1 Epidemic Data Survivability in UWSNs

Slides:



Advertisements
Similar presentations
SECURITY IN SENSOR NETWORKS BY SASIKIRAN V.L. REDDY STUDENT NO
Advertisements

Trust relationships in sensor networks Ruben Torres October 2004.
21-23 November, 2012, 5th IDCS, Wu Yi Shan, China Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks Alex Kesselman, Darek Kowalski MPI Informatik.
Three heuristics for transmission scheduling in sensor networks with multiple mobile sinks Damla Turgut and Lotzi Bölöni University of Central Florida.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Context Compression: using Principal Component Analysis for Efficient Wireless Communications Christos Anagnostopoulos & Stathes Hadjiefthymiades Pervasive.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
EWSN 04 – Berlin, Jan. 20, 2004 Silence is Golden with High Probability: Maintaining a Connected Backbone in Wireless Sensor Networks Paolo Santi* Janos.
Chess Review May 11, 2005 Berkeley, CA Closing the loop around Sensor Networks Bruno Sinopoli Shankar Sastry Dept of Electrical Engineering, UC Berkeley.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Wireless Sensor Network Security Anuj Nagar CS 590.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks Maxim …...…. Raya Reza …….…. Shokri Jean-Pierre..Hubaux LCA1, EPFL, Switzerland The.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Young-sam Kim / M.D Course School of Information Technology Dept. of Computer Engineering Korea University of Technology and Education Location Tracking.
WP4 deliverable Critical Infrastructure Protection: Attack Prevention Solutions and Attacks.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Interacting Viruses in Networks: Can Both Survive? Authors: Alex Beutel, B. Aditya Prakash, Roni Rosenfeld, and Christos Faloutsos Presented by: Zachary.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Dave McKenney 1.  Introduction  Algorithms/Approaches  Tiny Aggregation (TAG)  Synopsis Diffusion (SD)  Tributaries and Deltas (TD)  OPAG  Exact.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Ad Hoc Network.
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Siddhartha Gunda Sorabh Hamirwasia.  Generating small world network model.  Optimal network property for decentralized search.  Variation in epidemic.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
Toward Resilient Security in Wireless Sensor Networks Rob Polak Feb CSE 535.
EASE: An Energy-Efficient In-Network Storage Scheme for Object Tracking in Sensor Networks Jianliang Xu Department of Computer Science Hong Kong Baptist.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Mean Field Methods for Computer and Communication Systems Jean-Yves Le Boudec EPFL Network Science Workshop Hong Kong July
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Vineet Mittal Should more be added here Committee Members:
Place Identification in Location Based Urban VANETs
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Net 435: Wireless sensor network (WSN)
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Large Graph Mining: Power Tools and a Practitioner’s guide
Hongchao Zhou, Fei Liu, Xiaohong Guan
Presentation transcript:

1 Epidemic Data Survivability in UWSNs

ACM WiSec Introduction to UWSNs Information Survivability The SIS Model Modeling Information Survivability in UWSNs Epidemic Data Survivability – Full Visibility – Geometrical model Experimental results Conclusions

ACM WiSec Sporadic presence of the sink Sensors upload info as soon as the sink comes around Applications: – Hostile environments monitoring – Pipelines monitoring

ACM WiSec Sink not always available: – UWSN More subject to malicious attacks than traditional WSN Our targets: To provide a certain level of assurance about INFORMATION SURVIVABILITY To predict the sink COLLECTING TIME To set up a TRADE-OFF between energy consumption, data survivability, and collecting time

ACM WiSec Epidemic Models – Describe the dynamic of a disease at the population scale – Fit very large populations General Approach: – n individuals are partitioned into several compartments – Transition probabilities between any two compartments are given – The spreading of the disease is taken into consideration

ACM WiSec Solution: SI Infected Susceptibles Using i(t) it is possible to predict the number of sick individuals at time t

ACM WiSec A steady state is reached when i‘(t)=0 – The rate of infected individual will remain indefinitely constant In the SIS model there are 2 steady states: – STEADY 0 : i(t)=0 – STEADY 1 : i(t)=1-β/α STEADY 1 is Asymptotically Stable: Perturbing the system will not produce any long term effect

ACM WiSec Data replication process can be modeled as the spreading of a disease in a finite population – No crypto needed – No additional overhead due to the reconstruction of the info We want to achieve: – Data survivability – Optimal usage of sensor resources – Predictable collecting time

ACM WiSec Contributions – Highlighting that the original SIS model may lead to lose the datum, in contrast with theoretical results provided in the literature ( This risk is particularly sensitive when trying to optimize sensor resources usage ) – Providing a probabilistic analysis highlighting the conditions to be satisfied to preserve the data survivability ( for both geometrical and full visibility model ) – Experimental results confirming the findings

ACM WiSec THE NETWORK MODEL UWSN with n sensors ( n large) Evolution time partitioned in rounds – Sensors, attacker and sink play their game in each round Data is transmitted by replication: – In each round, each sensor that stores the datum transmits it with probability α/n to each neighbor I Infected S Susceptibles I Have info S Do not have info

