1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

RADAR: An In-Building RF-based User Location and Tracking System.
Wearable Badge for Indoor Location Estimation of Mobile Users MAS 961 Developing Applications for Sensor Networks Daniel Olguin Olguin MIT Media Lab.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
1 CS 391L: Machine Learning: Instance Based Learning Raymond J. Mooney University of Texas at Austin.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
Range-Free Sensor Localization Simulations with ROCRSSI-based Algorithm Matt Magpayo
ACCURACY CHARACTERIZATION FOR METROPOLITAN-SCALE WI-FI LOCALIZATION Presented by Jack Li March 5, 2009.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Compressive Oversampling for Robust Data Transmission in Sensor Networks Infocom 2010.
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks Lei Fang (Syracuse) Wenliang (Kevin) Du (Syracuse) Peng Ning (North Carolina State)
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks - Zang Li, Wade Trappe, Yanyong Zhang, Badri Nath Presented By: Vipul.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
TPS: A Time-Based Positioning Scheme for outdoor Wireless Sensor Networks Authors: Xiuzhen Cheng, Andrew Thaeler, Guoliang Xue, Dechang Chen From IEEE.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
1Jana Kosecka, CS 223b EM and RANSAC EM and RANSAC.
RADAR: An In-Building RF-Based User Location and Tracking system Paramvir Bahl and Venkata N. Padmanabhan Microsoft Research Presented by: Ritu Kothari.
Talha Naeem Qureshi Joint work with Tauseef Shah and Nadeem Javaid
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Presented by: Xi Du, Qiang Fu. Related Work Methodology - The RADAR System - The RADAR test bed Algorithm and Experimental Analysis - Empirical Method.
WINLAB SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength Rutgers University Chenren Xu Joint work with Bernhard.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength Chenren Xu†, Bernhard Firner†, Robert S. Moore ∗, Yanyong.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Localization With Mobile Anchor Points in Wireless Sensor Networks
Architectures and Applications for Wireless Sensor Networks ( ) Localization Chaiporn Jaikaeo Department of Computer Engineering.
A Distributed Clustering Framework for MANETS Mohit Garg, IIT Bombay RK Shyamasundar School of Tech. & Computer Science Tata Institute of Fundamental Research.
RADAR: An In-Building RF-based User Location and Tracking System Presented by: Michelle Torski Paramvir Bahl and Venkata N. Padmanabhan.
Algorithms for Wireless Sensor Networks Marcela Boboila, George Iordache Computer Science Department Stony Brook University.
RADAR: An In-Building RF-based User Location and Tracking System.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
A New Hybrid Wireless Sensor Network Localization System Ahmed A. Ahmed, Hongchi Shi, and Yi Shang Department of Computer Science University of Missouri-Columbia.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
RADAR: an In-building RF-based user location and tracking system
Ad Hoc Positioning System (APS) Using AOA Dragos¸ Niculescu and Badri Nath INFOCOM ’03 1 Seoyeon Kang September 23, 2008.
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
Localization and Secure Localization. Learning Objectives Understand why WSNs need localization protocols Understand localization protocols in WSNs Understand.
Secure In-Network Aggregation for Wireless Sensor Networks
Positioning in Ad-Hoc Networks - A Problem Statement Jan Beutel Computer Engineering and Networks Lab Swiss Federal Institute of Technology (ETH) Zurich.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
C. Savarese, J. Beutel, J. Rabaey; UC BerkeleyICASSP Locationing in Distributed Ad-hoc Wireless Sensor Networks Chris Savarese, Jan Beutel, Jan Rabaey.
Network/Computer Security Workshop, May 06 The Robustness of Localization Algorithms to Signal Strength Attacks A Comparative Study Yingying Chen, Konstantinos.
Computer Science 1 Using Clustering Information for Sensor Network Localization Haowen Chan, Mark Luk, and Adrian Perrig Carnegie Mellon University
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Density-Aware Hop-Count Localization (DHL) in Wireless Sensor Networks with Variable Density Sau Yee Wong 1,2, Joo Chee Lim 1, SV Rao 1, Winston KG Seah.
LEMON: An RSS-Based Indoor Localization Technique Israat T. Haque, Ioanis Nikolaidis, and Pawel Gburzynski Computing Science, University of Alberta, Canada.
E. Elnahrawy, X. Li, and R. Martin Rutgers U.
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors
Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran
Lecture 7: Image alignment
Presented by Prashant Duhoon
A special case of calibration
Instance Based Learning
Wireless Mesh Networks
RADAR: An In-Building RF-based User Location and Tracking System
Introduction to Sensor Interpretation
Introduction to Sensor Interpretation
Calibration and homographies
Overview: Chapter 2 Localization and Tracking
Presentation transcript:

1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University Presented by Seung-Min Jung

2 Contents  Introduction  Localization Specific Attacks  Robust Localization Algorithms  Robust Methods – Triangulation & Experiments – RF-Based Fingerprinting & Experiments  Conclusions

3 Introductions(1)  Many sensor applications need the location of wireless devices  Localization infrastructure will become the target of malicious attacks – Localization-specific threats that cannot be address through traditional security services – Need for localization algorithm that are robust to corrupted measurements

