ICC 2007 Robust Localization in Wireless Sensor Networks through the Revocation of Malicious Anchors International Conference on Communications 2007 Satyajayant.

Slides:



Advertisements
Similar presentations
TARGET DETECTION AND TRACKING IN A WIRELESS SENSOR NETWORK Clement Kam, William Hodgkiss, Dept. of Electrical and Computer Engineering, University of California,
Advertisements

Chris Karlof and David Wagner
Localization for Mobile Sensor Networks ACM MobiCom 2004 Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
Los Angeles September 27, 2006 MOBICOM Localization in Sparse Networks using Sweeps D. K. Goldenberg P. Bihler M. Cao J. Fang B. D. O. Anderson.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks Lei Fang (Syracuse) Wenliang (Kevin) Du (Syracuse) Peng Ning (North Carolina State)
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks - Zang Li, Wade Trappe, Yanyong Zhang, Badri Nath Presented By: Vipul.
Rendezvous Planning in Mobility- assisted Wireless Sensor Networks Guoliang Xing; Tian Wang; Zhihui Xie; Weijia Jia Department of Computer Science City.
Novel Self-Configurable Positioning Technique for Multihop Wireless Networks Authors : Hongyi Wu Chong Wang Nian-Feng Tzeng IEEE/ACM TRANSACTIONS ON NETWORKING,
TPS: A Time-Based Positioning Scheme for outdoor Wireless Sensor Networks Authors: Xiuzhen Cheng, Andrew Thaeler, Guoliang Xue, Dechang Chen From IEEE.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
LAD: Location Anomaly Detection for Wireless Sensor Networks Wenliang (Kevin) Du (Syracuse Univ.) Lei Fang (Syracuse Univ.) Peng Ning (North Carolina State.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Sensor Positioning in Wireless Ad-hoc Sensor Networks Using Multidimensional Scaling Xiang Ji and Hongyuan Zha Dept. of Computer Science and Engineering,
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
A Survey of Secure Location Schemes in Wireless Networks /5/21.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Localization With Mobile Anchor Points in Wireless Sensor Networks
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
Architectures and Applications for Wireless Sensor Networks ( ) Localization Chaiporn Jaikaeo Department of Computer Engineering.
Distributed Anomaly Detection in Wireless Sensor Networks Ksutharshan Rajasegarar, Christopher Leckie, Marimutha Palaniswami, James C. Bezdek IEEE ICCS2006(Institutions.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
DARP: Distance-Aware Relay Placement in WiMAX Mesh Networks Weiyi Zhang *, Shi Bai *, Guoliang Xue §, Jian Tang †, Chonggang Wang ‡ * Department of Computer.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Location Estimation in Ad-Hoc Networks with Directional Antennas N. Malhotra M. Krasniewski C. Yang S. Bagchi W. Chappell 5th IEEE International Conference.
Algorithms for Wireless Sensor Networks Marcela Boboila, George Iordache Computer Science Department Stony Brook University.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
A Process Control Screen for Multiple Stream Processes An Operator Friendly Approach Richard E. Clark Process & Product Analysis.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Mangai Vetrivelan Snigdha Joshi Avani Atre. Sensor Network Vulnerabilities o Unshielded Sensor Network Nodes vulnerable to be compromised. o Attacks on.
Bounded relay hop mobile data gathering in wireless sensor networks
CHAPTER SEVEN ESTIMATION. 7.1 A Point Estimate: A point estimate of some population parameter is a single value of a statistic (parameter space). For.
Secure In-Network Aggregation for Wireless Sensor Networks
J. Hwang, T. He, Y. Kim Presented by Shan Gao. Introduction  Target the scenarios where attackers announce phantom nodes.  Phantom node  Fake their.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang, Jie Gao, Leonidas J. Guibas, Vin de Silva, Li Zhang Department of Electrical.
Computer Science 1 Using Clustering Information for Sensor Network Localization Haowen Chan, Mark Luk, and Adrian Perrig Carnegie Mellon University
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
HCRL: A Hop-Count-Ratio based Localization in Wireless Sensor Networks Sungwon Yang, Jiyoung Yi and Hojung Cha Department of Computer Science, Yonsei University,
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in WSNs Azzedine Boukerche, Xin Fei PARADISE Research Lab Univeristy.
Hiding Contextual Information in WSNs Alejandro Proaño and Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona.
Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran
Presented by Prashant Duhoon
Attack-Resistant Location Estimation in Sensor Networks
Totally Disjoint Multipath Routing in Multihop Wireless Networks Sonia Waharte and Raoef Boutaba Presented by: Anthony Calce.
Presentation transcript:

