T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering.

Slides:



Advertisements
Similar presentations
Using Cramer-Rao-Lower-Bound to Reduce Complexity of Localization in Wireless Sensor Networks Dominik Lieckfeldt, Dirk Timmermann Department of Computer.
Advertisements

Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Movement-Assisted Sensor Deployment Author : Guiling Wang, Guohong Cao, Tom La Porta Presenter : Young-Hwan Kim.
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
Energy Aware Self Organized Communication in Complex Networks Jakob Salzmann, Dirk Timmermann SPP 1183 Third Colloquium Organic Computing, ,
Mobility Improves Coverage of Sensor Networks Benyuan Liu*, Peter Brass, Olivier Dousse, Philippe Nain, Don Towsley * Department of Computer Science University.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
SMART: A Scan-based Movement- Assisted Sensor Deployment Method in Wireless Sensor Networks Jie Wu and Shuhui Yang Department of Computer Science and Engineering.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
Vikramaditya. What is a Sensor Network?  Sensor networks mainly constitute of inexpensive sensors densely deployed for data collection from the field.
SOS: A Safe, Ordered, and Speedy Emergency Navigation Algorithm in Wireless Sensor Networks Andong Zhan ∗ †, Fan Wu ∗, Guihai Chen ∗ ∗ Shanghai Key Laboratory.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering.
Using Rotatable and Directional (R&D) Sensors to Achieve Temporal Coverage of Objects and Its Surveillance Application You-Chiun Wang, Yung-Fu Chen, and.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Dynamic Coverage Enhancement for Object Tracking in Hybrid Sensor Networks Computer Science and Information Engineering Department Fu-Jen Catholic University.
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Optimal Power Control, Rate Adaptation and Scheduling for UWB-Based Wireless Networked Control Systems Sinem Coleri Ergen (joint with Yalcin Sadi) Wireless.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Delay-Throughput Tradeoff with Correlated Mobility in Ad-Hoc Networks Shuochao Yao*, Xinbing Wang*, Xiaohua Tian* ‡, Qian Zhang † *Department of Electronic.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
1 Virtual Patrol : A New Power Conservation Design for Surveillance Using Sensor Networks Prasant Mohapatra, Chao Gui Computer Science Dept. Univ. California,
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
SIMPLE: Stable Increased Throughput Multi-hop Link Efficient Protocol For WBANs Qaisar Nadeem Department of Electrical Engineering Comsats Institute of.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Query Aggregation for Providing Efficient Data Services in Sensor Networks Wei Yu *, Thang Nam Le +, Dong Xuan + and Wei Zhao * * Computer Science Department.
1 VISA: Virtual Scanning Algorithm for Dynamic Protection of Road Networks IEEE Infocom’09, Rio de Janeiro, Brazil Jaehoon Jeong (Paul), Yu Gu, Tian He.
Design of Technical Condition Monitoring System of Vehicle Based on CAN Bus Authors : Ruili Zeng, Yunkui Xiao Department of Automobile Engineering Academy.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Data Transmission Mechanism for Multiple Gateway System Xuan He, Yuanchen Ma and Mika Mizutani, 6th International Conference on New Trends in Information.
IPSN 2012 Yu Wang, Rui Tan, Guoliang Xing, Jianxun Wang, and Xiaobo Tan NSLab study group 2012/07/02 Reporter: Yuting 1.
Simulation of DeReClus Yingyue Xu September 6, 2003.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k ≦ 6) Wireless Sensor Networks Xiaole Bai, Dong Xuan, Ten H. Lai, Ziqiu Yun,
SenSys 2003 Differentiated Surveillance for Sensor Networks Ting Yan Tian He John A. Stankovic Department of Computer Science, University of Virginia November.
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
1 On Detection and Concealment of Critical Roles in Tactical Wireless Networks Zhuo Lu University of Memphis Cliff Wang Army Research Office Mingkui Wei.
Location-Centric Storage for Wireless Sensor Networks Kai Xingn 1, Xiuzhen Cheng 1, and Jiang Li 2 1 Department of Computer Science, The George Washington.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Energy-Aware Target Localization in Wireless Sensor Networks Yi Zou and Krishnendu Chakrabarty IEEE (PerCom’03) Speaker: Hsu-Jui Chang.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Deploying Sensors for Maximum Coverage in Sensor Network Ruay-Shiung Chang Shuo-Hung Wang National Dong Hwa University IEEE International Wireless Communications.
KAIS T Sensor Deployment Based on Virtual Forces Reference: Yi Zou and Krishnendu Chakarabarty, “Sensor Deployment and Target Localization Based on Virtual.
2016/3/13 1 Peer-to-peer system-based active worm attacks: Modeling, analysis and defense Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan Computer Communications.
/ 24 1 Deploying Wireless Sensors to Achieve Both Coverage and Connectivity Xiaole Bai Santosh Kumar Dong Xuan Computer Science and Engineering The Ohio.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Efficient distribution of An infrastructure Cluster network under constraints Ben Gurion University, Communication System Engineering Department, Faculty.
Power-Aware Topology Control for Wireless Ad-Hoc Networks Wonseok Baek and C.-C. Jay Kuo Department of Electrical Engineering University of Southern California.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 1 Sriram Chellappan, Xiaole Bai, Bin Ma ‡ and Dong Xuan Presented by Sriram.
The (k, l) Coredian Tree for Ad-Hoc Networks Department of Communication Systems Engineering, Ben-Gurion University of the Negev, 2008 Vladimir Katz Alex.
On the Lifetime of Wireless Sensor Networks
Military Aircraft Systems
Defending against Search-based Physical Attacks in Sensor Networks
                                                                                                            Network Decoupling for Secure Communications.
                                                                                                            Network Decoupling for Secure Communications.
SEP routing protocol in WSN
Dong Xuan Department of Computer Science and Engineering
Distributed Minimum-Cost Clustering for Underwater Sensor Networks
Dong Xuan*, Sriram Chellappan*, Xun Wang* and Shengquan Wang+
Presentation transcript:

