By Onolaja Olufunmilola. Overview Introduction Motivation Trust, reputation and misbehaivour Literature review DDDAS Model description Applications Evaluation.

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
fine-grained reputation-based routing in wireless ad hoc networks
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Wireless Sensor Network Security Anuj Nagar CS 590.
1 APPLICATION OF DDDAS FOR TRUSTED COMMUNICATION IN MOBILE NETWORKS. Onolaja Olufunmilola Supervisors: Dr Rami Bahsoon, Dr Georgios Theodoropoulos.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Seminar on Internetworking: Routing - from baseline to state-of-the-art Topic proposals Zheng Yan Nokia Research Center
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Trust-based Multi-Objective Optimization for Node-to-Task Assignment in Coalition Networks 1 Jin-Hee Cho, Ing-Ray Chen, Yating Wang, and Kevin S. Chan.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
A Study on Certificate Revocation in Mobile Ad Hoc Networks Wei Liu,Hiroki Nishiyama,Nirwan Ansari & Nei Kato ICC 2011 Nadia Adem 10/27/2014.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
EAACK—A Secure Intrusion-Detection System for MANETs
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
Advanced Computer Networking Course Overview 1. This is a graduate-level course which covers advanced topics in computer networks including current hot.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Reporter: Yanlin Peng Wenrui Zhao, Mostafa Ammar, College of Computing,
High-integrity Sensor Networks Mani Srivastava UCLA.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Measuring reputation in Testbeds Chrysa Papagianni, Symeon Papavassiliou National Technical University of Athens.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Enabling QoS Multipath Routing Protocol for Wireless Sensor Networks
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Mobile ad hoc networking: imperatives and challenges
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Cross-layer Analysis for detecting Wireless Misbehavior
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Presentation transcript:

By Onolaja Olufunmilola

Overview Introduction Motivation Trust, reputation and misbehaivour Literature review DDDAS Model description Applications Evaluation Publications Future work

Introduction Ad hoc and wireless sensor networks have gained popularity in recent years. Security is very important in these networks because sensor nodes have recently been developed for mission critical environments, such as,  Military and security monitoring,  Wildfire detection,  Human tracking and monitoring,  Land mine detection,  Battlefield surveillance and  Traffic regulation. The nature of these networks, such as node mobility, limited transmission power and dynamic formulation has led to the exposure to problems caused by misbehaving nodes in the network.

Motivation Previous researches have suggested the use of Public Key Infrastructure (PKI) and other security mechanisms, which require a lot of computation. They however, have been ineffective because of the inherent properties of nodes –  Limited computation,  Battery power and  Storage capabilities. Some proposed Reputation and Trust-Based Systems (RTBSs). While trying to solve security issues, the RTBSs introduce other problems.

Motivation The dynamic and volatile nature of mobile wireless networks makes it difficult to differentiate between normal and malicious network operations. This therefore, calls for an equally dynamic approach to identifying and isolating misbehaving nodes. – DDDAS (Dynamic Data Driven Application Systems)

Trust, reputation and misbehaivour When a node is said to be trusted, it implicitly means that the probability that it will perform an action or behave in a way that is beneficial or at least not detrimental in the network is high enough to consider engaging in some form of cooperation with the node [Gam88]. Reputation on the other hand, is the opinion of an entity about another; it is the level of trustworthiness of a node.

Trust, reputation and misbehaivour The difference between trust and reputation is that trust is active because it is a node’s belief in another node. On the other hand, reputation is passive because it is the perception that is formed by different nodes about a particular node. [AD06]

Trust, reputation and misbehaivour A node is said to be misbehaving when it deviates from the expected behaviour of nodes. Misbehaviour among nodes can either be in terms of routing or forwarding.  packet dropping  modification  fabricate

Literature Review Node Cooperation Enforcement CORE CONFIDANT MANETs Trust Enhanced Model High Integrity Networks FrameworkWSNs Event Based Framework Node Cooperation Enforcement CORE CONFIDANT MANETs Trust Enhanced Model High Integrity Networks FrameworkWSNs Event Based Framework

Summary table of reputation and trust models

Literature Review The models are plagued with outstanding issues because while they try to solve the problems, they introduce other problems into the network. Some outstanding problems include: Collusion attacks  Watchdog mechanism Lack of dynamism False praise and accusations Identity persistence The models are plagued with outstanding issues because while they try to solve the problems, they introduce other problems into the network. Some outstanding problems include: Collusion attacks  Watchdog mechanism Lack of dynamism False praise and accusations Identity persistence

Collusion Attack Using packet modification attack as an example: Suppose node A forwards a packet P through B to D, node C can decide to misbehave and B colludes with C. With the watchdog mechanism, it is possible that B does not report to A when C modifies the packet to P#.

