Problem Wensheng Zhang, Dr. Guohong Cao, and Dr. Tom La Porta Example: Battlefield Surveillance Challenges Small Sensing Range Limitations in sensor nodes.

Slides:



Advertisements
Similar presentations
A Hierarchical Multiple Target Tracking Algorithm for Sensor Networks Songhwai Oh and Shankar Sastry EECS, Berkeley Nest Retreat, Jan
Advertisements

Directed Diffusion for Wireless Sensor Networking
Scalable Content-Addressable Network Lintao Liu
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Wensheng Zhang and Guohong Cao. Dynamic Convoy Tree-based Collaboration (DCTC) 1. Constructing the Initial Convoy Tree  Apply existing root election.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Introduction to Wireless Sensor Networks
SENSOR NETWORKS ECE 654 Irene Ioannou. Sensor networks communication architecture.
산업 및 시스템 공학과 통신시스템 및 인터넷보안연구실 김효원 Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks Wensheng Zhang and Guohong Cao.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Xinran Wang, Sencun Zhu and Guohong Cao The Pennsylvania State University MobiHoc’ 06.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Joint work with Xinran Wang, Sencun Zhu and Guohong Cao Dept. of Computer Science &
Computer Science SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao April 24, 2007.
TTDD: A Two-tier Data Dissemination Model for Large- scale Wireless Sensor Networks Haiyun Luo Fan Ye, Jerry Cheng Songwu Lu, Lixia Zhang UCLA CS Dept.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
Haiyun Luo, Fan Ye, Jerry Cheng, Songwu Lu, Lixia Zhang
The Cougar Approach to In-Network Query Processing in Sensor Networks By Yong Yao and Johannes Gehrke Cornell University Presented by Penelope Brooks.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Charlmek Intanagonwiwat Ramesh Govindan Deborah Estrin Presentation.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Direct movement has long relocation time and overuses the redundant sensor Motivation Coverage under random deployment Coverage under clustering All the.
An adaptive framework of multiple schemes for event and query distribution in wireless sensor networks Vincent Tam, Keng-Teck Ma, and King-Shan Lui IEEE.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Protocols for Self-Organization of a Wireless Sensor Network K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie IEEE Personal Comm., Oct Presented.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Ubiquitous Networks WSN Routing Protocols Lynn Choi Korea University.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Benjamin AraiUniversity of California, Riverside Reliable Hierarchical Data Storage in Sensor Networks Song Lin – Benjamin.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Data Centric Storage: GHT Brad Karp UCL Computer Science CS 4C38 / Z25 17 th January, 2006.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Ad Hoc Network.
Tufts Wireless Laboratory Tufts University School Of Engineering Real-Time Data Services for Cyber Physical Systems Zhong Zou.
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
Data Dissemination in Sensor Networks Challenges and Solutions by Sovrin Tolia.
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
Ching-Ju Lin Institute of Networking and Multimedia NTU
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
EASE: An Energy-Efficient In-Network Storage Scheme for Object Tracking in Sensor Networks Jianliang Xu Department of Computer Science Hong Kong Baptist.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Wireless Sensor Networks
Wireless Sensor Networks
Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University
Haiyun Luo,Fan Ye, Jerry Cheng,Songwu Lu, Lixia Zhang
Wireless Sensor Network Architectures
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Indirect Communication Paradigms (or Messaging Methods)
Indirect Communication Paradigms (or Messaging Methods)
Presentation transcript:

Problem Wensheng Zhang, Dr. Guohong Cao, and Dr. Tom La Porta Example: Battlefield Surveillance Challenges Small Sensing Range Limitations in sensor nodes Short Comm. Range Constrained Energy Supply Prone to Failure, being Compromised Requirements of Applications Mobile Data Consumer Dynamic Data Source Accurate Information Complete Information Energy Efficiency Collaboration Fault Tolerance Security Mobility Support Nodes individually detect their surrounding area, and generate low-level sensing data. In many applications, a wireless network needs to detect and track mobile targets, and disseminate the sensing data to mobile sinks. Individual sensing data are collected and fused to form more complete and concise high-level sensing data. High-level sensing data are stored in network. High-level sensing data are disseminate to sinks when being queried. Security Mechanisms Our Solution: A Data-Centric Framework Dynamic Convoy Tree-Based Collaboration (DCTC) Nodes detecting the same target form a tree. Relying on the tree, Root can collect data from other nodes, and process the data. As the target moves, the convoy tree is reconfigured by adding some nodes and pruning some other nodes. The tree is reconfigured as its root becomes faraway from the target More Research on DCTC Conservative vs. Optimistic (Prediction-based) Tree Expansion and Pruning Schemes Complete vs. Interception-based Tree Reconfiguration Schemes Sequential (Global) vs. Localized Tree Reconfiguration Schemes (when nodes can adapt their transmission power) Motivations for DCTC Why Dynamic? -- The set of nodes involved in collaborations is dynamic Why Tree? -- To efficiently facilitate data collection and fusion Basic Idea of DCTC Localized Collaboration-Based Security Mechanisms Collaborative Misbehavior Detection Individual detection: each node monitors its neighbors Discover misbehavior ? Opinion collection: initiator sends out request to other neighbors (co-detectors) of the suspect to collect their opinions on the suspect. Diagnosis and result notification: collected opinions are processed to decide whether the suspect is misbehaving, and then sends out the result. YES Data Dissemination with Adaptive Ring-Based Index (ARI) data source sink source sink Why not Previous Schemes? External storage-based: unnecessary transfers of data. (DCS has the similar problem) Directed Diffusion: flooding availability information. (TTDD has the similar problem.) Type k target Query Response (data) Detecting node Storing node register sink Type k index node node closest to Loc=hash(k) On-demand data transferring Type k target Storing node Query Response (data) Detecting node Type k index node Query Supporting sink mobility sink move! Why Index-Based Scheme? Supporting source mobility LkLk Type k index nodes are connected via forwarding nodes to form an index ring encircling the index center (Lk) The reliability of the index nodes can be improved due to adaptive replication. Why Ring? B A CD E F LkLk B’C’D’ G’ E’ F’ H’ LkLk to source Adapting the index ring is transparent to sinks and sources. Dealing with cluster failures LkLk to source <r LkLk Source B A CD E F LkLk B’C’D’ Overloaded! Load Balance TransparencyFault Tolerance Index node sink Query Response (data) target Register target target move! Ongoing Work: Heterogeneous Strategy for storing Data in Network Node-group Pair-wise Key-based Data Authentication (and False Data Filtering) keys known by a group keys known by a node key space each node-group pair shares a key a sender uses the keys it known to validate outgoing messages a receiver or an intermediate node verify messages using the keys it known polynomials are used to generate and maintain keys. Collaborative Key Updating key points: Keys of future versions are preloaded  avoid updating-time key transmissions The future keys of a node are collaboratively maintained by the node and its neighbors  prevent a single node from stealing future keys Random organization of keys  prevent off-line analysis. sink