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Xun Wang †, Sriram Chellappan †, Wenjun Gu †, Wei Yu ‡ and Dong Xuan † Presented by Xun Wang † Department of Computer Science and Engineering The Ohio State University ‡ Department of Computer Science Texas A & M University Xun Wang †, Sriram Chellappan †, Wenjun Gu †, Wei Yu ‡ and Dong Xuan † Presented by Xun Wang † Department of Computer Science and Engineering The Ohio State University ‡ Department of Computer Science Texas A & M University Search-based Physical Attacks in Sensor Networks

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 2 Physical Attacks are Salient Threats to Sensor Networks Sensor network applications that operate in hostile environments –Volcanic monitoring –Battlefield applications –Anti sensor network forces Physical attacks are inevitable in sensor networks –Physical attacks: destroy sensors physically –Simple to launch Small form factor of sensors Unattended and distributed nature of deployment –Can be fatal to sensor networks –Different from other types of electronic attacks We study impacts of different types of physical attacks and the countermeasures.

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 3 Outline Physical Attacks in sensor networks Modeling Search-based physical attacks Performance evaluations Countermeasures to Physical Attacks Final remarks

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 4 Physical Attacks – A General Description Two phases –Targeting phase –Destruction phase Two broad types of physical attacks –Blind physical attacks –Search-based physical attacks

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 5 Blind Physical Attacks Targeting phase –Identifying the sensor network deployment field Destruction phase –Randomly/ blindly selecting attack area –Brute-force physical destruction with bombs/grenades or tanks/vehicles –Sensors in the attack area are destroyed Features –Fast –Not accurate due to blind destruction –Larger causalities to deployment field Xun Wang, W. Gu, S. Chellappan, K. Schosek and D. Xuan, Lifetime Optimization of Sensor Networks under Physical Attacks, IEEE International Conference on Communications (ICC), 2005 Lifetime Optimization of Sensor Networks under Physical Attacks

