Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented.

Slides:



Advertisements
Similar presentations
A Data Dissemination Method for Supporting Mobile Sinks in Hierarchical Routing Protocol of WSN APAN 2008 Jieun Cho 4, August,
Advertisements

1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
6/14/20141 A Cluster Formation Algorithm with Self-Adaptive Population for Wireless Sensor Networks Luis J. Gonzalez.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Introduction to Wireless Sensor Networks
Tufts Wireless Laboratory Tufts University School Of Engineering Energy-Efficient Structuralized Clustering for Sensor-based Cyber Physical Systems Jierui.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
POWER EFFICIENCY ROUTING ALGORITHMS OF WIRELESS SENSOR NETWORKS
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
Energy-Efficient Target Coverage in Wireless Sensor Networks Mihaela Cardei, My T. Thai, YingshuLi, WeiliWu Annual Joint Conference of the IEEE Computer.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Talha Naeem Qureshi Joint work with Tauseef Shah and Nadeem Javaid
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Distributed Anomaly Detection in Wireless Sensor Networks Ksutharshan Rajasegarar, Christopher Leckie, Marimutha Palaniswami, James C. Bezdek IEEE ICCS2006(Institutions.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
1 Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Fenye Bao, Ing-Ray Chen,
Wireless Sensor Network Protocols Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Multi-Resolution Spatial and Temporal Coding in a Wireless Sensor Network for Long-Term Monitoring Applications You-Chiun Wang, Member, IEEE, Yao-Yu Hsieh,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
A Distributed Coordination Framework for Wireless Sensor and Actor Networks Tommaso Melodia, Dario Pompili, Vehbi C.Gungor, Ian F.Akyildiz (MobiHoc 2005)
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
ELECTIONEL ECTI ON ELECTION: Energy-efficient and Low- latEncy sCheduling Technique for wIreless sensOr Networks Shamim Begum, Shao-Cheng Wang, Bhaskar.
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
Authors: N. Javaid, M. Aslam, K. Djouani, Z. A. Khan, T. A. Alghamdi
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
MCEEC: MULTI-HOP CENTRALIZED ENERGY EFFICIENT CLUSTERING ROUTING PROTOCOL FOR WSNS N. Javaid, M. Aslam, K. Djouani, Z. A. Khan, T. A. Alghamdi.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.
Reliability of Wireless sensors with code attestation for intrusion detection Ing-Ray Chen, Yating Wang, Ding-Chau Wang Information Processing Letters.
Abstract 1/2 Wireless Sensor Networks (WSNs) having limited power resource report sensed data to the Base Station (BS) that requires high energy usage.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
In the name of God.
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Trustworthiness Management in the Social Internet of Things
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
Giannis F. Marias, Vassileios Tsetsos,
Introduction to Wireless Sensor Networks
Environment-Aware Reputation Management for Ad Hoc Networks
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
SEP routing protocol in WSN
Leach routing protocol in WSN
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Leach routing protocol in WSN
Presentation transcript:

Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented by: Scott Hackman 03 November Scott Hackman – CS5214 – Modeling and Analysis

Hierarchical Trust Management Introduction Cluster-based approach to creating a system for wireless routing better than shortest-distance and flood-based routing. Utilizes Social Networking and Quality of Service (QoS) techniques to model the behaviors of nodes to determine their reliability. Highly scalable due to being a cluster-based model. Scott Hackman – CS5214 – Modeling and Analysis2

Hierarchical Trust Management Wireless Sensor Network A Wireless Sensor Network (WSN) refers to a distributed network of autonomous sensors, each operating independently for the greater good of the network. A WSN is inherently unstable due to the independence of the Sensor Nodes (SN) and their different operating characteristics, including malicious and selfish activity. The WSN must take input from its SNs, evaluate their input, and determine the overall picture for what is happening across its network. Scott Hackman – CS5214 – Modeling and Analysis3

