Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
1 ECE 776 Project Information-theoretic Approaches for Sensor Selection and Placement in Sensor Networks for Target Localization and Tracking Renita Machado.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
1 Sensor Deployment and Target Localization Based on Virtual Forces Y. Zou and K. Chakrabarty IEEE Infocom 2003 Conference, pp ,. ACM Transactions.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Movement-Assisted Sensor Deployment Author : Guiling Wang, Guohong Cao, Tom La Porta Presenter : Young-Hwan Kim.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
Routing in WSNs through analogies with electrostatics December 2005 L. Tzevelekas I. Stavrakakis.
Target Tracking Algorithm based on Minimal Contour in Wireless Sensor Networks Jaehoon Jeong, Taehyun Hwang, Tian He, and David Du Department of Computer.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
IEEE TSMCA 2005 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS Presented by 황재호.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Lifetime and Coverage Guarantees Through Distributed Coordinate- Free Sensor Activation ACM MOBICOM 2009.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
A Sweeper Scheme for Localization and Mobility Prediction in Underwater Acoustic Sensor Networks K. T. DharanC. Srimathi*Soo-Hyun Park VIT University Vellore,
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Network Aware Resource Allocation in Distributed Clouds.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
1 Deploying Wireless Sensors to Achieve Both Coverage and Connectivity Xiaole Bai*, Santosh Kumar*, Dong Xuan*, Ziqiu Yun +, Ten H. Lai* * Computer Science.
KAIS T Deploying Wireless Sensors to Achieve Both Coverage and Connectivity Xiaole Bai, Santosh Kumar, Dong Xuan, Ziqiu Yun and Ten H.Lai MobiHoc 2006.
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan and Kee-Chaing Chua National University of.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Secure In-Network Aggregation for Wireless Sensor Networks
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Random Key Predistribution Schemes for Sensor.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Ching-Ju Lin Institute of Networking and Multimedia NTU
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
SenSys 2003 Differentiated Surveillance for Sensor Networks Ting Yan Tian He John A. Stankovic Department of Computer Science, University of Virginia November.
Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
KAIS T Sensor Deployment Based on Virtual Forces Reference: Yi Zou and Krishnendu Chakarabarty, “Sensor Deployment and Target Localization Based on Virtual.
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in WSNs Azzedine Boukerche, Xin Fei PARADISE Research Lab Univeristy.
/ 24 1 Deploying Wireless Sensors to Achieve Both Coverage and Connectivity Xiaole Bai Santosh Kumar Dong Xuan Computer Science and Engineering The Ohio.
Scalable Coverage Maintenance for Dense Wireless Sensor Networks Jun Lu, Jinsu Wang, Tatsuya Suda University of California, Irvine Secon ‘ 06.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Localization for Anisotropic Sensor Networks
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Presented by Prashant Duhoon
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, November , 2005 Paper Review Jun Sup Lee Dependable Software LAB at KAIST Nov. 21 th 2006

Agenda  Introduction  Problem Statement  Contribution  Contents  Background  Static Sensor deployment  Location Adjustment  Conclusion  Q&A

Introduction | Sensor Network and Security  Sensor Network – Great Potential in application  Habitat monitoring  Wildlife tracking  Building surveillance  Military combat  Important design Issue  Efficient sensing coverage  Node-to-node or node-to-base-station communications  Security in information gathering and relay by the sensors  This paper shows that the system performance on these aspects  How the sensors are deployed in the field  How the sensor locations can be adjusted after the initial deployment

Introduction | Sensor Network and Security | characteristic  Sensing and Communication on Sensor Node  Limitation of sensing range and the communication range  because of physical characteristics  Placement of sensor nodes will have great impacts on  sensing coverage  communication connectivity  Rely on Wireless Transmission  malicious adversaries could intercept the communications  Modify the data packets, or inject falsified packets.  Message authentication code with cryptographic  Symmetric key cryptography  lower computational complexity  Preferred in practice  Key Pre-distribution

Introduction | Contribution  Analyze Impact on secure connectivity and sensing coverage  Static Sensor deployment  Hexagon lattice topology  Square lattice topology  Location adjustment after deployment  VFSec algorithm  Weighted Centroid algorithm  A new framework for coordinated updates of sensor locations.  Jointly optimize sensing coverage and secure connectivity  Current Work  Optimize the sensing coverage  Do not concern secure sensor communication

