Veronica Eyo Sharvari Joshi. The nodes are left unattended An Adversary can physically compromise the nodesSolution?  Authentication and cryptographic.

Slides:



Advertisements
Similar presentations
Security Issues in Wireless Sensor Networks -Ninad Naik.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Intrusion Detection in Wireless Sensor Networks Group Meeting Spring 2005 Presented by Edith Ngai.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Applied Cryptography for Network Security
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Adaptive Traffic Light Control with Wireless Sensor Networks Presented by Khaled Mohammed Ali Hassan.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
Monitoring for network security and management Cyber Solutions Inc.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
EAACK—A Secure Intrusion-Detection System for MANETs
A Review by Raghu Rangan WPI CS525 September 19, 2012 An Early Warning System Based on Reputation for Energy Control Systems.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Protecting Privacy in WLAN with DoS Resistance using Client Puzzle Team 7 Yanisa Akkarawichai Rohan Shah CSC 774 – Advanced Network Security Prof. Peng.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Forensics Readiness for Wireless Body Area Network (WBAN) System
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
High-integrity Sensor Networks Mani Srivastava UCLA.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Ad Hoc Network.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
1 Thrust 5: Secure Wireless Networking Technologies For future generation wireless packet networks, two most important aspects need to be addressed: QoS.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Prepared by: Ameer Sameer Hamood University of Babylon - Iraq Information.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Presented by Edith Ngai MPhil Term 3 Presentation
TAODV: A Trusted AODV Routing Protocol for MANET
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
High Performance Computing Lab.
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

Veronica Eyo Sharvari Joshi

The nodes are left unattended An Adversary can physically compromise the nodesSolution?  Authentication and cryptographic mechanisms alone can not solve this problem  The trust system was used for security in the Wireless sensor network

 These systems identify malicious nodes, computes a trust rating of the node and exclude the nodes from the network.

 First trust based model designed and developed for sensor networks.  It makes use of the watchdog mechanism to collect data and monitor different events going on in the node, to build reputation(R ij )of the node and then get the trust rating (T ij )of the node.

T ij = P j + 1 P j + N j + 2 P j = Positive outcome N j = Negative outcome RFSN can not distinguish between negative and positive events in the node.

Addressed the uncertainty issue but still cooperated with the malicious nodes. Has one value of trust rating for different events.

Event based trust framework is proposed to detect malicious sensor nodes A new protocol ESTN is developed A new direction in trust system for wireless sensor network is proposed

 The trust rating is dependent on different events in the node  Each event on the sensor node has a different trust rating  A sensor node has several trust ratings stored in its neighbor nodes

 The agent node  Classifies all the events and then builds a reputation table of the nodes  A trust table is then computed from the reputation table and broadcast to all the nodes.

 Event E happened in sensor nodes.  Let E={e 1,e 2,e 3,....e n }  Event function.  F={F(e i )| ∀e i ∈E,F(e i ) ≥1,F(e i )∈N}  Positive outcome p i  Negative outcome n i  is binary event for a certain event e i of sensor node.

 Define reputation space of event e i  RS(e i )={ |t i =p i +n i ;p i =F(e i ) or n i =F(e i ) ∀e i ∈E}  P (x)= (p i +n i +1)! X i ^(p i ) (1-X i )^n i p i ! n i !

 Reputation:  Reputation: opinion of one entity about another  Trust:  Trust: Expectation of one entity about another.  Reputation space to Trust space  Let T i ( )=(pt i,nt i,ut i ) be the transformation from binary event to trust rating (pt i,nt i,ut i )

 while True  For all the nodes s and t in the agent node radio  range  For event e1 to en  Agnet node gets the binary event  Agent computes the trust rating Tsti;  If (Tsti) < a certain value  Break;  End if  End for  The agent broadcasts the trust rating Tsti;  End for  If the time is the begin of window time  The agent broadcasts all the trust rating Tsti;  End If  End While

 Modules used: ◦ Wireless sensor networks (x A, x B …x N ) ◦ Agent nodes (x i ) ◦ Intruder nodes (x m ) ◦ Traffic data (  ) ◦ Events generator

 Need to design a special Agent node  Higher processing power for the agent node  Complex architecture  Protection of agent node

 Protect agent node from discovery.  Broadcast trust rating to the remote monitoring facility.

 This trust model can be used in large scale wireless networks  It provides a more accurate guarantee along with cryptographic mechanisms in detecting malicious nodes of different events in sensor networks

 Questions?