Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information 97598039 梁紀翔 97598050 王謙志 NETLab.

Slides:



Advertisements
Similar presentations
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Advertisements

Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
A Hierarchical Multiple Target Tracking Algorithm for Sensor Networks Songhwai Oh and Shankar Sastry EECS, Berkeley Nest Retreat, Jan
Yang Yang, Miao Jin, Hongyi Wu Presenter: Buri Ban The Center for Advanced Computer Studies (CACS) University of Louisiana at Lafayette 3D Surface Localization.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Topological Hole Detection Ritesh Maheshwari CSE 590.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Interference Considerations for QoS in MANETs Rajarshi Gupta, John Musacchio, Jean Walrand {guptar, musacchj, University of California,
Differentiated Surveillance for Sensor Networks Ting Yan, Tian He, John A. Stankovic CS294-1 Jonathan Hui November 20, 2003.
Jie Gao Joint work with Amitabh Basu*, Joseph Mitchell, Girishkumar Stony Brook Distributed Localization using Noisy Distance and Angle Information.
More routing protocols Alec Woo June 18 th, 2002.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
1 Energy-Efficient localization for networks of underwater drifters Diba Mirza Curt Schurgers Department of Electrical and Computer Engineering.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Asymptotic Critical Transmission Radius for Greedy Forward Routing in Wireless Ad Hoc Networks Chih-Wei Yi Submitted to INFOCOM 2006.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
Novel Self-Configurable Positioning Technique for Multihop Wireless Networks Authors : Hongyi Wu Chong Wang Nian-Feng Tzeng IEEE/ACM TRANSACTIONS ON NETWORKING,
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Jana van Greunen - 228a1 Analysis of Localization Algorithms for Sensor Networks Jana van Greunen.
GS 3 GS 3 : Scalable Self-configuration and Self-healing in Wireless Networks Hongwei Zhang & Anish Arora.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Energy-Aware Synchronization in Wireless Sensor Networks Yanos Saravanos Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
1 Mobile-Assisted Localization in Wireless Sensor Networks Nissanka B.Priyantha, Hari Balakrishnan, Eric D. Demaine, Seth Teller IEEE INFOCOM 2005 March.
VAPR: Void Aware Pressure Routing for Underwater Sensor Networks
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
04/06/2016Applied Algorithmics - week101 Dynamic vs. Static Networks  Ideally, we would like distributed algorithms to be: dynamic, i.e., be able to.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Computer Network Lab. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks SenSys ’ 03 Xiaorui Wang, Guoliang Xing, Yuanfang.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power.
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
1/29/2016 Mobile Ad hoc Network COE 549 Deployment of Ad hoc Sensor Networks Tarek Sheltami KFUPM CCSE COE
Self-stabilizing energy-efficient multicast for MANETs.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Reliable Mobicast via Face- Aware Routing Qingfeng Huang,Chenyang Lu and Gruia-Catalin Roman Department of Computer Science and Engineering Washington.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Delay-Tolerant Networks (DTNs)
Topology Control –power control
Topology Control and Its Effects in Wireless Networks
Wireless Mesh Networks
Speaker : Lee Heon-Jong
Presentation transcript:

Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information 梁紀翔 王謙志 NETLab

Outline Wormhole Attack ? Wormhole Attack ? Some detecting methods and limitations Some detecting methods and limitations Using Bound distance or Time Using Bound distance or Time Using Graph theory and Geometric Using Graph theory and Geometric Using Connectivity Information Using Connectivity Information Unit Disk Graph model Unit Disk Graph model Other models Other models Wormhole removal Wormhole removal Simulation result & Conclusion Simulation result & Conclusion

What is Wormhole ? Shortcut through space and time

Wormhole Attack

Threats Dropping or modifying packets Dropping or modifying packets Generating unnecessary routing activities by turning off the wormhole link periodically Generating unnecessary routing activities by turning off the wormhole link periodically Record traffic for later analysis Record traffic for later analysis Break protocol relies on geographic proximity Break protocol relies on geographic proximity