4 Introductions(2)  What is the purpose of this paper? – To examine the problem of secure localization – To provide localization-specific, attack-tolerant mechanisms  Basic Idea throughout the paper – To live with bad nodes rather than eliminate the all possible bad nodes  Uniqueness of this paper  Approach of the paper – Robust Statistical Methods for Localization

5 Localization Attacks(1)  Primarily non-cryptographic attacks – Bypass the conventional security countermeasures – c.f.) Cryptographic attack example: Sybil Attack  There are many solutions  Attacks classification by methods – Time of Flight – Signal Strength – Angle of Arrival – Region Inclusion – Hop Count – Neighbor Location

6 Localization Attacks(2)

7 Localization Attacks(3)  Hop-Count Attack Example

8 Robust Localization(1)  Approach: Living with Bad Guys – There is no silver bullet for removing all threats to wireless localization – Make use of the redundancy in the deployment of the localization infra. to provide stability to contaminated measurements

9 Robust Localization(2)  Strategy – Focused localization scheme  Triangulation  RF-Based fingerprinting – Make use of the (statistical) median  as a resilient estimate of the average of aggregated data – Estimate position from physical measurement  e.g.) Signal Strength, Hop Count  Robust statistical method & Less computation overhead

10 Robust Method for Triangulation  Find Device Location by Triangulation Anchor1 (x1,y1) d1 d2 Anchor2 (x2,y2) Wireless device (x0,y0) d3 d4 Anchor3 (x2,y2) Anchor4 (x2,y2) minimum is the wireless device location

11 Review(1)  Regression Analysis Simple Linear Regression Model: Minimize

12 Review(2)  Least Squares (LS) – Find θ that minimize J(θ) – Non-robustness to “outliers” N = total number of samples θ = the parameter to estimate (location) = corresponds to = corresponds to position (xi, yi) of the anchors

13 Review(3)  Residue  Least Median Squares (LMS) – Minimize the median of the residue squares – Robust to outliers – Tolerates up to 50% outliers(errors) – Computation expensive (for exact solution) – Efficient computation  Random subsets of samples to get several candidate  M: # of subset, n: # of samples

14 Robust Method for Triangulation(1)  Attacks – An intruder can disturb the distance d  Change hop count in DV-hop algorithm – A single perturbation can alter the result  Solution – Switch from least squares (LS) estimation to least median squares (LMS) when attacked

15 Robust Method for Triangulation(2)  LMS algorithm – Choose a number of M subsets of size n from the N Samples – Applying LS, find the estimate, j=1, …,M for each subset – Based on the median residual error assign a weight for each  weight=1 if the error is less than a threshold  weight=0 if otherwise – Compute weighted estimated

16 Robust Method for Triangulation(3)  Robust Localization with LMS – When no attack, LS method – When attack, LMS method

17 Robust Method for Triangulation(4)  How to choose n and M for LMS – Idea: at least one subset is “good” (no contamination) with probability: ε = contamination ratio => εN samples are outliers n=4 (3 would be minimum to decide a location) M=20 (depends on computational capabilities) P>=0.99 ε <=30%

18 Robust Method for Triangulation(5)  How to get a location estimate from samples efficiently Nonlinear LS: Linear LS:

19 Robust Method for Triangulation(6)  The comparison between linear LS and nonlinear LS – Use linear LS – reduces computational complexity  As # of samples increase, gap between linear LS and nonlinear LS decrease.

20 Robust Method for Triangulation(7)  Simulation Settings – The strength of the attack: – DV-hop algorithm – N = 30 anchor nodes – Resign: 500 x 500 m 2

21 Robust Method for Triangulation(8) Performance: LS vs. LMS Impact of ε : LS vs. LMS robust up to ε = 30%

22 Robust Method for Triangulation(9)  Example linear regression demonstration => LS performs better than LMS at low attacking strength Outlier data are distinctiveOutlier data are close to inliers

23 Robust Method for Triangulation(10)  An Efficient Switching LS-LMS – The variance indicates the distance between inliers and the outliers – If, apply LMS : normal measurement noise level : estimated data variance T=1.5 T : threshold

24 Robust Method for RF Fingerprinting(1)  Attacks – Corrupted signal strength at one base station  Insert an absorbing barrier between mobile host and base station (e.g. Microwave, Passenger)  Solution – Use a median-based distance metric – “nearest” neighbor: Minimize  RADAR system – in buildings – Multiple base stations

25 Robust Method for RF Fingerprinting(2)  How it works: – Setup phase: form a radio map with signal strengths(fingerprints)  a mobile host broadcasts to base stations  records are written in radio map on central base station and they have the format described below: – (x, y) : mobile position – : received signal strength at the i-th base station – Localization phase: nearest neighbor in signal space (NNSS)  send to central base station  search the radio map and find the best matching fingerprint on central base station Euclidian distance : Median approach:

26 Robust Method for RF Fingerprinting(3) α : attacking strength CDF of error distance for the NNSSMedian of error distance Size: 45m X 25m, 6 base station are installed, 2 base station are attacked α = 0.6

27 Conclusions  As increasing location-based services, localization infrastructure become more vulnerable  To secure localization, this paper – Enumerates a list of attacks that are unique to wireless localization algorithms – Provides robust statistical methods to make localization attack- tolerant  Based on triangulation and RF-based fingerprinting method  Use median approach more robust than the average to outliers

28 Supplements  Median

29 Supplements  Wormhole attack

30 Supplements