An Algebraic Watchdog for Wireless Network Coding MinJi Kim † Joint work with Muriel Médard †, João Barros ‡, Ralf Kötter * † Massachusetts Institute of.

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Distributed Assignment of Encoded MAC Addresses in Sensor Networks By Curt Schcurgers Gautam Kulkarni Mani Srivastava Presented By Charuka Silva.
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 12 ERROR DETECTION & CORRECTION.
XORs in The Air: Practical Wireless Network Coding
Error Control Code.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
Intrusion Detection for Black Hole and Gray Hole in MANETs.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Network Coding Testbed Using Software-Defined Radio Abstract In current generation networks, network nodes operate by replicating and forwarding the packets.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Network Coding and Reliable Communications Group A Multi-hop Multi-source Algebraic Watchdog Muriel Médard † Joint work with MinJi Kim †, João Barros ‡
Network Coding and Reliable Communications Group Network Coding for Multi-Resolution Multicast March 17, 2010 MinJi Kim, Daniel Lucani, Xiaomeng (Shirley)
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
Exploiting Opportunism in Wireless Networks Aruna Balasubramanian Guest Lecture, CS 653 (Some slides borrowed from the ExOr and MORE presentations at SigComm.
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 20.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Unit 1 Protocols Learning Objectives: Understand the need to detect and correct errors in data transmission.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Correction of Adversarial Errors in Networks Sidharth Jaggi Michael Langberg Tracey Ho Michelle Effros Submitted to ISIT 2005.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
04/06/2016Applied Algorithmics - week101 Dynamic vs. Static Networks  Ideally, we would like distributed algorithms to be: dynamic, i.e., be able to.
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1. Error Detection Techniques:
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
A Distributed Relay-Assignment Algorithm for Cooperative Communications in Wireless Networks ICC 2006 Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department.
DIGITAL COMMUNICATIONS Linear Block Codes
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan Networks and Mobile Systems Group MIT Computer Science and.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Computer Science Division
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling Olaf Landsiedel 1, Euhanna Ghadimi 2, Simon Duquennoy 3, Mikael Johansson 2 1 Chalmers University.
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
Data Link Layer. Data Link Layer Topics to Cover Error Detection and Correction Data Link Control and Protocols Multiple Access Local Area Networks Wireless.
Presented by Abhijit Mondal Haritabh Singh Suman Mondal
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Protocol Layering Chapter 11.
Network Coding and Reliable Communications Group Modeling Network Coded TCP Throughput: A Simple Model and its Validation MinJi Kim*, Muriel Médard*, João.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games William Kozma Jr., and Loukas Lazos Dept. of Electrical and Computer Engineering University.
Survey of Ad Hoc Network Routing Protocols Team Adhocracy Presentation 3 – April 23, 2007 Jason Winnebeck Benjamin Willis Travis Thomas.
MinJi Kim, Muriel Médard, João Barros
Chapter 3: Open Systems Interconnection (OSI) Model
Su Yi Babak Azimi-Sadjad Shivkumar Kalyanaraman
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
ITIS 6010/8010 Wireless Network Security
Witness-based Detection of Forwarding Misbehavior in Wireless Networks
Detecting Denial-of-Service Attacks against Sensor Networks
Data Link Layer: Overview; Error Detection
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Information Sciences and Systems Lab
Presentation transcript:

An Algebraic Watchdog for Wireless Network Coding MinJi Kim † Joint work with Muriel Médard †, João Barros ‡, Ralf Kötter * † Massachusetts Institute of Technology ‡ University of Porto * Technischen Universität München

Background Secure network coding – Network error correction [Yeung et al. 2006] – Resilient coding in presence of Byzantine adversaries [Jaggi et al. 2007] – Signature scheme [Charles et al. 2006][Zhao et al. 2007] – Locating attackers [Siavoshani et al. 2008] – NOTE: downstream nodes check for adversaries, the upstream nodes unaware. Watchdog and pathrater [Marti et al. 2000] – Extensions of Dynamic Source Routing – Detect/mitigate misbehavior of the next node – Use wireless medium: promiscuous monitoring Combine the benefits of network coding and watchdog – Focus on two-hop network

Problem Statement Intended transmission in E 1 Overhearing with noise in E 2 Wireless network G = (V, E 1,E 2 ). – V : Set of nodes in the network – E 1 : Set of hyperedges for connectivity/wireless links – E 2 : Set of hyperedges for interference Transition probability known (Binary symmetric channel) Is v 3 consistent with… Overheard packets from v 2 and v 3 ? Channel statistics?

