Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.

Slides:



Advertisements
Similar presentations
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
Advertisements

Directed Diffusion for Wireless Sensor Networking
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Queensland University of Technology CRICOS No J Mitigating Sandwich Attacks against a Secure Key Management in WSNs for PCS/SCADA Hani Alzaid, DongGook.
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
1 Routing Techniques in Wireless Sensor networks: A Survey.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Joint work with Xinran Wang, Sencun Zhu and Guohong Cao Dept. of Computer Science &
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Phero-Trail: A Bio-inspired Location Service for Mobile Underwater Sensor Networks Luiz F. Vieira, Uichin Lee, Mario Gerla UCLA.
Location-Aware Security Services for Wireless Sensor Networks using Network Coding IEEE INFOCOM 2007 최임성.
TTDD: A Two-tier Data Dissemination Model for Large- scale Wireless Sensor Networks Haiyun Luo Fan Ye, Jerry Cheng Songwu Lu, Lixia Zhang UCLA CS Dept.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Haiyun Luo, Fan Ye, Jerry Cheng, Songwu Lu, Lixia Zhang
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
An adaptive framework of multiple schemes for event and query distribution in wireless sensor networks Vincent Tam, Keng-Teck Ma, and King-Shan Lui IEEE.
LEDS:Providing Location –Aware End-to-End Data Security in Wireless Sensor Networks By Prasad Under Esteemed Guidences Of; Prof Mr.A.Nagaraju.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
The Sybil Attack in Sensor Networks: Analysis & Defenses
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Problem Wensheng Zhang, Dr. Guohong Cao, and Dr. Tom La Porta Example: Battlefield Surveillance Challenges Small Sensing Range Limitations in sensor nodes.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
J. Hwang, T. He, Y. Kim Presented by Shan Gao. Introduction  Target the scenarios where attackers announce phantom nodes.  Phantom node  Fake their.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Ching-Ju Lin Institute of Networking and Multimedia NTU
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Grid-Based Energy-Efficient Routing from Multiple Sources to Multiple Mobile Sinks in Wireless Sensor Networks Kisuk Kweon, Hojin Ghim, Jaeyoung Hong and.
Toward Resilient Security in Wireless Sensor Networks Rob Polak Feb CSE 535.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Structure-Free Data Aggregation in Sensor Networks.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
TTDD: A Two-tier Data Dissemination Model for Large- scale Wireless Sensor Networks Haiyun Luo, Fan Ye, Jerry Cheng, Songwu Lu, Lixia Zhang (UCLA) Mobicom.
1 Hierarchical Data Dissemination Scheme for Large Scale Sensor Networks Anand Visvanathan and Jitender Deogun Department of Computer Science and Engg,
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Presentation transcript:

Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.

Outline Introduction and Background On resiliency of existing solutions Design Analysis and Simulation Results Discussions and Conclusions

Introduction Target problem: Compromised nodes Report fabrication attacks Existing solution and their problem Multiple parties endorse an legitimate event; en-route filtering. Problem: Threshold breaks down. Their approach: use location-based information to achieve resilience.

General Scenario Large scale sensor network that monitors a vast geographic terrain. Size and shape of the terrain is known a priori Sensor nodes are uniformly randomly deployed to the terrain. Once deployed, each node can obtain its geographic location via a localization scheme. One resourceful sink.

General En-route Filtering Framework Initial: A node store some keys, it use its own key to generate a Message Authentication Code (MAC) attached to an event report. It use others keys to verify the report forwarded to it. Each key has a unique index. Own keys : k1, … Others keys: k2, k3, k4, …

General En-route Filtering Framework On event occur: A legitimate report must carry m distinct MACs. Multiple nodes sense the event and collaborate generate (one or more) reports with more than m MACs. Report | index3 | MAC3 Report | index1 | MAC1 Report | index5 | MAC5 Report | index2 | MAC2 Report | index4 | MAC4 Report | index6 | MAC6 | index1 | MAC1 Report | index3 | MAC3 | index4 | MAC4

General En-route Filtering Framework Intermediate nodes: Received Report Check if it has more than m MACs Check if it can verify the MACs Is the MACs valid? Forward packet Drop No Yes

General En-route Filtering Framework Sink verification: Sink knows every keys, it can verify every MACs.

