Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Slides:



Advertisements
Similar presentations
Coordination of Multi-Agent Systems Mark W. Spong Donald Biggar Willett Professor Department of Electrical and Computer Engineering and The Coordinated.
Advertisements

Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Kick-off Meeting, July 28, 2008 ONR MURI: NexGeNetSci Distributed Coordination, Consensus, and Coverage in Networked Dynamic Systems Ali Jadbabaie Electrical.
A Distributed Algorithm for the Dead End Problem of Location Based Routing in Sensor Networks Le Zou, Mi Lu, Zixiang Xiong, Department of Electrical Engineering,
Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang*, Chenyang Lu, Robert Pless,
SOCELLBOT: A New Botnet Design to Infect Smartphones via Online Social Networking th IEEE Canadian Conference on Electrical and Computer Engineering(CCECE)
Fault-Tolerant Target Detection in Sensor Networks Min Ding +, Dechang Chen *, Andrew Thaeler +, and Xiuzhen Cheng + + Department of Computer Science,
ACCESS Group meeting Mikael Johansson Novel algorithms for peer-to-peer optimization in networked systems Björn Johansson and Mikael.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Geographic Gossip: Efficient Aggregations for Sensor Networks Author: Alex Dimakis, Anand Sarwate, Martin Wainwright University: UC Berkeley Venue: IPSN.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Trajectory-Based Forwarding Mechanisms for Ad-Hoc Sensor Networks Murat Yuksel, Ritesh Pradhan, Shivkumar Kalyanaraman Electrical, Computer, and Systems.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
LPT for Data Aggregation in Wireless Sensor Networks Marc Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering, University of British.
2 Introduction: phase transition phenomena Phase transition: qualitative change as a parameter crosses threshold Matter temperature magnetism demagnetism.
A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.
A Sweeper Scheme for Localization and Mobility Prediction in Underwater Acoustic Sensor Networks K. T. DharanC. Srimathi*Soo-Hyun Park VIT University Vellore,
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Consensus-based Distributed Estimation in Camera Networks - A. T. Kamal, J. A. Farrell, A. K. Roy-Chowdhury University of California, Riverside
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Mobiquitous'07 Poster1 On Reducing the Moving Distance in Approaching Optimal Configuration in MANETs Muddana Roopa, Akasapu Girish, Zhen Jiang Computer.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
Trust-Aware Optimal Crowdsourcing With Budget Constraint Xiangyang Liu 1, He He 2, and John S. Baras 1 1 Institute for Systems Research and Department.
Crowdsourcing with Multi- Dimensional Trust Xiangyang Liu 1, He He 2, and John S. Baras 1 1 Institute for Systems Research and Department of Electrical.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta NCA’03 speaker : Chi-Chih.
VAPR: Void Aware Pressure Routing for Underwater Sensor Networks
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
/ 22 1 A Distributed and Efficient Flooding Scheme Using 1-hop Information in Mobile Ad Hoc Networks Hai Liu Xiaohua Jia Peng-Jun Wan Dept. of Comput.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
A Distributed Relay-Assignment Algorithm for Cooperative Communications in Wireless Networks ICC 2006 Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department.
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
Distributed Algorithms for Multi-Robot Observation of Multiple Moving Targets Lynne E. Parker Autonomous Robots, 2002 Yousuf Ahmad Distributed Information.
A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems Tao Jiang, Ion Matei and John S. Baras Institute for Systems Research.
A LOCALIZED SELF-HEALING ALGORITHM FOR NETWORKS OF MOVEABLE SENSOR NODES Mohamed Younis, Sookyoung Lee, Sheetal Gupta and Kevin Fisher Department of Computer.
Minimizing Recovery State In Geographic Ad-Hoc Routing Noa Arad School of Electrical Engineering Tel Aviv University Yuval Shavitt School of Electrical.
A Fast Handoff Scheme For IP over Bluetooth Sang-Hsu Chung, Hyunsoo Yoon, and Jung-Wan Cho Department of Electrical Engineering & Computer Science Divison.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Ching-Ju Lin Institute of Networking and Multimedia NTU
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Adaptive Tracking in Distributed Wireless Sensor Networks Lizhi Yang, Chuan Feng, Jerzy W. Rozenblit, Haiyan Qiao The University of Arizona Electrical.
A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye, and B. Sikdar Department of Electrical, Computer and systems Engineering.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
Throughput-Oriented MAC for Mobile Ad Hoc Networks with Variable Packet Sizes Fan Wang, Ossama Younis, and Marwan Krunz Department of Electrical & Computer.
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
A Load-Balanced Guiding Navigation Protocol in Wireless Sensor Networks Wen-Tsuen Chen Department of Computer Science National Tsing Hua University Po-Yu.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Incremental Run-time Application Mapping for Heterogeneous Network on Chip 2012 IEEE 14th International Conference on High Performance Computing and Communications.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
A Protocol for Tracking Mobile Targets using Sensor Networks H. Yang and B. Sikdar Department of Electrical, Computer and Systems Engineering Rensselaer.
SWARMS Scalable sWarms of Autonomous Robots and Mobile Sensors Ali Jadbabaie, Daniel E. Koditchek, Vijay Kumar (PI), and George Pappas l.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Communication Scheme for Loosely Coupled Mobile User Groups in Wireless Sensor Fields Euisin Lee, Soochang Park, Fucai Yu, Min-Sook Jin, and Sang-Ha Kim.
Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski Center for Pervasive Computing and Networking and Department of Computer Science Rensselaer Polytechnic.
1 Hierarchical Data Dissemination Scheme for Large Scale Sensor Networks Anand Visvanathan and Jitender Deogun Department of Computer Science and Engg,
Reliable Mobicast via Face- Aware Routing Qingfeng Huang,Chenyang Lu and Gruia-Catalin Roman Department of Computer Science and Engineering Washington.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
Scalable and Distributed GPS free positioning for Sensor Networks Rajagopal Iyengear and Biplab Sikdar IEEE International Conference on Communications.
Efficient Route Update Protocol for Wireless Sensor Networks Xuhui Hu, Yong Liu, Myung J. Lee, Tarek N. Saadawi City University of New York, City College.
Privacy and Fault-Tolerance in Distributed Optimization Nitin Vaidya University of Illinois at Urbana-Champaign.
StatSense In-Network Probabilistic Inference over Sensor Networks
Distributed Sensing, Control, and Uncertainty
Hongchao Zhou, Fei Liu, Xiaohong Guan
Presentation transcript:

Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and Department of Electrical and Computer Engineering University of Maryland, College Park, MD

Outline Introduction Motivation Trust-Aware Consensus Simulations Conclusion

Introduction Cooperation Agent Cooperation Distributed sensor fusion. Goal: all agents reach consensus on ML estimate. [1] Xiao, Lin, Stephen Boyd, and Sanjay Lall. "A scheme for robust distributed sensor fusion based on average consensus." Information Processing in Sensor Networks, IPSN Fourth International Symposium on. IEEE, Distributed Coordination. Goal: all agents reach decision on same direction (location) [2] Jadbabaie, Ali, Jie Lin, and A. Stephen Morse. "Coordination of groups of mobile autonomous agents using nearest neighbor rules." Automatic Control, IEEE Transactions on 48.6 (2003): Agent Without supervisor

Introduction Cooperation Agent Cooperation Agent Link Jam & Noise Injection: [3]Khanafer, Ali, Behrouz Touri, and Tamer Basar. "Consensus in the presence of an adversary." 3rd IFAC Workshop on Distributed Estimation and Control in Networked Systems (NecSys) Malicious Agent Malicious agent: Multiparty secure computation [4] Garay, Juan A., and Rafail Ostrovsky. "Almost-everywhere secure computation." Advances in Cryptology–EUROCRYPT Springer Berlin Heidelberg, Consensus with Byzantine adversaries (System theory) [5] Pasqualetti, Fabio, Antonio Bicchi, and Francesco Bullo. "Consensus computation in unreliable networks: A system theoretic approach." Automatic Control, IEEE Transactions on 57.1 (2012): trust

Motivation Good Node Malicious Node Goal: Detect malicious nodes and isolate them from consensus algorithm.

Trust-Aware Consensus Good Node Malicious Node Trust Evidence Local Trust Decision rules Global Trust Trust Propagation Trust-Aware Consensus Embed trust into consensus

Trust-Aware Consensus Trust Evidence Local Trust Node i’s trust evidence: Clustering-Based Distance-Based Consistency-Based Decision rules:

Trust-Aware Consensus Clustering-Based Distance-Based

Trust-Aware Consensus Consistency-Based message broadcast by node l and heard by node i message broadcast by node j about what it hears from node l

Trust-Aware Consensus Local Trust Global Trust Trust Propagation Malicious Normal Header

Trust-Aware Consensus Trust Evidence Local Trust Decision rules Global Trust Trust Propagation Trust-Aware Consensus Embed trust into consensus

Simulations Adversary outputs constant message. Figure on the left has no trust propagation. Figure on the right has trust propagation.

Simulations Adversary switches randomly between several messages. Figure on the left has no trust propagation. Figure on the right has trust propagation.

Simulations Adversary takes random noise strategy. Figure on the left has no trust propagation. Figure on the right has trust propagation.

Simulations Adversary takes fixed noise strategy. Figure on the left has no trust propagation. Figure on the right has trust propagation.

Simulations Left: adversary takes constant strategy. Right: adversary takes random noise strategy. The communication graph has connectivity 2.

Conclusion Developed trust model with various decision rules based on local evidence in the setting of Byzantine adversaries. Trust-Aware consensus algorithm proposed is flexible and can be extended to incorporate more complicated trust models and decision rules. Simulations show our algorithm can effectively detect malicious strategies even in sparse networks of connectivity, where is the number of adversaries.

Thank you! {xyliu, Questions?