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 6 Search-Based Physical Attacks Targeting phase –Searching for sensors by detecting signals emitted by sensors (heat, magnetic and electronic signals) –Isolating an area for each detected sensor Destruction phase –Reaching the isolation area of each detected sensor –Destroying small size sensors through physical destruction methods (like physical force, radiation, hardware/circuit tampering)--sweeping Features –Slow –Accurate destruction of only isolated area –Better preserves the deployment field (airports, oil fields, battlefield). It can be an important agenda for the attacker. In extreme cases, the enemy of the attacker can deploy sensor networks in the attacker’s land and the attacker needs to remove the sensors while preserving the land.

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 7 Modeling of Search-based Physical Attacks Sensor network signals –Passive signal and active signal –Signals and roles in hierarchical sensor networks (normal sensors and cluster-heads) Attacker capacities –Signal detection and sensor Isolation –Attacker movement –Sensor destruction method Attack Model –Attacker objective –Attack procedure and scheduling

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 8 Network Parameters and Attacker Capacities f: Active signal frequency μ: Cluster-head rotation frequency C: Cluster size R ps : The maximum distance can detect a passive signal R as s : The maximum distance can detect an active signal emitted by a normal sensor R as h : The maximum distance can detect an active signal emitted by a cluster-head θ: Isolation accuracy –r i =d i θ –Isolation/sweeping area: Bi=πr i 2 V mv : Attacker moving speed V sw : Attacker sweeping speed

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 9 Attacker objective and attack procedure AC: Accumulative Coverage –EL: Effectively Lifetime is the time period until when the sensor network becomes nonfunctional because the coverage falls below a certain threshold α –Coverage(t): Instant network coverage at time t Objective: Decrease AC.

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 10 Attacker Activity Scheduling Scheduling of the movement when there are multiple detected sensors –In our model, the attacker chooses the one that it needs to spend least time to reach and destroy (finish the sweeping of isolation area) –Optimal scheduling? –Due the dynamics of the attack process, it is hard to get the optimal path in advance Tradeoff between attacking normal sensors first and cluster-heads first –Attacking cluster-heads causes larger damage to coverage but might take longer time –Weighted selection: combine the time cost and the weight of detected sensors –PA/H (larger weights for cluster-heads) v.s. PA/NH (same weights)

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 11 Sensitivity to Attacker Capacities

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 12 Sensitivity to Sensor Network Parameters

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 13 Sensitivity to Sensor Network Parameters

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 14 Countermeasures to Physical Attacks For Blind physical attacks –Optimally over-deploying sensors to prolong lifetime of sensor networks under blind physical attacks For Search-based physical attacks –Deterring the search process (at the target phase) ┼Physically protecting sensors

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 15 Defending Sensor Networks against Search-based Physical Attacks Adopting Sacrificial Nodes (sensors) to improve monitoring of the attacker and to increase the protection areas provided by Attack Notifications. –A sacrificial node is one that detects the attacker in order to protect other sensors at the risk of itself being detected and destroyed by the attacker. –Attack Notifications from victim sensors. –States Switching of receiver sensors of Attack Notifications to reduce the number of detected sensors. –Trade short term local coverage for long term global coverage. W. Gu, Xun Wang, S. Chellappan, D. Xuan and T. H. Lai, Defending against Search-based Physical Attacks in Sensor Networks, accepted by IEEE Mobile Sensor and Ad-hoc and Sensor Systems (MASS) 2005.Defending against Search-based Physical Attacks in Sensor Networks

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 16 Final Remarks Physical attacks are patent and potent threats to sensor networks. We modeled Search-based Physical attack and analyzed its impacts to sensor networks in this paper. Viability of future sensor networks is contingent on their ability to defend against physical attacks.

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 17 Q&A Thank You !