Bound distance or Time Use node location info. to bound the distance a packet can traverse Use node location info. to bound the distance a packet can traverse But … hard to determine “ legal ” distance But … hard to determine “ legal ” distance Use global clock to bound propagation time Use global clock to bound propagation time Useless against physical layer attacks Useless against physical layer attacks Besides … they all need additional hardware Besides … they all need additional hardware

Graph theory and Geometric Use combination of one-time authenticated neighbor discovery and Guard nodes to attest the source of transmission Use combination of one-time authenticated neighbor discovery and Guard nodes to attest the source of transmission What if attack begin before discovery ? What if attack begin before discovery ? Special Guard nodes knows their “ correct ” location and with higher RF power and different RF charactertics Special Guard nodes knows their “ correct ” location and with higher RF power and different RF charactertics Impractical Impractical

Graph theory and Geometric cont. Use Directional antennas Use Directional antennas Need a cooperative protocol share directional info. between nodes to detect wormhole Need a cooperative protocol share directional info. between nodes to detect wormhole Use neighbor distance estimation and Multi- dimensional scaling to draw a “ network layout ” Use neighbor distance estimation and Multi- dimensional scaling to draw a “ network layout ” The layout should be “ flat ” The layout should be “ flat ” Centralized computation Centralized computation Physical layer authentication in packet modulation/demodulation Physical layer authentication in packet modulation/demodulation Special RF hardware Special RF hardware

Limitations Additional hardware is not affordable on large scale sensor networks, such as Additional hardware is not affordable on large scale sensor networks, such as Directional antennas Directional antennas GPS GPS Ultrasound Ultrasound Guard nodes with correct location Guard nodes with correct location Global clock synchronization or computation Global clock synchronization or computation Localized algorithm is the solution Localized algorithm is the solution Use info. collected by upper layer Use info. collected by upper layer

Algorithm concept Looks for forbidden substructure that should not present in a legal connectivity graph Looks for forbidden substructure that should not present in a legal connectivity graph

Unit Disk Graph model Idealized model for multi-hop wireless network Idealized model for multi-hop wireless network Node modeled as a disk with unit radius Node modeled as a disk with unit radius Unit radius is the communication range with omni- directional antenna Unit radius is the communication range with omni- directional antenna Each node is a neighbor of all nodes within its disk Each node is a neighbor of all nodes within its disk

Hardness NP-Hard to detect wormhole in UDG NP-Hard to detect wormhole in UDG Equivalence of finding UDG embedded in 2D graph Equivalence of finding UDG embedded in 2D graph Proven NP-Hard problem Proven NP-Hard problem The algorithm looks for structures that do not allow UDG embedding The algorithm looks for structures that do not allow UDG embedding Due to hardness, 100% wormhole detection will not guaranteed Due to hardness, 100% wormhole detection will not guaranteed But provides sufficiently high detection rate But provides sufficiently high detection rate

Disk packing In a fix region, one can not pack too many nodes without having edges in between In a fix region, one can not pack too many nodes without having edges in between Packing number - Packing number - Maximum number of points inside region S such that every pair of points is strictly more then distance r away from each other Maximum number of points inside region S such that every pair of points is strictly more then distance r away from each other

Disk packing cont. - A unit disk D of radius R centered at u - A unit disk D of radius R centered at u Lune - Lune - Intersection of 2 disks of radius R centered at u, v, with distance r away Intersection of 2 disks of radius R centered at u, v, with distance r away

Disk packing cont. Lemma 1 Lemma 1 When R = r = 1 When R = r = 1 Lemma 2 Lemma 2 for for

Forbidden substructure a and b (non-neighbors) have three common independent neighbor c, d, e a and b (non-neighbors) have three common independent neighbor c, d, e By Lemma 1, this can not happen By Lemma 1, this can not happen If only c, d in region B. It will fail If only c, d in region B. It will fail

