Secure Location Verification Using Radio Broadcast Adnan Vora, Mikhail Nesterenko 4/27/04.

Slides:



Advertisements
Similar presentations
Implementation and Verification of a Cache Coherence protocol using Spin Steven Farago.
Advertisements

Chris Karlof and David Wagner
SOME OF THE MOST COMMON TESTING MISTAKES MADE BY TECHNICIANS PERFORMING VERIFICATIONS TO CAN/ULC The reason I know some of them is because I have.
Dynamic Location Discovery in Ad-Hoc Networks
Transmission Power Control in Wireless Sensor Networks CS577 Project by Andrew Keating 1.
4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Mikhail Nesterenko Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari.
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
Range-Based and Range-Free Localization Schemes for Sensor Networks
Drilling Engineering Prepared by: Tan Nguyen Drilling Engineering - PE 311 Modeling of Drilling Drill Bits.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Key Technology Overview. All PIR is not Created Equal… Sensors are fine-tuned at the factory for optimum detection for its coverage pattern – no PIR sensitivity.
My first aperosentation 9/6/2008 Marios Karagiannis.
Providing Locality Information to Smart Sensor Networks Tim Mead Supervisor: Charles Greif.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Results Showing the potential of the method for arbitrary networks The following diagram show the increase of networks’ lifetime in which SR I =CR I versus.
LSRP: Local Stabilization in Shortest Path Routing Anish Arora Hongwei Zhang.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
TPS: A Time-Based Positioning Scheme for outdoor Wireless Sensor Networks Authors: Xiuzhen Cheng, Andrew Thaeler, Guoliang Xue, Dechang Chen From IEEE.
25/6/2007 High Speed Digital Lab George Ghantous, Husam Khshaiboun 1 Cellular Activity Detection & Identification MidTerm Presentation Supervised By: Yossi.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
1 A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, and.
Introducing The Revolutionary ENSA  EN ergy SA ving Automated Wireless Light Switch A World First For The Security Industry By Making Alarm Sensors Dual.
BluEyes Bluetooth Localization and Tracking Ei Darli Aung Jonathan Yang Dae-Ki Cho Mario Gerla Ei Darli Aung Jonathan Yang Dae-Ki Cho Mario Gerla.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
August 21, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Scalable and Fully Distributed Localization With Mere Connectivity.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Algorithms for Wireless Sensor Networks Marcela Boboila, George Iordache Computer Science Department Stony Brook University.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Detection, Classification and Tracking in a Distributed Wireless Sensor Network Presenter: Hui Cao.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Branislav Kusy, Christian Richter, Wen Hu, Mikhail Afanasyev, Raja Jurdak, Michael Brunig, David Abbott,
Ad Hoc Network.
Void Traversal for Guaranteed Delivery in Geometric Routing
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
C. Savarese, J. Beutel, J. Rabaey; UC BerkeleyICASSP Locationing in Distributed Ad-hoc Wireless Sensor Networks Chris Savarese, Jan Beutel, Jan Rabaey.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
NDSS 2004Hu and Evans, UVa1 Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans [lingxuan, Department.
Tracking Mobile Nodes Using RF Doppler Shifts
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Packet Leashes: Defense Against Wormhole Attacks
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors
Indoor Navigation Using a Wireless Sensor Network
Secure Location Verification and Stabilization
Secure Verification of Location Claims
Resilient Aggregation in Sensor Networks
Team North Star + Lockheed Martin
Presentation transcript:

Secure Location Verification Using Radio Broadcast Adnan Vora, Mikhail Nesterenko 4/27/04

The Problem You want to turn on the lights in a room You seek access to the light switch The switch requires you to be physically present in the room in order to turn it on The switch verifies your presence in the room by requiring you to touch it in order to operate it Wireless equivalent? –Not so easily accomplished

The Problem In Wireless networks, presence cannot be so easily verified –Assumption: No GPS etc. –Resources/hardware not sophisticated enough to triangulate etc. Need a solution that is simple, yet accurate

Problem Statement Setup –Arbitrary protection zone –Potentially malicious prover –a set of RF-capable sensors (verifiers) Need a protocol that will verify the presence of the prover (you) in the protection zone (the room) so that it can be granted access to the resource (the light switch) protection zone verifiers prover

Existing Solutions Use difference between speeds of light (RF signals) and sound (Ultrasound) to calculate distance between prover and verifier (Sastry, Shankar and Wagner) Location-constrained channels (Perrig, Hu; Kindberg, Zhang) Requires extra hardware Some time synch mechanisms No security guarantees sensors prover 2ft 2.5ft 3ft 4ft sound signal

Our Solution Uses broadcast nature of RF signals Provides perfect security against one/multiple, stationary/mobile, malicious provers having unlimited resources and uninhibited radio broadcast capability sensors prover RF signal A B if A hears the prover, so does B

Definitions Verifiers –acceptors: confirm prover inside the protection zone –rejectors: confirm prover outside the protection zone acceptance zone: –prover in this zone is always accepted rejection zone: –prover in this zone is never accepted ambiguity zone: –prover in this zone may/not be accepted acceptor rejector acceptance zone d Voronoi diagram rejection zone

Basic Protocol Prover broadcasts its location claim with some constant signal strength x If an acceptor hears the claim but none of the rejectors do, then the prover is accepted If at least one rejector hears the claim, it is rejected If no verifier hears the claim, the prover increments its signal strength by x, and retries

Protocol Security and Ambiguity Zone If the rejection zone covers (at least) the entire area outside the protection zone, then the protocol is perfectly secure For a prover to be accepted, it must be closer to an acceptor than it is to any rejector For a prover to be rejected, it must closer to a rejector than it is to any acceptor But …

The Ambiguity Zone It is not enough to have an acceptor as the closest verifier Due to discrete increments in signal strength that the basic protocol requires the prover to make, some provers may still get rejected Prover must be at least ‘x’ closer to an acceptor than it is to a rejector

Implementations of the Protocol Trivial implementation: Uses 4 verifiers: 1 acceptor, 3 rejectors Works for arbitrary protection zones Leaves a considerable proportion of the protection zone unprotected

A Better Implementation A convex polygonal protection zone Complete protection n+1 verifiers Acceptance zone size r – x/2 Can be extended to arbitrary polygonal zones [need O(n) verifiers]

Arbitrary-shaped Zones Zone with area S, and perimeter P O(S+P) squares 5 verifiers needed per square O(S+P) total verifiers t x Acceptance Zone

Malicious Provers with Directional Antennas Prover can add non-zero gain Minimum beamwidth β Number of rejectors inversely proportional to k (among other things) Keeping k and β constant, we need O(r) [1+(2π(r-k)/2k tan (β/2))] rejectors r β k 2k tan(β/2)

Other Improvements In the basic protocol, number of broadcasts needed by the prover to get accepted is linear in the size of the zone –We can improve it to logarithm of the zone size by increasing the number of verifiers The ambiguity zone introduced because of discrete signal strength increments can be made arbitrarily small –tweak the communication protocol so a benign prover adjusts its broadcast strength iteratively to ensure acceptance

Extensions Modifying our parameters slightly allows us to handle radio broadcast models that are not quite as clean as the one used thus far (Complex Signal Propagation) Another extension allows arbitrarily placed verifiers (under some constraining density assumptions) to self- organize into rejectors/acceptors to secure a known protection zone Details available in the paper: A. Vora, M. Nesterenko. Secure Location Verification Using Radio Broadcast. Under review for publication at SenSys 2004.

Questions ?