Hierarchical Trust Management Sensor Node A SN monitors physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, or pollutants. A SN is can transmit, or forward information through multi- hop routing. SNs have very limited resources:  Energy  Memory  Computational Power May be susceptible to malicious attacks when their energy is low. Scott Hackman – CS5214 – Modeling and Analysis4

Hierarchical Trust Management Cluster Head A Cluster Head (CH) is a node that has been elected to take charge of a group of SNs. A CH receives direct input from each of its SNs. A CH is responsible for reporting to all of the other CHs in the system. CHs use more energy than SNs. Scott Hackman – CS5214 – Modeling and Analysis5

Hierarchical Trust Management Abnormal Node Behavior Malicious Node  A node may be captured by the enemy at any point and start passing erroneous information or drop packets.  A node is more likely to become malicious if it has low energy or if it is surrounded by malicious nodes. Selfish Node  A node may become selfish if its energy becomes low relative to its neighbors’.  “Selfish” can be thought of as “efficient”. If a node recognizes that its battery level is low and its neighbors have sufficient energy, it may start dropping packets so its neighbors pick up more of the burden. The challenge becomes: How do we create a model such that malicious and selfish nodes can be identified and the WSN can adjust to these conditions to achieve a near-optimal performance? Scott Hackman – CS5214 – Modeling and Analysis6

Hierarchical Trust Management System Model First, how do we determine which nodes are SNs and which nodes are CHs?  HEED (Hybrid energy-efficient, distributed) – The CH’s must have higher energy and have relative proximity. This will allow for higher energy consumption as well as optimal communications. SNs will collect data and evaluate their peers. That information will be passed to their respective CHs. The CHs will collect the SNs data and collect their own peer- to-peer (P2P) data from other CHs. CHs will pass their data to a “CH Commander” for evaluation. Scott Hackman – CS5214 – Modeling and Analysis7

Hierarchical Trust Management How Does Trust Factor In? Once the hierarchy is established, the evaluations completed by each node follow a trust scheme that allows for direct and indirect trust-based reporting. Trust is established by evaluating directly, and indirectly, four different factors:  Energy Measures competence Less susceptible to malicious attacks  Unselfishness Measures cooperativeness  Honesty Whether or not the node is compromised based on intrusion detection capabilities in the system based on software-based code attestation  Intimacy Relative degree of interaction experiences between two nodes Scott Hackman – CS5214 – Modeling and Analysis8

Hierarchical Trust Management Evaluation Process A weighted evaluation is performed and all four categories are factored into one, overall trust score: T ij (t) denotes the trust that node i has toward node j at time t. Scott Hackman – CS5214 – Modeling and Analysis9

Hierarchical Trust Management Peer-to-Peer Trust Evaluation P2P Trust Evaluation is performed between SNs and between CHs. When node i evaluates its trust toward node j, it snoops, or overhears enough data to provide direct observation. (It is assumed, notationally, that i and j are direct neighbors.) When i evaluates a node that is beyond its communication range, we refer to the node as node k. Node i cannot directly evaluate k, so it must rely on the information passed to it by some node j and multiply that evaluation by a weight that correlates to i’s trust toward j. Scott Hackman – CS5214 – Modeling and Analysis10

Hierarchical Trust Management Peer-to-Peer Trust Evaluation This relationship is represented as follows: γ and α represent weights associated with trust decay. X represents one of the trust components. Scott Hackman – CS5214 – Modeling and Analysis11

Hierarchical Trust Management Peer-to-Peer Trust Factors - This measures the level of interaction experiences. It is computed by the number of interactions between node i and j over the maximum number of interactions between node i and any neighbor node over the time period [0, t]. - This refers to the belief of node i that node j is not compromised base on node i’s direct observations toward node j. It can be a binary quantity, 0 or 1, based on the result of Intrusion Detection System (IDS) deployed on node i about whether or not node j is compromised at time t. Scott Hackman – CS5214 – Modeling and Analysis12

