Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
A Survey of Secure Wireless Ad Hoc Routing
1 Routing Techniques in Wireless Sensor networks: A Survey.
Presented by Guillaume Marceau Using slides from Ivor Rodrigues Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof,
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Securing OLSR Using Node Locations Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 11 th European Wireless Conference 2005 (EW 2005) April
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering POWER-SPEED A Power-Controlled Real-Time Data Transport Protocol for Wireless Sensor-Actuator.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Intrusion Detection for Wireless Sensor Networks Qualifying Exam 28 th April 2005 Presented by Edith Ngai Supervised by Prof. Michael R. Lyu.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks Name: Patrick Zwane University: National Taipei University of.
Packet Leashes: Defense Against Wormhole Attacks
Surviving Holes and Barriers in Geographic Data Reporting for
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
DDoS Attack Detection under SDN Context
ITIS 6010/8010 Wireless Network Security
Presentation transcript:

On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1 1Department of Computer Science and Engineering The Chinese University of Hong Kong 2School of Computing Science Simon Fraser University 12 Jun 2006 IEEE International Conference on Communications (ICC 2006)

Outline Introduction Related Work Sinkhole Attack Detection Enhancements Against Multiple Malicious Nodes Performance Evaluation Conclusion and Future Work

Wireless Sensor Networks Increasingly popular to solve challenging real-world problems Industrial sensing Environmental monitoring Set of sensor nodes Many-to-one communication Vulnerable to the sinkhole attack Set of sensor nodes continuously monitor their surroundings forward the sensing data to a sink node, or base station Many-to-one Communication vulnerable to the sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information alters the data passing through it or performs selective forwarding

Sinkhole Attack Prevent the base station from obtaining complete and correct sensing data Particularly severe for wireless sensor networks Some secure or geographic based routing protocols resist to the sinkhole attacks in certain level Many current routing protocols in sensor networks are susceptible to the sinkhole attack prevent the base station from obtaining complete and correct sensing data => form a serious threat to higher-layer applications particularly severe for wireless sensor networks the vulnerability of wireless links sensors are often deployed in open areas and of weak computation and battery power some secure or geographic based routing protocols resist to the sinkhole attacks in certain level many current routing protocols in sensor networks are susceptible to the sinkhole attack

Sinkhole Attack Left: using an artificial high quality route s mentioned earlier, this commonly used many-to-one communication pattern is vulnerable to sinkhole attacks. In a sinkhole attack, an intruder usually attracts network traffic by advertising itself as having the shortest path to the base station. For example, as shown in Figure 1a, an intruder using a wireless-enabled laptop will have much higher computation and communication power than a normal sensor node, and it could have a high-quality single-hop link to the base station (BS). It can then advertise imitated routing messages about the high quality route, thus spoofing the surrounding nodes to create a sinkhole (SH). A sinkhole can also be performed using a wormhole [12], which creates a metaphorical sinkhole with the intruder being at the center. An example is shown in Figure 1b, where an intruder creates a sinkhole by tunneling messages received in one part of the network and replays them in a different part using a wormhole. Left: using an artificial high quality route Right: using a wormhole

Related Work Intrusion detection has been an active research topic for the Internet extensively Sensor network that we are considering asymmetric many-to-one communication pattern power of the sensor nodes is rather weak Protocols based on route advertisement are vulnerable to sinkhole attacks intrusion detection has been an active research topic for the Internet extensively many detection algorithms have been proposed for wireless ad hoc networks as well most of them assume uniform nodes and symmetric communications however, the sensor network we are considering has an asymmetric many-to-one communication pattern the power of the sensor nodes is rather weak For sensor networks, some existing secure or geographical routing protocols are resistant to sinkhole attack in certain level An example is a geographic protocol (GPSR by B. Karp, H.T. Kung), which performs routing by the localized information and interactions only, without an initiation from the base station However, many of the existing routing protocols, in particular, those based on route advertisement, are vulnerable to sinkhole attacks To the best of our knowledge, we are not aware of any algorithm that is specifically designed for sinkhole detection among them