Problem Statement Intended transmission in E 1 Overhearing with noise in E 2 How can upstream nodes ( v 1 and v 2 ) detect misbehaving node ( v 3 ) with high probability? Routing: Packets individually recognizable Network Coding: Packets are mixed Errors from BSC channel : Probabilistic detection Few bit errors can make dramatic change in the algebraic interpretation

Packet Structure A node v i that receives messages x j ’s and transmits p i – Note: hash is contained in one hop, dependent on in-degree Goal: If v i transmits x i = e + Σ α j x j where e≠0, detect it with high probability. – Even if | e | small, the algebraic interpretation may change dramatically. a j ’sxixi coding coefficients a j ’s coded data x i = Σ α j x j p i = h(x j ) hash of received messages h(x j ) h(x i ) hash of message h(x i ) a j ’sh(x j ) h(x i ) header: protected with error correction codes

Algebraic Analysis v 1 knows: x 1 h(x 1 ) Estimate of x 2 : 2 h(x 2 ) Estimate of x 3 : 3 h(x 3 ) a 1 and a 2 Note: h(x 3 ) and x 3 consistent Errors in a 1 and a 2 translates to errors in x 3

Algebraic Analysis v 1 knows: x 1 h(x 1 ) Estimate of x 2 : 2 h(x 2 ) Estimate of x 3 : 3 h(x 3 ) a 1 and a 2 v 1 computed all “plausible” x 3 Intersect this with all typical x 3 v 1 claims that v 3 is misbehaving if this intersection is empty.

Algebraic Analysis Lemma 1: For n large enough, probability of false detection ≤ ε for any constant ε. – If a neighbor sends valid packets, then the node overhears valid information with noise introduced by the channel only. Lemma 2: P(A malicious v 3 is undetected by v 1 ) is where r i→j is the radius such that the probability that the interference channel/noise from v i to v j is within a ball of radius r i→j is at least 1- ε. Using Lemma 2 (and equivalent result for v 2 ), probability of misdetection is: Prob that v 3 passes v 2 ’s check Prob that v 3 passes v 1 ’s check Number of potential msgs v 3 can send

Graphical Model v 1 knows: x 1 h(x 1 ) Estimate of x 2 : 2 h(x 2 ) Estimate of x 3 : 3 h(x 3 ) a 1 and a 2 Layer 1: ( 2, h(x 2 ) )Layer 2: x 2 hash value: h(x 2 ) Layer 3: x 3 Layer 4: ( 3, h(x 3 ) ) hash value: h(x 3 )a 1 x 1 + a 2 x 2 PermutationChannel Errors

Graphical Model 4 Layers: – Layer 1 & 4: 2 n+h vertices, representing [codeword, hash] pairs – Layer 2 & 3: 2 n vertices, representing codewords Layer 1: ( 2, h(x 2 ) )Layer 2: x 2 Layer 3: x 3 Layer 4: ( 3, h(x 3 ) ) P( x 2 |Channel ∆( 2, x 2 ) & h( x 2 ))P( x 3 |Channel ∆( 2, x 3 ) & h( x 3 )) Compute x 3 given x 2

Graphical Model Start & destination point in Layer 1 and 4: what v 1 overhears. Computes the sum of the product of the weights of all possible paths from start to destination (= the probability that v 3 is consistent) This model illustrates sequentially/visually the inference process. Layer 1: ( 2, h(x 2 ) )Layer 2: x 2 Layer 3: x 3 Layer 4: ( 3, h(x 3 ) )

Summary Probabilistically police downstream neighbors Algebraic analysis: – Exact formulae for probabilities of misdetection and false- detection Graphical model: – Capture inference process – Compute/approximate probabilities of consistency within the network Future Work: – Generalize to multiple sources, multi-hop network – Combine with reputation based protocol and some practical considerations

Extra Slides

Is v 3 behaving? Is v 3 consistent with… Overheard packets from v 1 and v 3 ? Channel statistics? Problem Statement How to fool v 2 ? Insert errors without being noticed? Lie about message from v 1 ?

Two-hop Network Graphical model – Explains the decision process Algebraic analysis – Understand the performance of the protocol

Graphical Model 4 Layers: – Layer 1 & 4: 2 n+h vertices, representing [codeword, hash] pairs – Layer 2 & 3: 2 n vertices, representing codewords

Graphical Model Edges: – [v,u] in Layer 1 to w in Layer 2 iff h(w) = u. Normalized, but edge weight proportional to: – v in Layer 2 to w in Layer 3 iff All edge weights = 1. – v in Layer 3 to [w,u] in Layer 4 iff h(v) = u. Normalized, but edge weight proportional to:

Extensions More than 2 sources: – Generalized graphical model – Use Viterbi-like Algorithm to compute: Most likely path (i.e. set of codewords) Total probability of reaching a linear combination Multi-hop: – As long as not dominated by the adversaries – Hidden terminal problem: the probability of detecting decreases, but still possible.

Future Work Generalize to multiple sources, multi-hop network – Develop models/framework (cascading graphical model?) Develop inference methods/approximation algorithms to efficiently make decision regarding malicious neighbors Combine with reputation based protocol and some practical considerations Eventually, develop/analyze a protocol which allows nodes to probabilistically verify and locally police their neighbors (especially downstream) – Self-checking network