Outline Introduction and Background On resiliency of existing solutions Design Analysis and Simulation Results Discussions and Conclusions

Interleaved Hop-by-Hop Authentication (IHA) Design parameter: m Sensing cluster with at least m+1 nodes and a cluster head. Along the path, two nodes that are m+1 hops away are associated by a pair-wise key. Threshold: m.

Interleaved Hop-by-Hop Authentication (IHA)

Statistical En-route Filtering (SEF) Global key pool is divided into m partition. Each node pre-loaded with a few keys randomly chosen from a single partition. When an event occurs, detecting nodes jointly endorse the report with m MACs, each using a key in a different partition. Thershold: attackers obtain keys from m partition.

Outline Introduction and Background On resiliency of existing solutions Design Analysis and Simulation Results Discussions and Conclusions

Location-Based Resilient Security (LBRS) Terrain divided into geographic grid and each cell binded with L keys. Each node stores one key for each of its sensing cells. Each node randomly chosen a few remote cells based on location information as its verifiable cells, and store one key for each.

Location-Based Resilient Security (LBRS)

A legitimate report is jointly generated by detecting nodes, and should carries m distinct MACs. Intermediate nodes and sink verification processes are similar to general framework. Two more new check: All m distinct MACs should bonded to one cell. Location attached in the report consistent with the location of MACs

Location-binding key generation Location-binding key generation: Terrain divided into geographic grid and each cell binded with L keys. How to construct a grid? How to derive keys based on the location information in a computationally efficient manner?

How to construct a grid Construct a virtual square grid uniquely defined by two parameters: a cell size C, and a reference point (X 0,Y 0 ) (e.g., sink location). Denote a cell by the location of its center, (X i,Y j ), such that

How to derive keys Preload each node with: cell size C, reference (X 0,Y 0 ), master secret K I. Once deployed, a node first obtains its geographic location through a localization scheme. Derives keys during bootstrapping phase with H() is a one-way hash function. (X i,Y j ) is the location of the cell.

Location-guided key selection A node defines an upstream region based on location information and only forward packet for its upstream region. After defined upstream region, for each cell in its upstream region, select it as a verifiable cell with probability d is the node’s distance to the sink, D max is the max distance between network edge and sink

Location-guided key selection

How to select upstream region and accommodate node failures? Designed to work with geographic routing protocol. Upon moderate node failures, geographic routing protocol find a closer detoured paths. Define beam width b. Use b and d (distance to sink) to define upstream region.

Benefits Damage is bonded to some local cells. Randomized multiple compromised nodes are difficult to compromise a cell. Location-guided key selection can reduce the keys stored on one node and still achieve reasonable filtering power.

Outline Introduction and Background On resiliency of existing solutions Design Analysis and Simulation Results Discussions and Conclusions

Parameter settings

Analysis — Filtering Effectiveness One node compromised. Detection Ratio: close to one. Filtering Position:

Analysis — Key Storage Overhead

Simulation Platform: own simulator by Parsec language 30K nodes, 5Km x 5Km field, 100m x 100m cell. Each simulation repeated 1000 times.

Simulation — Resiliency to random node compromise Compromised nodes randomly scattered. How many cells will be compromised.

Simulation — Resiliency to random node compromise How many distinct keys compromised in cells N c = Number of compromised nodes

Simulation — Filtering Power K c = number of compromised keys in a cell

Simulation — Delivery Ratio

Outline Introduction and Background On resiliency of existing solutions Design Analysis and Simulation Results Discussions and Conclusions

Discussion Prototype implementation: could all these fit into sensor nodes?? Platform: MICA2 Code size: 9358 bytes ROM, 665 bytes RAM Execution time: 100x100 cells Bootstrapping: 2.8 sec MAC generation and verification: 10 ms

Discussion (Cont ’ ) Sensor deployment: Location information is known? Location information is required? Routing Upstream region estimation is designed to work with geographic routing protocols. They found some non-geographic routing protocols (Directed Diffusion, GRAB) fit well with this model. Require future study.

Conclusions If location is a required information, embedded keys with locations seem to be obvious. Upstream region model is a good way to reduce the key storage and still maintain the filtering power. They did quite a bit of analysis and simulations to verify their claims. Security setting is based on application scenario.