Trust and Reputation Based mechanisms for CIP Uniparthenope, UniRC, Polito (Fai della Paganella, 10-12 Febbraio 2014)

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Chris Karlof and David Wagner
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
A Survey of Secure Wireless Ad Hoc Routing
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
A novel Energy-Efficient and Distance- based Clustering approach for Wireless Sensor Networks M. Mehdi Afsar, Mohammad-H. Tayarani-N.
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Coping with Communication Gray Zones in IEEE b based Ad hoc Networks, H. Lundgren, E. Nordström, and C. Tschudin Anne Saaranen.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Challenge: Securing Routing Protocols Adrian Perrig
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Secure Routing in Ad Hoc Wireless Networks
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Vikramaditya. What is a Sensor Network?  Sensor networks mainly constitute of inexpensive sensors densely deployed for data collection from the field.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
OpenFlow for Wireless Mesh Networks
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Implementation of Collection Tree Protocol in QualNet
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Routing Information Protocol
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Doc.: IEEE /1147r1 Submission November 2009 David Halasz, AclaraSlide 1 Path Protection Date: Authors:
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Routing Metrics for Wireless Mesh Networks
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Routing Metrics for Wireless Mesh Networks
AODV-OLSR Scalable Ad hoc Routing
A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks Name: Patrick Zwane University: National Taipei University of.
802.11s Proposal - Joint SEE-Mesh/Wi-Mesh Proposal to TGs
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Sensor Network Routing
Net 435: Wireless sensor network (WSN)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Lecture 13 review Explain how distance vector algorithm works.
Ad hoc Routing Protocols
Routing Metrics for Wireless Mesh Networks
Abhinandan Ramaprasath, Anand Srinivasan,
Presentation transcript:

Trust and Reputation Based mechanisms for CIP Uniparthenope, UniRC, Polito (Fai della Paganella, Febbraio 2014)

Objectives To enhance the cyber security of Wireless Sensor Networks (WSNs) deployed to protect CIs by exploiting Trust and Reputation Model based techniques – Intrusion Tolerance at the routing level

Security of WSNs WSNs have low computational resources and energy supply – Limit the number of exchanged messages – Limit the usage of cryptographic mechanisms WSNs are deployed in unattended, hostile, environments

Trust and Reputation A trust and reputation model is proposed to improve cyber defense. Say Node 3 wants to estimate trust and reputation perceived about Node 2: Node 3 estimates a trust score of Node 2 through a direct measure related to Node 2 Node 3 estimates a reputation score of Node 2 through indirect measurements, e.g. by observing the trust level perceived by Node 1 wrt Node 2

Attack Model: Sinkhole Attack Trust and reputation-based scores to ensure resilience against attacks such as sinkhole No attack Node 3 successfully attacks (BS = Base Station)

Trust and Reputation Model The model proposed acts as follows: 1.When Node 3 starts an attack, by pretending to have the best route toward destination, we need: 1.A reliable way to check if it is lying (to measure trust) 2.A way to share this information (to update neighbourns reputation) (BS = Base Station)

Test of Trustworthiness Assuming to have a routing protocol enabling parties authentication 1.Node 4 forces a ping through two alternate paths one of which includes the node under test 2.Node 4 chooses the route with lower round trip time 3.If the selected path does not use the tested node as gateway the trust level of node 3 is lowered – T 43 (t+1) = k* T 43 (t) k < 1 3

Reputation If a change in the trust level of node 3 is going to occour, node 4 forwards a feedback to each of the nodes in its neightbour list. Each node receiving the feedback accordingly corrects the reputation of node 3 – R i3 (t+1) = f(R i3 (t), ΔT 43 )

Intrusion Tolerance When a node must select a parent to reach the BS this evaluation will be based on: quality of the channel, trust level, and reputation level of the candidate node. – That is a Dependability function is evaluated for each candidate and the new parent will be the one with highest dependability value: For each j in N: D ij (t+1) = f(Q ij (t), T ij (t),R ij (t)) (N set of neighbours) The node j such that D ij (t+1) =Max(Dij(t+1)) is selected as the parent one

AODV Routing Protocol Ad hoc On Demand Distance Vector (AODV) is a standard routing protocol defined by RFC 3561 ( AODV is widely adopted e.g. in Bluetooth and Zigbee

Implementation A WSN was simulated through NS-3 NS3 is a command-line, open source (GNU GPL v2) network simulator Programming languages: C++, Python Different WSNs routing protocols are implemented such as Optimized Link State Routing Protocol (OLSR) and Ad hoc On Demand Distance Vector (AODV)

Future Steps To complete implementation To test the effectiveness of the proposed model under different testbed configurations, and parameters tuning To extend the approach to manage other kind of attacks