ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, 41542053 Supervisor: Rajan Shankaran.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
1 Message Oriented Middleware and Hierarchical Routing Protocols Smita Singhaniya Sowmya Marianallur Dhanasekaran Madan Puthige.
Introduction to Wireless Sensor Networks
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Secure and Trustworthy Data Management for Vehicular Cyber Physical Systems Dr. Wenjia Li Assistant Professor in Computer Science New York Institute of.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Security Issues In Sensor Networks By Priya Palanivelu.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
Challenge: Securing Routing Protocols Adrian Perrig
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
1 APPLICATION OF DDDAS FOR TRUSTED COMMUNICATION IN MOBILE NETWORKS. Onolaja Olufunmilola Supervisors: Dr Rami Bahsoon, Dr Georgios Theodoropoulos.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
On the Node Clone Detection inWireless Sensor Networks.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Trust and Reputation Based mechanisms for CIP Uniparthenope, UniRC, Polito (Fai della Paganella, Febbraio 2014)
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
Veronica Eyo Sharvari Joshi. The nodes are left unattended An Adversary can physically compromise the nodesSolution?  Authentication and cryptographic.
High-integrity Sensor Networks Mani Srivastava UCLA.
Secure In-Network Aggregation for Wireless Sensor Networks
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Dynamic Trust Models for Ubiquitous Computing Environments Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe Department of Computer.
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
Group Members Usman Nazir FA08-BET-179 M.Usman Saeed FA08-BET-173
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Computer Science and Engineering 1 Mobile Computing and Security.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Wireless Sensor Networks
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Sensor Fusion-based Event Detection in Wireless Sensor Networks Majid Bahrepour, Nirvana Meratnia, Paul Havinga Presented by: Stephan Bosch.
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
Wireless sensor networks: a survey
Wireless Sensor Networks
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Giannis F. Marias, Vassileios Tsetsos,
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Aggregation.
Presentation transcript:

ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran

Agenda  Problem Statement  Wireless Sensor Networks  Notion of Trust in Wireless Sensor Networks  Comparative Analysis  Recommendations 1

Problem  Security is critical in many applications of Wireless Sensor Networks (WSNs) — Battlefield surveillance — Patient monitoring — Environment monitoring  Security mechanisms assume trustworthiness of participating nodes  What happens if nodes get compromised? — Access key material — Change content of messages — Drop messages  Lives and livelihoods might depend on the correctness of the data 2

Wireless Sensor Networks (WSNs)  Sensor nodes sense data from the environment and detect specific events  Sensor nodes are equipped with sensors to monitor a wide range of physical conditions: — Temperature, Humidity, Light, Pressure, Object motion, Noise, etc.  Sensor nodes are constrained by limited resources 3 Memory Processor Unit Communication device Power Unit Sensor Unit

Network Architecture  Components of Wireless Sensor Networks — Common Sensor Nodes — Base Station  Multihop communication 4

Notion of Trust  “Trust is the subjective probability by which an individual, A, expects that another individual, B, performs a given action on which its welfare depends” (Gambetta, 1988) 5 In the context of WSNs  Trustworthy sensor nodes don’t: — Manipulate gathered information — Alter information received from neighbouring nodes — Flood the network with bogus routing information — Drop messages received from other nodes

Challenges in Evaluating Trust for WSNs  Limited processing, storage, and energy resources — Existing protocols and mechanisms are not applicable — Minimise communication overhead  Trusted authority not present in WSNs — Public key mechanisms and certificates not suitable  Adoption of architectural network changes — Dynamic nature of WSNs — Nodes may become faulty or compromised  Trust re-evaluation is essential 6

Concept of Reputation-Based Trust Systems  Trust is based on a node’s behaviour — Does the node behave in a correct manner? — Network events and correctness of gathered information  Trust evaluation through first and second-hand information — Direct observations — Recommendations from peers  Building blocks — Watchdog mechanism  collects evidence — Reputation system  evaluates and maintains trust 7

Comparative Analysis  Compares five reviewed reputation-based frameworks 1. Reputation-based framework for high integrity sensor network (RFSN) 2. Gaussian trust model and reputation system (GRSSN) 3. Lightweight group based trust management scheme (GTMS) 4. Trust-based cluster head election 5. Certificate and behaviour-based approach  Determines characteristics and constraints of each framework  Proposes categories to conduct the comparative analysis — Trust management — Node and network requirement — Trust evaluation 8

Comparative Analysis – Some Criteria  Evidence — Network events vs. correctness of sensed data  Pre-established trust relationships — Do sensor nodes trust each other at time of deployment?  Storage complexity — Tables, keys, certificates  Revocation — What happens with non-cooperative sensor nodes? 9

Comparative Analysis – Outcomes  All frameworks have some design problems — Difficult to take all characteristics and constraints of WSNs into account  Frameworks are application specific — Different assumptions — Different requirements (e.g. supernodes, keys, certificates)  Sophisticated frameworks are more complex — Economical issues — Management issues  Evidence analysis — Network events or also correctness of sensed data? 10

Recommendations  Collaborative reputation-based approach for establishing trust  Behaviour of nodes is observed by a subset of sensor nodes — Other nodes do not have to monitor network events — Guardian nodes  Guardian nodes evaluate collaborative trustworthiness of nodes — All sensor nodes are directly observable by guardian nodes — Guardian node evaluate whether a node is cooperative — Opinions are shared among guardian nodes  Blacklist entry has to be confirmed by other guardians — Sensor node keep list with non-cooperative nodes 11

Recommendations - Example 12

Future Research Directions  Analyse correctness of sensed data not only network events  Trust evaluation for different roles that sensor node can perform — Forward messages — Aggregate data — Sense information 13 Thank you

Questions 14