring nodes. Without the location information of the neighboring nodes, it is hard for an attacker to generate a set of consistent ranging values, and hence to fake itself into a different physical location.

Detecting Phantom Nodes in Wireless Sensor Networks Two rules: 1. Accepting only ranging claims, not location claims. 2. Hiding the location information during the ranging phase. Fig.1a: attacker D at the location p obtains three ranging distances in the 2-D space from three honest nodes A, B and C. It can only conclude that A, B and C are located at the edges of three concentric circles centered at p. To claim a different physical location p′ within the 2-D space, the attacker D needs to fake three different ranging distances that are consistent

Detecting Phantom Nodes in Wireless Sensor Networks We note that a sensor network normally has a high node density (>>10), which makes a consistent ranging claim practically impossible without the neighbors’ location information. As shown in Figure 1a, to move from the position p to p′, the attacker D needs to claim two shorter ranging distances to Nodes B and C, but a longer ranging distance to Node A; However in case of Figure 1b, the attacker D needs to claim the opposite. Since the locations of A, B and C are unknown, the attacker cannot decide which claim to make.

Detecting Phantom Nodes in Wireless Sensor Networks A set of nodes is consistent if they can be projected on the unique Euclidean plane, keeping the measured distances among themselves. Two main phases: distance measurement phase and filtering phase. In the first phase, each node measures the distances to its neighbors. In the second phase, each node projects its neighboring nodes to a virtual local plane to determine the largest consistent subset of nodes. After the completion of the two phases, each node establishes a local view without phantom nodes.

Detecting Phantom Nodes in Wireless Sensor Networks Distance measurement phase: Each node u measures the distances to neighbors and disseminates these measurements back to its neighbors. 1. Node u first measures distance d ui to each neighbor i. 2. Node u then announces the measured distances. The announcement message includes id of the node u, id of the node I and distance measurement to i by u. Note that even when u knows about its location, it should not disclose it in this phase. 3. When neighbor i announces its measured distance to its neighbor j, u collects d ij. U collects neighbors’ announcements on the measured distances to their neighbors. 4. After collection, node u compares the data. For each collected distance, if dij = dji, it is included in the filtering phase. It is possible that an attacker holds the announcements before it collects all the ranging information, and then calculates the relative locations of the honest nodes. Consequently, this attacker could fake a set of consistent range claims. To prevent such type of attack, we require each node announces one distance at a time in a round robin fashion within the neighborhood. This can be achieved by using pairwise ranging techniques [15].

Detecting Phantom Nodes in Wireless Sensor Networks Filtering phase: 1. Initially, the node v picks up two neighbors i and j randomly as pivots. 2. Using the node v as the origin, the neighbors i and j and three distance information among v, i and j, the local coordinate system is constructed. In the node v’s coordinate system, we use a graph G(V,E) to construct a consistent subset. 3. The update process of the graph G is as follows: The location of the neighbor k is determined on the local coordinate system L by trilateration [16] from three nodes v, i, j with measured distances dkv, dki and dkj. 4. After projecting all the neighbors on L, the distance between the projected neighbors is compared with the measured distance. For any two nodes i and j the distance dij = |pi − pj | is calculated from the projected location on L. If |dij − dij | ≥ ε, the edge between i and j is not included in E. 5. The largest connected set V that contains node v is regarded as the largest consistent subset in the speculative plane L. This filtering procedure is done iter times (iter is a key parameter discussed later), and the cluster with the largest size is chosen as a final result.

Detecting Phantom Nodes in Wireless Sensor Networks