Related Work Wood et al. Ding et al. Staddon et al. Ye et al. mechanism for detecting and mapping jammed regions Ding et al. algorithm for the identification of faulty sensors and detection of the reach of events Staddon et al. trace the identities of the failed nodes with the topology conveyed to the base station Ye et al. a Statistical En-route Filtering (SEF) mechanism that can detect and drop false reports Perrig et al. a packet leash mechanism for detecting and defending against wormhole attacks Our work is also motivated by the following studies, though they have focused on different applications. Specifically, Wood et al. proposes a mechanism for detecting and mapping jammed regions describe a mapping protocol for nodes that surround a jammer which allows network applications to reason about the region as an entity Ding et al. propose an algorithm for the identification of faulty sensors and detection of the reach of events in sensor networks with faulty sensors Staddon et al. demonstrate that the topology of the network can be efficiently conveyed to the base station allowing for the quick tracing of the identities of the failed nodes with moderate communication overhead Ye et al. present a Statistical En-route Filtering (SEF) mechanism that can detect and drop such false reports; applies multiple keyed message authentication codes, probabilistic verification, and data filtering to determine the truthfulness of each report Perrig et al. [11] propose a packet leash mechanism for detecting and thus defending against wormhole attacks A leash can be some temporal or geographical information that is added to a packet to restrict the packet's maximum allowed transmission distance

Our Work Propose an algorithm for detecting sinkhole attacks and identifying the intruder in an attack Base station collects the network flow information with a distributed fashion in the attack area An efficient identification algorithm that analyzes the collected network flow information and locate the intruder Consider the scenario that a set of colluding nodes cheat the base station about the location of the intruder propose a novel light-weighted algorithm for detecting sinkhole attacks and identifying the intruder in an attack focus on a general many-to-one communication model, where the routes are established based on the reception of route advertisements explore the asymmetric property between the sensor nodes and the base station, and makes effective use of the relatively-high computation and communication power in the base station consist of two steps First, a secure and low-overhead algorithm for the base station to collect the network flow information with a distributed fashion in the attack area second, an efficient identification algorithm that analyzes the collected network flow information and locate the intruder also consider the scenario that a set of colluding nodes cheat the base station about the location of the intruder examine multiple suspicious nodes and conclude the intruder based on majority votes show that such a conclusion is correct if less than half of the collected information comes from malicious nodes

Estimate the Attacked Area Consider a monitoring application in which sensor nodes submit sensing data to the BS periodically By observing consistent data missing from an area, the BS may suspect there is an attack with selective forwarding BS can detect the data inconsistency using the following statistical method Let X1, ..., Xn be the sensing data collected in a sliding window, and be their mean. Define f(Xj) as

Estimate the Attacked Area Identify a suspected node if f(Xj) is greater than a certain threshold The BS can estimate where the sinkhole locates It can circle a potential attacked area, which contains all the suspected nodes A simple measure for identifying a suspected node is if f(Xj) is greater than a certain threshold After identifying a list of the suspected nodes, the BS can estimate where the sinkhole locates It can circle a potential attacked area, which contains all the suspected nodes

Identifying the Intruder Each sensor stores the ID of next-hop to the BS and the cost in its routing table The BS sends a request message to all the affected nodes The sensors reply with <ID, IDnext-hop, cost> Since the next-hop and the cost could already be affected by the attack The reply message should be sent along the reverse path in the flooding, which corresponds to the original route with no intruder Since the attacked area may contain many nodes, and the sinkhole is not necessarily the center of the area, it is better to further locate the exact intruder and isolate it from the network. This can be achieved through analyzing the routing pattern in the affected area. The BS sends a request message, which contains the IDs of all the affected nodes, and is flooded hop by hop For each node v receiving the first request, if its ID is there, it should reply the BS a message <IDv, IDnext-hop, cost> The ID of the next-hop node and the cost are stored by individual nodes according to their routing protocol. Note that the next-hop and the cost could already be affected by the attack => hence, the reply message should be sent along the reverse path in the flooding, which corresponds to the original route with no intruder

Identifying the Intruder Network flow information can be represented by a directed edge Realizes the routing pattern by constructing a tree using the next hop information collected An invaded area possesses special routing pattern All network traffic flows toward the same destination, which is compromised by the intruder SH An area invaded by a sinkhole attack processes special routing pattern all network traffic flows toward the same destination, which is compromised by the intruder SH.