Background | Sensing Coverage and Sensing Capability  Sensing Coverage  Rs : Sensing radius  d(*,*) : Euclidean distance  S = 1 : sensor has the capability to sense  S = 0 : otherwise  Sensing Capability  Rc : Communication radius  d(*,*) : Euclidean distance  T = 1 : link exists  T = 0 : otherwise

Background | Efficient Sensing in Static Deployment  Static Deployment  Sensing efficiency ratio – (Circle covering problem : covering density, covering thickness ) ,,  Acol : actual covered area by all the sensor nodes  Aseq : sum of the area covered by each individual sensor  Lowerbound : (by hexagon lattice)  Nomalize distance D1  D1 : distance to its horizontal/vertical neighbor in Square lattice deployment  D2 : distance to its diagonal neighbor in Square lattice deployment  D3 : distance from a node to its six neighbors in hexagon lattice deployment

Background | Key Pre-distribution for Sensor Networks  Key pre-distribution in WSNs  Loading Keys into sensor nodes prior to deployment  Two nodes find a common key between them after deployment  Challenges  Memory/Energy efficiency  Security: nodes can be compromised  Scalability: new nodes might be added later Each node randomly selects R keys (Key Ring) N1 N2… Key Pool P N4N3 When |P| = 1000, R=20 / 30 p (two nodes have a common key) = / 0.605

Lattice-Structured Deployment | Fundamental Relations Between Deployment Lattices  Expected number of secure links versus communication radius  Square lattice and Hexagon lattice, key-pre distribution  : Key sharing probability

Lattice-Structured Deployment | Secure Connectivity Under Perturbed Deployment Lattice  Expected number of secure links per node versus communication radius.  Actual deployment location :  r : zero-mean distribution with Gaussian  Probability that a designed neighbor in the hexagon lattice can establish a secure link with the center node :  expected number of secure links for the center node (hexagon):  expected number of secure links for the center node (square):  A : horizontal/vertical neighbors  B : diagonal neighbors

Lattice-Structured Deployment | Secure Connectivity Under Perturbed Deployment Lattice  Expected number of secure links per node versus communication radius.  Key ring 100 / Key pool : 1200

Location Adjustment : Virtual Force | Effect on Secure Connectivity by the Existing Approach  Virtual Force algorithm  Maximize total sensing coverage  : Unit-length pointing from the location of ni to nj.  Move Node ni  Direction :  Magnitude :

Location Adjustment : Virtual Force | Effect on Secure Connectivity by the Existing Approach  Impact of location adjustment to the establishment of secure links using VFA  Half of the nodes are no longer connected with the largest connected group, which reduces the capability of secure communications between the sensor nodes.

Location Adjustment : VFSec | VFSec  VFSec Algorithm  Performance metric : ( : total sensing coverage, : secure link per node)  While average number of secure links per node is around 3  W1 = 1  W2 = 1/3  VFSec

Location Adjustment : VFSec | Simulation Results  Comparison of VFA and VFSec with Uniform random initial deployment

Location Adjustment : VFSec | Simulation Results  Comparison of VFA and VFSec using square deployment lattice under Gaussian deployment deviation.  Comparison of deployment lattice using VFSec under Gaussian deployment deviation.

Location Adjustment : WTC | Weighted Centroid Algorithm  Weighted Centroid Algorithm  1. Compute Voronoi cell V  2. Generate uniform grid points  3. Assign weight using assignment procedure  4. Compute location :  5. Compute the movement vector

Location Adjustment : WTC | Simulation Results  Comparison of the WTC and minmax algorithm, small Gaussian deployment deviation, hexagon lattice - key pre-distribution.  Comparison of the WTC and minmax algorithm, large Gaussian deployment deviation, hexagon lattice - key pre-distribution.

Location Adjustment : WTC | Simulation Results  Comparison of the weighted centroid and minmax algorithm, uniform random deployment with basic key pre-distribution.

Conclusion | Conclusions and outlook of this paper  Static sensor deployment  Square / Hexagon lattice  two lattice topology exhibits range-dependent performance  there is no all-time winner in the context of secure connectivity  Location Adjustment  VFSec / WTC  WTC algorithm outperforms under moderate to abundant node density  VFSec algorithm outperforms than the existing virtual force based algorithms  WTC is more suitable to be performed by individual sensors than VF  Performing WTC generally requires more computation than performing schemes based on virtual force

Thank you  Question?  For more discussion:  Rm4428,