Forbidden substructure cont. For low density case For low density case Look among k -hop neighbors Look among k -hop neighbors Find common independent k -hop neighbors of two non-neighbor nodes Find common independent k -hop neighbors of two non-neighbor nodes Forbidden substructures used in algorithm Forbidden substructures used in algorithm 3 independent common 1 -hop neighbors 3 independent common 1 -hop neighbors independent common k -hop neighbors independent common k -hop neighbors - Forbidden parameter - Forbidden parameter

Forbidden substructure cont. must be more than the packing number for unit distance inside the lune of two disks of radii k placed at distance 1 must be more than the packing number for unit distance inside the lune of two disks of radii k placed at distance 1 Radius k for modeling k -hop neighborhood Radius k for modeling k -hop neighborhood 1 for modeling the lower bound of distance between non-neighbors 1 for modeling the lower bound of distance between non-neighbors

Forbidden substructure cont. If a network has forbidden substructure If a network has forbidden substructure There must be a wormhole There must be a wormhole For a given node density with wormhole present For a given node density with wormhole present Higher k, higher detection possibility Higher k, higher detection possibility Larger neighborhood provide more nodes to work with Larger neighborhood provide more nodes to work with

Algorithm 1. Find the forbidden parameter 2. Each node u determines its 2k -hop neighbor list, execute following steps for each non-neighboring node v in

Algorithm cont. 3. u determines the set of common k -hop neighbors with v from their k -hop neighbor list can be obtained by simply exchanging lists can be obtained by simply exchanging lists 4. u determines the maximal independent set of Find maximum independent set is NP-Hard Find maximum independent set is NP-Hard Use greedy algorithm Use greedy algorithm

Algorithm cont. 5. If the maximal independent set size is equal or larger than, u declares the presence of a wormhole For most case, k = 1 is sufficient, with For most case, k = 1 is sufficient, with to check non-neighbor nodes in 2-hop neighborhood to check non-neighbor nodes in 2-hop neighborhood to find maximal independent set to find maximal independent set d is the average degree of nodes d is the average degree of nodes k = 2 for fairly low density cases k = 2 for fairly low density cases

Node distribution is theoretical worst case is theoretical worst case With known distribution, can be much smaller With known distribution, can be much smaller Smaller, higher detection rate Smaller, higher detection rate But … too small will have false positives But … too small will have false positives Unless node density is very high Unless node density is very high It ’ s unlikely to find that many common independent 2-hop neighbors It ’ s unlikely to find that many common independent 2-hop neighbors

Communication models UDG is overly simplified UDG is overly simplified Packet reception range is not prefect disk Packet reception range is not prefect disk For other communication models For other communication models Same algorithm applied Same algorithm applied But finding by Mathematical or Geometrical ways But finding by Mathematical or Geometrical ways

Known models Quasi-UDG Quasi-UDG Distance within α ≦ 1 - link Distance within α ≦ 1 - link Distance larger than 1 - no link Distance larger than 1 - no link Run simulation with target distribution to obtain connectivity graph Run simulation with target distribution to obtain connectivity graph Then estimate forbidden parameter Then estimate forbidden parameter

Known models cont. For any pair of non-neighboring nodes For any pair of non-neighboring nodes Find the maximal independent set among their common k -hop neighbors Find the maximal independent set among their common k -hop neighbors Take the maximum as Take the maximum as Used in simulation result to obtain tight bound Used in simulation result to obtain tight bound If model is probabilistic If model is probabilistic is also probabilistic is also probabilistic Notice that false positives still possible Notice that false positives still possible

Unknown model Parametric search for unknown Parametric search for unknown Use large initial value to run the algorithm Use large initial value to run the algorithm If no detection, half the value, re run If no detection, half the value, re run Until vary small fraction of nodes report wormhole Until vary small fraction of nodes report wormhole Or minimum number of tolerable false positives Or minimum number of tolerable false positives Run this search in safe part of network Run this search in safe part of network

Unknown model cont. If there is no safe place If there is no safe place Assume a “ threat level ” Assume a “ threat level ” Guidance for what fraction of nodes must report wormhole Guidance for what fraction of nodes must report wormhole So will not reduced any further So will not reduced any further