ICC 2007 Robust Localization in Wireless Sensor Networks through the Revocation of Malicious Anchors International Conference on Communications 2007 Satyajayant Misra, Guoliang (Larry) Xue, Aviral Shrivastava Department of Computer Science and Engineering School of Computing and Informatics The Ira A. Fulton School of Engineering Arizona State University. {satyajayant, xue,

ICC Problem Definition In a WSN, sensor nodes (SNs) localize themselves with the help of location references received from anchors in the network. Malicious anchors can easily subvert this localization process. Schemes in literature perform robust localization and identify malicious anchors when less than majority of anchors are malicious and may or may not be colluding.

ICC Anchor Location reference Base StationSensor Accurate Localization of sensors in the absence of malicious anchors

ICC False Anchor Error in Estimation Sensor’s Estimated Position Inaccuracy in localization due to malicious anchors

ICC Related Works Accurate localization in the presence of malicious anchors has been handled in [1, 2, 3]. [1], [2] identified anomaly in localization to perform compromise resistant localization. [3] Detected and removed malicious anchors. Performance of the schemes above is limited when more than majority anchors lie. [1] W. Du, L. Fang, and P. Ning. LAD: Localization anomaly detection for wireless sensor networks. In Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS), [2] Z. Li, W. Trappe, Y. Zhang, and B. Nath. Robust statistical methods for securing wireless localization in sensor networks. In Proceedings of Information Processing in Sensor Networks (IPSN), pages 91–98, [3] D. Liu, P. Ning, and W. Du. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS), pages 609–619, 2005.

ICC Findings from our analysis The popular Minimum Square Error (MSE) method is vulnerable to inaccurate measurements. Malicious anchors can cause the MSE to be inaccurate by an order of magnitude higher than when only true anchors are used. Proposed methods only perform accurate localization when a small fraction of anchors are malicious. WHAT IF MALICIOUS ANCHORS ARE MANY??!!

ICC Our Contribution There is no known scheme that performs robust localization when more than the majority of anchors are malicious and are colluding. We present a novel scheme that identifies a large proportion of malicious anchors even when more than the majority of the anchors in the network are malicious and colluding. The malicious anchors may be revoked from the network. The SNs can re-localize themselves using references only from true anchors. Resultant localization is more accurate.

ICC Overview of Scheme Our technique uses a passive mobile verifier (MV). The MV travels in the network obtaining location references from the anchors. After obtaining a given number of references from each anchors it performs statistical tests on each anchor’s sample to identify if it is malicious. Since each anchor is evaluated independently, our technique identifies the malicious anchors even when they form a majority and are colluding.

ICC Anchor Mobile VerifierSensor False Anchor Analyses performed to identify malicious anchors Identification of malicious anchors by MV

ICC System Model and Assumptions Anchors and SNs are deployed randomly and are stationary. Each anchor a i knows its own position. The MV is GPS-enabled and can obtain its own position accurately. TDoA used for localization (radio and ultrasound). Measurement error, ñ ~ N(0, σ 2 ), with domain [- δ max, δ max ] (truncated normal distribution). The anchors lie s.t. d’ = d.(1 + x ε max ), x ~ U[-1,1], ε max is an unknown constant, d is true distance.

ICC Threat Model and Security Requirements Delayed key disclosure prevents malicious anchors from changing or faking references. The MV can successfully identify wormhole attacks as it knows its own position. Even Sybil attack is thwarted by the MV. Security Requirements If the path of motion of the MV in the network is known to the malicious anchors they can lie selectively. Unpredictable paths needed. Collection of enough number of samples to reduce Type I and Type II errors.

ICC More on Possible attacks in our setting Malicious anchor lying about distance estimate causes distance enlargement/reduction attack. Difficult to identify given the uncertainties and errors in measurement. Also the anchor can lie about its position as well. Hence the 3 possible means by which an anchor can lie are: About position. About distance to the SN. Lie about both.

ICC Sub-problems studied Given the threat model and security requirements, an efficient solution should address the following 4 questions: How to ensure that all anchors are covered by the MV ? How to make the route of the MV in the network appear random to an outside observer ? How to perform statistical testing of the location references obtained from each anchor ? How to revoke the anchors identified as malicious ?