Hierarchical Trust Management Peer-to-Peer Trust Factors - This indicates the percentage of node j’s remaining energy that node i directly observes at time t. Node i can overhear or even monitor node j’s packet transmission activities over the time period [0, t] to estimate this value. - This provides the degree of unselfishness of node j as evaluated by node i based on direct observations over [0, t]. Node i can apply overhearing and snooping techniques to detect selfish behaviors from node j. Scott Hackman – CS5214 – Modeling and Analysis13

Hierarchical Trust Management Other Parameters Defined α - Weight that represents a more instantaneous evaluation, since the higher α, the more weight is given to time t. β – Represents the impact of “indirect recommendations”. γ These parameters are used to adjust the trust decay over time. Lower factors cause a dampening effect that puts more weight on past events. This reduced high rates of change and may stabilize a system that receives sporadic, erroneous readings. Scott Hackman – CS5214 – Modeling and Analysis14

Hierarchical Trust Management CH-to-SN Trust Evaluation Once all calculations are complete for a given time period t, the CH applies statistical analysis principles to all T ij (t) values received to perform CH-to-SN trust evaluation toward node j. CH can also detect any outliers in the cluster to see if any good-mouthing or bad-mouthing is occurring. The CH can exclude a sensor or reroute with the information it obtains. Scott Hackman – CS5214 – Modeling and Analysis15

Hierarchical Trust Management Performance Model To create an objective model for comparison, a stochastic Petri net model is used. The Petri new model essentially computes the same values, but takes away the trust aspect. All values are known by the model at all times and routing data is computed accordingly. The underlying data of this model is used by the trust-based simulation, but each component can only see the data as defined by the initial conditions. Hence, best-case scenario, the trust-based approach can only perform as well as the objective Petri-net model. Scott Hackman – CS5214 – Modeling and Analysis16

Hierarchical Trust Management Petri Net Model Scott Hackman – CS5214 – Modeling and Analysis17

Hierarchical Trust Management Petri Net Model - Energy Energy represents the remaining energy in a node. A token will be expended from Energy when T_ENERGY triggers. Energy consumption rates: Scott Hackman – CS5214 – Modeling and Analysis18

Hierarchical Trust Management Petri Net Model - Selfishness A node may become selfish to save energy.  An unselfish node may decide whether it will be selfish or not upon every time interval Ts according to its remaining energy and the number of unselfish neighbors.  A selfish node may become redeemed based on trust evaluation. Scott Hackman – CS5214 – Modeling and Analysis19

Hierarchical Trust Management Petri Net Model - Honesty A node becomes compromised when T_COMPRO fires and places a token in CN. Scott Hackman – CS5214 – Modeling and Analysis20

Hierarchical Trust Management Subjective Trust Evaluation If j is a selfish node (a/c), compromised node (b/c) or normal node (c/c) Scott Hackman – CS5214 – Modeling and Analysis21

Hierarchical Trust Management Objective Trust Evaluation Scott Hackman – CS5214 – Modeling and Analysis22

Hierarchical Trust Management Trust Evaluation Scott Hackman – CS5214 – Modeling and Analysis23

Hierarchical Trust Management Trust Evaluation Scott Hackman – CS5214 – Modeling and Analysis24

Hierarchical Trust Management Geographic Routing Scott Hackman – CS5214 – Modeling and Analysis25

Hierarchical Trust Management Geographic Routing Scott Hackman – CS5214 – Modeling and Analysis26

Hierarchical Trust Management Geographic Routing Scott Hackman – CS5214 – Modeling and Analysis27

Hierarchical Trust Management Geographic Routing Scott Hackman – CS5214 – Modeling and Analysis28

Hierarchical Trust Management Conclusion This model presents a very practical framework that allows for highly reliable transmissions with reduced overhead. Social networking and QoS methods allow peers to quantitatively rate their peers, drastically reducing the work needed to be done by the cluster head. This model remains highly scalable because of its hierarchical nature. Possible Future Work: Apply a genetic algorithm to this model and train it off of real-world data to achieve optimal weighting factors. Scott Hackman – CS5214 – Modeling and Analysis29