Wormhole removal Manually isolate links effected Manually isolate links effected Process for 1-hop, UDG Process for 1-hop, UDG Corrupted nodes verify its neighbor list with uncorrupted nodes Corrupted nodes verify its neighbor list with uncorrupted nodes Ignore transmission from suspicious nodes Ignore transmission from suspicious nodes

Simulation environment Models Models UDG UDG Quasi-UDG Quasi-UDG Model used in TOSSIM simulator Model used in TOSSIM simulator Distributions Distributions Perturbed grid (a planed sensor deployment) Perturbed grid (a planed sensor deployment) Random Random 144 nodes, single wormhole, k ≤ 2, repeat 10,000 times 144 nodes, single wormhole, k ≤ 2, repeat 10,000 times

Quasi-UDG Transmission radius - R Transmission radius - R Quasi-UDG factor - 0 ≤α≤ 1 Quasi-UDG factor - 0 ≤α≤ 1 Link - distance d within αR Link - distance d within αR No link - d > R No link - d > R d in [α R, R ] - link with probability d in [α R, R ] - link with probability Use α = 0.75 in simulation Use α = 0.75 in simulation TOSSIM model - link probability TOSSIM model - link probability - bit error probability - bit error probability

Distributions Perturbed 12×12 grid Perturbed 12×12 grid [ x-px, x+px ], [ y-py, y+py ] [ x-px, x+px ], [ y-py, y+py ] Perturbation parameter - 0.0 ≤ p ≤ 0.5 Perturbation parameter - 0.0 ≤ p ≤ 0.5 Randomly chosen x, y coordinates Randomly chosen x, y coordinates Node density Node density Change R for (Quasi-)UDG Change R for (Quasi-)UDG Change geographic area for TOSSIM Change geographic area for TOSSIM

Experiments Create topology Create topology Check connectivity Check connectivity Disconnected if any two node do not have route Disconnected if any two node do not have route Run algorithm to see false positive Run algorithm to see false positive Apply wormhole, run algorithm to detect Apply wormhole, run algorithm to detect

Results Perturbed grid Perturbed grid p = 0.2 p = 0.2 UDG Quasi-UDG TOSSIM

Random Random TOSSIM UDG Quasi-UDG

100% detecting and no false alarms when network is connected 100% detecting and no false alarms when network is connected 90% detection when 50% chance disconnected 90% detection when 50% chance disconnected Detection drop for low density cases, but network disconnected also increase Detection drop for low density cases, but network disconnected also increase Detection performance get worse as the randomness Detection performance get worse as the randomness Estimation of is more accurate if less randomness Estimation of is more accurate if less randomness

1 -hop dose not perform well in non-UDG cases 1 -hop dose not perform well in non-UDG cases Quasi-UDG, random distribution Quasi-UDG, random distribution 1-hop detection rate when increase 1-hop detection rate when increase

Parametric search for Parametric search for k = 1, quasi-UDG, Perturbed grid with p = 0.2, average degree = 6 k = 1, quasi-UDG, Perturbed grid with p = 0.2, average degree = 6 Suitable can be estimated by observing false positive probability Suitable can be estimated by observing false positive probability Detection show first before false positive Detection show first before false positive Critical value of is 4 Critical value of is 4

Conclusion Pros Pros Simple and localized Simple and localized Universal to node distribution and communication model Universal to node distribution and communication model Cons Cons Not suitable for frequent connectivity change (VANET, MANET) Not suitable for frequent connectivity change (VANET, MANET) Can not detect short wormhole link Can not detect short wormhole link

References R. Maheshwari, J. Gao and S. R. Das,“Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information,” in INFOCOM th IEEE International Conference on Computer Communications. IEEE, 2007, pp R. Maheshwari, J. Gao and S. R. Das,“Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information,” in INFOCOM th IEEE International Conference on Computer Communications. IEEE, 2007, pp Wikipedia ( Wikipedia ( Wormhole Attack Detection in Wireless Network ( Wormhole Attack Detection in Wireless Network (

Any Questions ? and Thanks !!