Lower-Layer Security in Mobility Yih-Chun Hu. Wireless Physical Layer Security The problem: prevent the jamming of broadcast to a group of nodes, some.

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
A feedback–based scheme for improving TCP performance in Ad Hoc Wireless Networks Group : Manish Mehta Aditya Barve.
1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
How to Design Wireless Security Mechanisms Manel Guerrero Zapata Mobile Networks Laboratory Nokia Research Center.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Wireless Communication Networks Tzu-Chieh Tsai Department of Computer Science National Cheng-Chi University.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Distributed Sensing and Data Collection Via Broken Ad Hoc Wireless Connected Networks Mobile Robots By Alan FT Winfield Presented By Navpreet Bawa.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
2002 MURI Minisymposium Cooperative Control of Distributed Autonomous Vehicles in Adversarial Environments 2002 MURI Minisymposium Ameesh Pandya Prof.
Key management in wireless sensor networks Kevin Wang.
Security in MobileIP Fahd Ahmad Saeed. Wireless Domain Problem Wireless domain insecure Data gets broadcasted to everyone, and anyone hearing this can.
Layered Approach using Conditional Random Fields For Intrusion Detection.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
1 Secure Ad-Hoc Network Eunjin Jung
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
ION/GNSS 2011, 23 Sept Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Developing Defenses Against Jamming & Spoofing.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
 Leaf test codes are secure sine they would not be jammed by jammers.  When few normal users are present, many leaf code tests are wasted since absent.
Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing (ICDCS ‘10) Qi Dong and Donggang Liu Presented by Ying Xuan.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Mangai Vetrivelan Snigdha Joshi Avani Atre. Sensor Network Vulnerabilities o Unshielded Sensor Network Nodes vulnerable to be compromised. o Attacks on.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Random Key Predistribution Schemes for Sensor.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Rajani Muraleedharan and Lisa Ann Osadciw By: Mai Ali Sayed Ahmed.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Protocol Security for Wireless Networks Yih-Chun Hu Illinois Center for Wireless Systems.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
Dynamic Jamming Mitigation for Wireless Broadcast Networks Jerry T. Chiang Yih-Chun Hu 2007.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
COSC 6590 Fall Multi-channel, multi-radio wireless networks.
Patent technology for USN Jinho Son Real-Time System Lab.
Network Security Lab Jelena Mirkovic Sig NewGrad presentantion.
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
Introduction Wireless devices offering IP connectivity
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Multi-channel, multi-radio wireless networks
CSE 4905 Network Security Overview
Faloutsos: My Areas of Research
Mobile ad hoc networking: imperatives and challenges
Qi Dong and Donggang Liu Presented by Ying Xuan
Multi-channel, multi-radio
4/26/2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Secure Ranging] Date Submitted: [19 September.
Information Sciences and Systems Lab
Presentation transcript:

Lower-Layer Security in Mobility Yih-Chun Hu

Wireless Physical Layer Security The problem: prevent the jamming of broadcast to a group of nodes, some of which are malicious – Without malicious nodes, use spread spectrum – Unicast doesn’t have malicious nodes The underlying mechanism: – Spread spectrum takes a data and a key – Spreads the data across the spectrum using the key – Anyone who doesn’t have the key is at a substantial disadvantage for jamming

Elements to a Solution Key distribution: – Similar to multicast key distribution – Use a binary tree scheme Detection: – Use multiple keys simultaneously – If one key is received and another is not, suspect jamming – Detection code set must be random [Chiang and Hu, “Extended Abstract: Cross-Layer Jamming Mitigation,” MobiCom 2007]

Tree Coding Strategy Cover Probe Codes Jamming Detected

Theoretical Results Finite number of successful jamming attempts until the attacker can no longer jam Size of the cover: – Naïve Approach: n codes – Basic Tree Scheme: j log n codes – With “Remerging”: 2 j codes – Best Possible: j +1 codes

Simulation Results 50 nodes, equal-power base station and jammers

Mobility: The Next Step Jamming is not only a physical-layer problem: – Even with perfect strategy, jammers can still cause substantial loss – Near-far problem in real environments increases jammer’s ability to cause loss Jamming-induced loss at the network layer: – Route to bypass jammed areas – Increased mobility: more frequent neighbor change (Near-far problem is only a problem when the attacker is near)