Collusion Attack The problem of collusion is very important because its effects can considerably affect network performance and may hinder communication vital to fulfilling of the mission of ad hoc and sensor networks. [LJT04]

Why DDDAS? The highly dynamic and volatile nature of adhoc and sensor networks calls for an equally dynamic approach to identifying problems. The DDDAS paradigm is a novel approach of symbiotic relation between applications or simulations. In this paradigm, applications can accept and respond dynamically to new data injected into an executing application, and in reverse, such application systems have the ability to dynamically control the measurement processes.

Why DDDAS? The simulation can make predictions about an entity regarding how it will change and what its future state will be. The simulation is then continuously adjusted (feedback) with data gathered from the entity (measurement). Current researches in DDDAS focus on simulations of physical/artificial/social entities.  weather and climate prediction,  disaster recovery,  traffic management etc The paradigm offers the promise of improving modeling methods, and augmenting the analysis and prediction capabilities of application simulations

Model Description a. The concepts of the paradigm are applied to build a reputation system to address the issue of collusion among nodes, b. The dynamic data obtained is used to gain a better understanding and more accurate prediction of the level of trust, c. Incorporate the DDDAS paradigm to dynamically measure, simulate and control run-time behaviour, d.The simulation dynamically measures trust levels to determine the reputation of each node and will continually incorporate new measurements at runtime for the system to accurately determine and update the TVs.

Model Description In order to provide more secure networks (in terms of trusted communication, there are some requirements: Firstly, there is a requirement for monitoring the behaviour of nodes at runtime and providing feedback to the reputation system. Prediction of node behaviour, in order to have a more proactive approach to the detection of malicious members is another requirement. The DDDAS paradigm makes provisions to meet these requirements. Application of the concepts of the paradigm in our model provides dynamism in the detection of malicious nodes and prediction of future behaviour of each node.

Model Description

Trust Formulation tv new = (tv h +(w * tv o )) t w + 2 tv f = Σ(tv h ) + tv o n tv o = a * Σ (tv h ) n

Possible Applications  Criminal and terrorist monitoring  Military applications  Femtocells deployment

Evaluation The research objectives listed below will be evaluated. 1. Dynamic changes to ratings of nodes at runtime; 2. Predict the future behaviour of nodes; 3. Propose a framework, adaptable in different applications; 4. Detect misbehaving nodes using the simulation system. The research questions to be answered are: How useful is the DDDAS paradigm in providing security in a network? To what extent will the framework support dynamism? How dynamic is node trust rating? How accurate is the trust rating prediction? How applicable is the model in different network scenarios and applications? Has the semi-distributed architecture improved security?

Evaluation The tools identified for use in the evaluation stage are:  The ns-2 is a discrete event simulator targeted at networking research. The simulator will be used extensively for evaluation. The simulator will consist of a certain number of nodes in a specified space and simulation time.  ATAM is a technique for evaluating architectures, identifying risks and improving on architectures. Rigorous tests will be carried out using analysis and simulations. The model will be evaluated in terms of its effectiveness in achieving a better overall security. The success of the work will be based on fulfilling the objectives outlined and contributing to the body knowledge by proposing a dynamic framework for more secure (trusted) mobile networks.

Publication I will be attending the MObile and NEtworking Technologies for social applications (MONET09) workshop. The accepted paper - An Architecture for Dynamic Trust Monitoring in Mobile Networks will be presented, a copy is attached to this report. The final proceedings will be published by Springer Verlag as LNCS.

References [Gam88] D. Gambetta. Can we trust? Basil Blackwell, trust: making and breaking cooperative relations edition, [AD06] W. J. Adams and N. J. Davis. Tms: A trust management system for access control in dynamic collaborative environments. In Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference, volume 2006, pages 143 – 150, [Dou08] C. Douglas. Dynamic data driven applications systems - dddas In ICCS (3), pages 3 – 4, [LJT04] Z. Liu, A.W. Joy, and R.A. Thompson. A dynamic trust model for mobile ad hoc networks. In 10 th IEEE International Workshop on Future Trends of Distributed Computing Systems, pages 80 – 85, [MM02] P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced Communications and Multimedia Security, volume 100 of International Federation for Information Processing, pages 107–121, [BLB02] S. Buchegger and J.Y. Le Boudec. Performance analysis of the confidant protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks). In Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc, pages 226–36, [HWK04] Q. He, D.P. Wu, and P. Khosla. Sori: A secure and objective reputation-based incentive scheme for ad-hoc networks. In Proc. WCNC Wireless Communications and Networking Conference 2004 IEEE, volume 2 of IEEE Wireless Communications and Networking Conference, pages 825–30, [BVLT07] V. Balakrishnan, V. Varadharajan, P. Lucs, and U.K. Tupakula. Trust enhanced secure mobile ad-hoc network routing. In Advanced Information Networking and Applications Workshops AINAW’07, volume 1, pages 27 – 33, [GBS08] S. Ganeriwal, L. K. Balzano, and M. B. Srivastava. Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks, 4(3):15:1 – 37, [CWHG08] H. Chen, H. Wu, J. Hu, and C. Gao. Event-based trust framework model in wireless sensor networks. In IEEE International Conference on Networking, Architecture, and Storage, pages 359 – 364, 2008.