Enhancement on Network Flow Information Collection Multiple malicious nodes may prevent the BS from obtaining correct and complete flow information for intruder detection They may cooperate with the intruder to perform the following misbehaviors: Modify the packets passing through Forward the packets selectively Provide wrong network flow information of itself We address these issues through encryption and path redundancy

Multiple Malicious Nodes Drop some of the reply packets Provide incorrect flow information An example is shown in Figure 4b, where two colluding nodes A and C provide an outgoing edge to a victim node SH’. To deal with this problem, the BS detects the inconsistency among the hop count information. For instance, nodes D, E, and F have same number of hop counts in their incoming and outgoing edges, which is suspicious. Moreover, the incoming edges of SH’ have different number of hop counts. In our algorithm, we calculate the difference between the hop count provided by a node and the number of edges from the node to the current root. By spotting the inconsistency of the hop counts, we could identify SH and other suspicious nodes. Their objective is to hide the real intruder SH and blame on a victim node SH’

Dealing with Malicious Nodes Maintain an array Count[] Entry Count[i] stores the total number of nodes having hop count difference i Index i can be negative (a node is smaller than its actual distance from the current root) If Count[0] is not the dominated one in the array, it means the current root is unlikely the real intruder index i can be negative, which indicates that the hop count provided by a node is smaller than its actual distance from the current root.

Dealing with Malicious Nodes By analyzing the array Count, we may estimate the hop counts from SH’ to SH The BS can make root correction and re-calculate the array Count among the nodes within two hops from SH’ Concludes the intruder based on the most consistent result By analyzing the array Count, we may estimate the hop counts from SH’ to SH. For example, if most non-zero entries of Count fall in the index range [-2, 2], we may suspect SH is two hops away from SH’ (the current root). Based on this, the BS can make root correction and re-calculate the array Count among the nodes within two hops from SH’ (Algorithm 2). Finally, it concludes the intruder based on the most consistent result.

Example The array Count of the following figure is: It shows that only 8 nodes agree that SH’ is the intruder. However, 14 nodes do not agree with that. Instead, they believe SH should be one hop closer to BS than node SH’. Since they are the majority, our correction algorithm has to run again and look for a new root.

Example Eventually, node SH becomes the new root: Eventually, node SH becomes the new root after the correction algorithm and the corresponding new array Count is as follow: It shows that 21 nodes provide consistent information about the current root SH. Since the value of Count[0] is the majority, SH is concluded as the intruder.

Performance Evaluation Accuracy of Intruder Identification Success Rate False-positive Rate False-negative Rate Communication Cost Energy Consumption No. of nodes in network 400 Size of network 200m x 200m Transmission range 10m Location of BS (100,100) Location of sinkhole (50, 50) Percentage of colluding codes (m) 0 – 50% Message drop rate (d) 0 – 80% No. of neighbors which a message is forwarded to (k) 1 – 2 Packet size 100bytes Max. number of reply messages per packet 5

Success Rate

False-positive and False-negative Rate

Communication Cost and Energy Consumption

Conclusion and Future Work An effective method for identifying sinkhole attack in wireless sensor networks It locates a list of suspected nodes by checking data consistency, and then identifies the intruder in the list through analyzing the network flow information A series of enhancements to deal with cooperative malicious nodes that attempt to hide the real intruder Numerical analysis and simulation results are provided to demonstrate the effectiveness and accuracy of the algorithm We are interested in more effective statistical algorithms for identifying data inconsistency We have presented an effective method for identifying sinkhole attack in a wireless sensor network. The algorithm first locates a list of suspected nodes by checking data consistency, and then identifies the intruder in the list through analyzing the network flow information. We have also presented a series enhancements to deal with cooperative malicious nodes that attempt to hide the real intruder.