An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Revocation Mechanisms for Hybrid Group Communication with Asymmetric Links Abstract Wildcard identity-based encryption (IBE) provides an effective means.
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
By Md Emran Mazumder Ottawa University Student no:
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Secure and Trustworthy Data Management for Vehicular Cyber Physical Systems Dr. Wenjia Li Assistant Professor in Computer Science New York Institute of.
fine-grained reputation-based routing in wireless ad hoc networks
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
By Onolaja Olufunmilola. Overview Introduction Motivation Trust, reputation and misbehaivour Literature review DDDAS Model description Applications Evaluation.
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
1 APPLICATION OF DDDAS FOR TRUSTED COMMUNICATION IN MOBILE NETWORKS. Onolaja Olufunmilola Supervisors: Dr Rami Bahsoon, Dr Georgios Theodoropoulos.
Selective Forwarding Attack: Detecting Colluding Nodes in Wireless Mesh Networks Shankar Karuppayah National Advanced IPv6 Centre (NAv6) Universiti Sains.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
A Study on Certificate Revocation in Mobile Ad Hoc Networks Wei Liu,Hiroki Nishiyama,Nirwan Ansari & Nei Kato ICC 2011 Nadia Adem 10/27/2014.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
EAACK—A Secure Intrusion-Detection System for MANETs
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Veronica Eyo Sharvari Joshi. The nodes are left unattended An Adversary can physically compromise the nodesSolution?  Authentication and cryptographic.
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
High-integrity Sensor Networks Mani Srivastava UCLA.
Secure In-Network Aggregation for Wireless Sensor Networks
Ad Hoc Network.
Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
Fault Tolerant Routing in Mobile Ad hoc Networks Yuan Xue and Klara Nahrstedt Computer Science Department University of Illinois.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Presented by Edith Ngai MPhil Term 3 Presentation
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Giannis F. Marias, Vassileios Tsetsos,
Ad-hoc Transport Layer Protocol (ATCP)
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Cross-layer Analysis for detecting Wireless Misbehavior
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Presentation transcript:

An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science The University of Birmingham, UK

2/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09 Outline Introduction Definitions Motivation Review of current research and problems Collusion attack Proposed solution Possible real life applications Summary

3/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09 Introduction Ad hoc and wireless sensor networks have gained popularity in recent years and have been used in critical applications. Applications such as Military and security monitoring, Traffic regulation, Human tracking and monitoring, Battlefield surveillance etc

4/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09 Introduction The use of the networks in the applications leads to the misbehaviour among nodes. Misbehaviour makes the differentiating between normal and malicious network operations difficult. Problem further complicated due to nature of these networks Mobility Limited transmission power Dynamic formulation

5/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09 Definitions Trust Gambetta (1988) stated that when a node is trusted, it implicitly means that the probability that it will perform an action that is beneficial or at least not detrimental in the network is high enough to consider engaging in some form of cooperation with the node. Each node has a Trust Value. Reputation The opinion of an entity about another; it is the trustworthiness of a node. Synonymous to trust? Misbehaviour Behavioural expectation ↔ Social perspective The deviation from the expected behaviour of nodes in a network. For example, in a network, a node is said to be misbehaving when it deviates from the regular routing and forwarding of packets. Collusion attack.

6/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09 Motivation Despite the existing security paradigms, such as Public Key Infrastructure (PKI): inadequate Reputation and Trust Based Systems (RTBSs): collusion attacks the assurance of security still remains a problem. The problems that arise due to the dynamic nature of ad hoc and sensor (dynamic) networks, calls for an equally dynamic approach to identifying and isolating misbehaving nodes.

7/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09 Reputation and Trust Based Systems Node Cooperation Enforcement: CORE, CONFIDANT - Michiardi et al (IFIP 2002), Buchegger et al (MOBIHOC 2002) Incentive Based Scheme: SORI - He et al (WCNC 2004) Trust Enhanced Model: SMRTI - Balakrishnan at al (AINA 2007) High Integrity Networks Framework: RFSN - Ganeriwal et al (ACM TSN 2008) Promiscuous observation: each node overhears the transmission of neighbouring nodes to detect misbehaviour. This mechanism has a weakness of failing to detect misbehaving nodes in the case of collusion. Recommendations provided by individual nodes in the network are used in deciding the reputation of other nodes. Watchdog is resident on each node that monitors and gathers information based on promiscuous observation. Marti et al (MOBICOM 2000)

8/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09 Collusion Attack Suppose node A forwards a packet P through B to D. Node C can decide to misbehave and B colludes with C. With the watchdog mechanism, it is possible that B does not report to A when C modifies the packet to P#. The problem of collusion is very important because its effects can considerably affect network performance and may hinder communication vital to fulfilling of the mission of ad hoc and sensor networks. Liu et al (IEEE 2004) D ABC PPP#

9/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09 Proposal -DDDAS Proposal - DDDAS DDDAS (Dynamic Data-Driven Application Systems – is a paradigm whereby applications and measurements become a symbiotic feedback control system. The paradigm promises to provide more accurate analysis and prediction, more precise controls, and more reliable outcomes. This entails the ability to dynamically incorporate additional data into an executing application, and in reverse, the ability of an application to dynamically steer the measurement process. This entails the ability to dynamically incorporate additional data into an executing application, and in reverse, the ability of an application to dynamically steer the measurement process. Real life Simulation

10/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09 Proposal -DDDAS Proposal - DDDAS How? The concepts of the paradigm are applied in building a dynamic reputation system. This paper proposes the use of the DDDAS components: measurement, simulation, feedback, control. The online data obtained is used to gain a better understanding and more accurate prediction of node behaviour: Simulation. The simulation continually incorporates new measurements at runtime for the system to accurately determine and update the trust values. Why DDDAS? The dynamic nature of mobile and sensor networks require a dynamic approach to identifying and isolating misbehaving or malicious nodes. Which DDDAS provides.

11/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09 Proposed Solution Solution addresses collusion attacks because nodes do not directly determine the reputation of other nodes in the network. High-level diagram of architecture Online and historical behaviour Simulation Feedback Prediction

12/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09Applications Criminal and terrorist monitoring; Military applications; Femtocells deployment.

13/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09Summary Discussed a pending problem of reputation and trust based models and how the DDDAS approach can fill the gaps. A dynamic architecture for addressing the problem of collusion among nodes. Model provides a high level of dynamism to reputation systems by updating the trust values of nodes at runtime. Not only useful at the network level but at a higher level and will allow for making informed decisions. Future Work Real life application of model – combating crime and criminal monitoring; Tests through simulation of model to ascertain its effectiveness in addressing collusion; Ensuring identity persistence.

14/14 Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos MONET, Algarve, PortugalNov-09 Thank you. Questions??? ‘Funmi Onolaja