ICC How to ensure all anchors are covered ? The network is overlaid with a virtual square grid (Gr). Grid size = R / √2, R is reception range of MV. In each iteration, the MV visits each grid before returning to the base station (BS). Each square in the grid is defined by S xy, x and y are the bottom left coordinates of the square. The grid is represented as a graph G(V, E) with every S ij being a vertex, and any two adjacent S ij, S kl ε V connected by an edge (S ij, S kl ).

ICC How to make the path of the MV random The path π i taken by a MV in iteration ‘i’ is defined as π i = {BS, S ab, S bq, …, S st, BS}. The set of paths used by the MV, π = {π 1, π 2, …, π m } is an ordered sequence. For any two paths, π i, π j ε π, we define a score function, F(π i, π j ) = |{(S kl, S qr )| (S kl, S qr ) ε π i, π j }|. π is chosen by the BS so that for some ‘p’, m-p Σ i = 1 i+p Σ j = i + 1 F(π i, π j ) is minimized. This results increases unpredicatibility.

ICC Statistical testing of location references. Given an anchor a i ’s position a i and the position m of the MV. d’ i = d i (1 + δ i ), δ i ~ N(0, σ 0 2 ), d’ i is the estimated distance and d i is the true distance between MV and a i. d i calc = || m- a i ||, is the distance calculated by the MV from the position of the anchor. Therefore, d’ i / d i calc – 1 = δ i, the coeff. for meas. error. Given that the measurement error is ñ ~ N(0, σ 2 ), if a i is true, then μ err = μ 0 = 0, and σ 2 err = σ 0 2.

ICC Fundamental behind statistical testing For a malicious anchor a j, d’ j / d j calc – 1 ≠ δ j, as the anchor lies about d ’ j or a j. Bigger the lie greater is the deviation. Results in a shift in the sample mean ( μ err ≠μ 0 ) and/or a increase in the sample variance (σ 2 err > σ 0 2 ) of the references obtained from a j. In each iteration, the MV obtains multiple number of references from each anchor. The location references are tested at the end of each iteration to identify malicious anchors.

ICC Hypothesis Testing From the location references obtained, the MV performs two types of hypothesis testing for each anchor: H 0 : μ err = μ 0 versus H 1 : μ err ≠ μ 0  If H 0 is rejected => the anchor is lying. H 0 : σ 2 err = σ 2 0 versus H 1 : σ 2 err > σ 2 0  If H 0 is rejected => the anchor is lying. The number of references used for each anchor is such that Type I and Type II errors are small.

ICC Algorithm followed by MV in each iteration

ICC How to revoke the malicious anchors The MV transmits a list of the malicious anchors to the BS. The BS can flood the network with the list of the malicious anchors. An SN that receives the list removes the references from the malicious anchors in the list and re- localizes itself.

ICC Simulations Settings WSN deployed in a field of 100 x 100 sq. units. The field is overlaid with a grid of 20 x 20 sq. units. In each square, 10 anchors are deployed randomly. Maximum error coefficient, |δ max | = 0.2, corresponding σ 2 0 = Type I error coeff., α = 0.01, and type II error coeff. β = 0.1. In each square, 3, 5, or 7 anchors are malicious. For hypothesis testing of μ, the malicious anchors lie such that μ m = 0.1.

ICC Results of test for μ Fig. (a) shows that our scheme catches > 60% of the malicious anchors caught even with only 20 references collected per anchor. False positives are close to 0%. Fig. (b) shows that when the malicious anchors lie more, the percentage caught is almost 100% even for only 20 references.

ICC Results of test for σ 2 In Fig. (c) with | ε max | = 0.3, we are able to catch more than 80% of malicious anchors with only 60 references. False positives are again close to 0%. Fig. (d) shows that with increasing | ε max |, higher percentage of malicious anchors are caught, even with < 60 references.

ICC Conclusions In this paper we propose a scheme that identifies a large number of malicious anchors in the network even when they are more than the majority and colluding. In the future we would like to work on: Improving the prediction using mechanisms such as control charts. Making the motion of the verifier in the network untraceable, by using energy-efficient disjoint paths.

ICC Contact Information Satyajayant Misra: Guoliang Xue: Aviral Shrivastava: THANK YOU!