Secure Local Data Aggregation and Delay Tolerant Dissemination in VANETs.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
QoS in ad hoc nets: distributed fair scheduling SCOPE: Self-coordinating Localized FQ H. Luo et al “A Self-Coordinating Approach to Distributed FairQueueing.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
EPIDEMIC DENSITY ADAPTIVE DATA DISSEMINATION EXPLOITING OPPOSITE LANE IN VANETS Irem Nizamoglu Computer Science & Engineering.
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Geographic Routing Without Location Information A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, I. Stoica Paper and Slides by Presented by Ryan Carr.
TTDD: A Two-tier Data Dissemination Model for Large- scale Wireless Sensor Networks Haiyun Luo Fan Ye, Jerry Cheng Songwu Lu, Lixia Zhang UCLA CS Dept.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
1 Efficient Broadcasting and Gathering in Wireless Ad-Hoc Networks Melih Onus (ASU) Kishore Kothapalli (JHU) Andrea Richa (ASU) Christian Scheideler (JHU)
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Speaker: Li-Sheng Chen 1 Jan 2, 2012 EOBDBR: an Efficient Optimum Branching-Based Distributed Broadcast Routing Protocol for Wireless Ad Hoc Networks.
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
Design and Analysis of an MST-Based Topology Control Algorithm Ning Li and Jennifer Hou Department of Computer Science University of Illinois at Urbana-Champaign.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Interference-Aware QoS OLSR for Mobile Ad-hoc Network Routing SAWN 2005, May 24 P. Minet & D-Q. Nguyen.
Wireless Sensor Network Security Anuj Nagar CS 590.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Routing Algorithm for Large Data Sensor Networks Raghul Gunasekaran Group Meeting Spring 2006.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
Wireless Sensor Networks COE 499 Energy Aware Routing
Chris Karlof and David Wagner University of California at Berkeley
ACM 511 Introduction to Computer Networks. Computer Networks.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
CSE 6590 Fall 2009 Routing Metrics for Wireless Mesh Networks 1 12 November, 2015.
Ad Hoc Network.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
Active Message Application: CONNECT Presented by Xiaozhou David Zhu Oommen Regi July 6, 2001.
Data Dissemination Based on Ant Swarms for Wireless Sensor Networks S. Selvakennedy, S. Sinnappan, and Yi Shang IEEE 2006 CONSUMER COMMUNICATIONS and NETWORKING.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Routing Metrics for Wireless Mesh Networks
Protocols for Wireless Sensor Networks
Routing Metrics for Wireless Mesh Networks
VANET.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Routing Metrics for Wireless Mesh Networks
Research: algorithmic solutions for networking
Introduction Wireless Ad-Hoc Network
Subject Name: Adhoc Networks Subject Code: 10CS841
A Case for Resource Heterogeneity in Large Sensor Networks
Protocols.
doc.: IEEE yy/xxxxr0 Date:
Protocols.
Presentation transcript:

Secure Local Data Aggregation and Delay Tolerant Dissemination in VANETs

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS Distributed event detection in Vehicular Adhoc NETworks o Interested in detecting vehicle crash events o Collision will affect both nearby vehicles and vehicles approaching the site Other vehicles may be present during such an event o May flood the wireless channel with crash data

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS Minimize the amount of power consumed by radio transmissions o Extend the battery life o Reduce communication overhead

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS Minimum spanning trees (MST) o Maximize the degree o Maximize the number of hops Leader election algorithm o Address the collision transmission problem in wireless networks Time-constrained data transmission o Ensure that all data eventually reaches the sink

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS Flow updating o Broadcast- and gossip-based o Exploit the symmetry of the network flows Hierarchical aggregation o Based on the distance form the origin

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS Broadcast data to the local subset network Locality Quickly Efficiently

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS Flash dissemination o Broadcast as fast as possible o Not scalable CREW o Gossip-based o Prevent receiving multiple copies of the same message o Scalable

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS Jamming attack o Interfere the radio channel Hidden vehicle o Adversary pretend to be in better position for broadcast o Results: stop broadcasting

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS Wormhole attack o Tunneling message from area A to area B using fast external channel o Authentic messages sent o Trick vehicles in area B Sybil attack o Multiple fake identities o Fake positions

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS Design a protocol for event detection in VANETs o Initial event detection o Dissemination Simulation on NS3

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS Authentication of original event data Based on flash dissemination Built on top of a graph topology Multiple observers agreement Data integrity Non repudiation Designed for quick dissemination for most likely affected vihecle

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS

Cesar Ghali, Sky Faber, Kyle Benson, Quan Nguyen – CS