ANTHONY D.WOOD, A STANKOVIC & SANG H.SON UNIVERSITY OF VIRGINIA BY, SRIKANTH POKALA JAM: A Jammed-Area Mapping Service For Sensor Networks.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
TDMA Scheduling in Wireless Sensor Networks
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WSN Simulation Template for OMNeT++
Wireless Sensor Network Security Anuj Nagar CS 590.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
LPT for Data Aggregation in Wireless Sensor Networks Marc Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering, University of British.
Layered Approach using Conditional Random Fields For Intrusion Detection.
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
Common Devices Used In Computer Networks
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
Lecture 4: Sun: 23/4/1435 Distributed Operating Systems Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
Ad Hoc Network.
1 EnviroTrack and JAM Presented by Chien-Liang Fok.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
DEEJAM : Defeating Energy-Efficient Jamming in IEEE based Wireless Networks Paper Authors: Anthony D. Wood John A. Stankovic Gang Zhou Presented.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
Defeating Energy-Efficient Jamming in IEEE based Wireless Networks By: y D. Wood, John A. Stankovic, and Gang Zhou, University of Virginia Presented.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
Structure-Free Data Aggregation in Sensor Networks.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Protocols.
Protocols.
Presentation transcript:

ANTHONY D.WOOD, A STANKOVIC & SANG H.SON UNIVERSITY OF VIRGINIA BY, SRIKANTH POKALA JAM: A Jammed-Area Mapping Service For Sensor Networks

Agenda Introduction Denial of Service (DoS) Attack Detection: A mapping approach Mapping Service Assumptions Design Principles Evaluation Conclusion

Introduction Preventing DoS attacks in WSN is difficult primarily because of the limited resources and the ease with which these attacks are perpetrated. Individual sensors are not reliable because of mass manufacturing defects,battery death etc. Aggregate behavior and robust algorithms provide the reliability that safety-critical applications demand.

Why JAM?? Rather than jeopardize design requirements which call for simple, inexpensive, mass- producible devices, a coping strategy has been proposed that detects and maps jammed regions. Assuming that the entire network is not affected (in which case there is no hope), it can take action to avoid the area and report problem to the uplink control systems.

Denial of Service(DoS) Attacks In a network that is mostly homogeneous that is, where there is little capability or functional differentiation except what is cooperative, distributed, or redundant, deliberate attacks may be strongly localized. One such attack, most likely to occur in a battle field or urban warfare environment, is radio jamming. Jamming is particularly easy since many will have single-frequency communication.

Detection: A Mapping Approach A mapping service for WSNs that can provide the following benefits has been proposed: Feedback to routing and directory services An effective abstraction at a high-level than local congestion etc. Reports to a base-station for further jamming localization, and Aid to power management strategies

Mapping Service Two primary components form the basis of mapping service  A Jamming detection, and  A Mapping module Both operate on every node in the network. The figure below shows the architectural diagram of a mapping service. Jamming Detection and Mapping interact remotely that is between nodes using radio.

Mapping Service

Overview

Jamming Detection Jamming is interfering with the ability of an adversary to communicate A receiver may recognize known type of jamming by their unique energy patterns However, this approach requires digital signal processing (DSP) capabilities and a library of patterns

Jamming Detection All the patterns may not be available so the users can apply heuristics to determine whether the current node is experiencing non-transient interference that might be called jamming Due to the complexity of jamming detection and its sensitivity to the deployment environment, the authors constructed it as a separate module, with a limited interface to the mapping protocol

Jamming Detection The output of the jamming detection is a J AMMED or U N J AMMED message broadcast to the node’s neighbors To overcome this problem the MAC must provide (by modification, if necessary) a way to over-ride carrier- sense for this purpose of sending a brief, high- priority, unacknowledged broadcast message.

Mapping Protocol When a node receives a Jammed message, it initiates the mapping protocol A build message is not sent immediately rather a short announce timer is started This allows multiple received Jammed messages to be aggregated before sending a Build message, reducing the number of broadcasts containing little information

Mapping Protocol Sequence

Assumptions The authors approach to mapping in sensor networks makes the following assumptions about the network or environment: Nodes know their own location and ID, and that of their neighbors Location information is used only for group compatibility calculation, so it need not be very accurate After deployment, nodes move mainly by external environment forces and are otherwise static

Assumptions Mapping and bridging nodes are strongly connected but individual radio links need not be bi-directional. Nodes broadcast messages to whichever neighbors are listening

Assumptions The following are the authors assumptions and limitations on jamming: The network uses single channel wireless communication Though multiple jammers is allowed, either the sensor network is large enough, or the jamming is limited enough, that attackers cannot jam the entire network

Assumptions The MAC can provide an unacknowledged, carrier- sense defeating broadcast mechanism for jamming notification Whether simple or complex, jamming can be quantified by sensor devices using signal strength, bit error rates or other information

Design Principles The unique characteristics of WSNs present many challenges to designers of MAC, routing, and group management protocols. The following design principles are suggested and how each is represented in the mapping service.

Design Principles 1. Loose Group Semantics:  The authors used this in addressing, messaging and membership  When creating a group in response to a JAMMED message, we randomly generate group IDs  Messaging within the group is unacknowledged and unreliable  Members do not have a shared and consistent view of the global membership

Design Principles 2. Eager Eavesdropping Since our goal is to quickly diffuse knowledge of the jammed region to as many mapping members as possible, they eagerly eavesdrop on all received build messages

Design Principles 3. Supremacy of Local Information: Local information is considered more up-to-date than that received by relayed messages Each node maintains a separate list of its neighboring nodes They also consider local information to be more trustworthy and verify it against information received in a relayed message

Design Principles 4. Early use of Results: Nodes do not wait until a complete picture of the jammed region is available to perform avoidance strategies. Whatever local information is available is used to influence routing, power management etc.

Evaluation Types of Groups:  Member Groups are those held by any mapping member of a group at the end of the simulation  Dominant Groups were determined by considering the subsumed group ID list in every group remaining at the end of the simulation.

Evaluation Simulation Methodology  A WSN using the GloMoSim simulator has been simulated  The dimensions are 4000 by 400 meter field  400 nodes were placed at 200meter intervals on a grid

Evaluation Two sets of experiments have been performed: 1. The first experiment tested the correctness of the jammed region mapping and performance for varying jammed region sizes from 5 nodes affected to 144 nodes affected 2. Secondly, the performance of the 8 and 12 neighborhood sizes under mapping node failure have been tested

Results Experiment 1: Varying Jammer Range

Results

Experiment 2: Varying Failure

Results

Conclusion A protocol for mapping the extent of the jammed region is proposed and evaluated for jamming by radio interference. The authors evaluated a mapping protocol by simulation, showing its correctness and performance for varying size jammed regions and failure rates.

References 1. “JAM: A jammed-area mapping service for sensor networks”, Anthony D. Wood, John A.Stankovic, and Sang H.Son, Department of Computer Science, University of Virginia.

Thank You