ACM WiSec THE ATTACKER MODEL Search and Erase mobile adversary: – He wants to prevent certain target data from reaching the sink without being detected He is able to move inside the monitored area He compromises the nodes erasing information He does not change sensors’ behavior or destroy them (it would be easily detectable) In each round the attacker compromises up to β percentage of nodes that currently store the target information

ACM WiSec THE SINK MODEL It is able to contact and to download data from γ percentage of nodes belonging to the network in each round We will consider two models: – Global Intermittent Sink – Itinerant Intermittent Sink

ACM WiSec The datum corresponds to a disease Each healthy subject (sensor) can contract the disease (datum) from a sick individual with a certain probability The adversary corresponds to the process of healing from the disease A healed subject can then re- contract the disease (datum) Search and Erase mobile adversary n sensor with replication α/n SIS

ACM WiSec Assuming full visibility among the sensors, in each round: – The prob that a sensor receives a “new” datum can be approximated by: – The prob that a sensor will be compromised is: Therefore, the SIS model with parameters α and β can be used to predict the behavior of such a network

ACM WiSec The SIS model is not always accurate (In the Simulation α=0.95)

ACM WiSec Not accurate when β is close to α -> that means STEADY 1 close to 0 It depends on statistical fluctuations of i(t) Unfortunately, that portion is the most interesting for us: we want to minimize energy consumption

17 Start video

ACM WiSec THEOREM Once reached Steady 1, if α>β/(1- ε), the probability to loose the datum is less than or equal to exp(-ε 2 n/2) The proof is based on the Method of Bounded Differences

ACM WiSec THEOREM Once reached Steady 1, considering a global intermittent sink, if α≥β, the expected time before the sink collects a given datum is equal to (nγ(1- β/α )) -1 Start video

ACM WiSec TRADE-OFF THEOREM Once reached Steady 1, considering a global intermittent sink, and full visibility among sensors, if β/(1- ε) < α< β+(1/x), with 1<x<n, the following three conditions will hold: 1.In each round the expected number of sent messages is less than n/x 2.the probability to loose the datum is less than or equal to exp(-ε2n/2) 3.The expected collecting time will be equal to (nγ(1- β/α )) -1 The following result assures at the same time: Data survivability An optimal usage of sensors resources And a fast and predictable collecting time

21 Start video

ACM WiSec Sensor A can communicate with sensor B if and only if B is inside A’s transmission range Is the SIS model still valid? YES, but we need to revise it Steady States:

ACM WiSec Start video

ACM WiSec THEOREM In the geometrical model, once reached Steady 1, if α>β/(πr n 2 (1- ε) ), the probability to loose the datum is less than or equal to exp(-ε 2 n/2)

ACM WiSec TRADE-OFF THEOREM In the geometrical model, once reached Steady 1, considering a itinerant intermittent sink, and full visibility among sensors, if β/(πr n 2 (1- ε) ) < α< β/(πr n 2 )+(1/x), with 1<x<n, the following three conditions will hold: 1.In each round the expected number of sent messages is less than n πr n 2 /x 2.the probability to loose the datum is less than or equal to exp(-ε 2 n/2) 3.The expected collecting time will be equal to (nγ πr s 2 (1- β/ ( απr n 2 ))) -1

ACM WiSec Information Survivability Sent Messages Collecting Time Theoretical prediction Vs. Experimental results

ACM WiSec Alfa =0.05 Beta = 0.02 Sink and sensor range=0.3 n=100 epsilon=0.22 Survivability simple SIS: alfa>=0.07 Survivability considering our theorem: – With alfa>= 0.09 it is greater 91%

ACM WiSec Start video

ACM WiSec Epidemic models can be used to forecast the behavior of large UWSNs Statistical fluctuation can cause the loss of the datum We provided a theoretically sound result that assures data survivability, minimizes resources consumption, provides a fast collecting time Future Work What if the UWSN becomes a mobile WSN?

ACM WiSec Questions? Thank you!

ACM WiSec Related Work (some) [1] Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, and Gene Tsudik. “Catch Me (If You Can): Data Survival in Unattended Sensor Networks”. In Proceedings of the 6 th IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), pages , Hong Kong, March 17-21, [2] Michele Albano, Stefano Chessa, and Roberto Di Pietro. “A model with applications for data survivability in Critical Infrastructures”. In Journal of Information Assurance and Security, vol. 4(6), pages , June [3] Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, and Gene Tsudik. “Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks”. In Journal of Ad Hoc Networks (Elsevier) - Special Issue on Privacy and Security in Wireless Sensor and Ad Hoc Networks -, vol. 7(8), pages , November [4] D. Ma, C. Soriente and G. Tsudik. “ New Adversary and New Threats in Unattended Sensors Networks ”. IEEE Network, Vol. 23, No. 2, [5] R. Di Pietro, and N. V. Verde. “Introducing Epidemic Models for Data Survivability in Unattended Wireless Sensor Networks”. Second International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN 2011), Lucca, Italy.