High-integrity Sensor Networks Mani Srivastava UCLA.

Slides:



Advertisements
Similar presentations
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Advertisements

June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Denial of Service in Sensor Networks Szymon Olesiak.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Network Coding and Reliable Communications Group A Multi-hop Multi-source Algebraic Watchdog Muriel Médard † Joint work with MinJi Kim †, João Barros ‡
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Scalable Information-Driven Sensor Querying and Routing for ad hoc Heterogeneous Sensor Networks Maurice Chu, Horst Haussecker and Feng Zhao Xerox Palo.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Wireless Sensor Networks Self-Healing Professor Jack Stankovic University of Virginia 2005.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
NSF Critical Infrastructures Workshop Nov , 2006 Kannan Ramchandran University of California at Berkeley Current research interests related to workshop.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
Veronica Eyo Sharvari Joshi. The nodes are left unattended An Adversary can physically compromise the nodesSolution?  Authentication and cryptographic.
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
Secure In-Network Aggregation for Wireless Sensor Networks
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Comments on Networking and Security - Challenges for Environmental Observatories Arthur C. Sanderson Rensselaer Polytechnic Institute NSF Workshop on Cyberinfrastructure.
Analytical Foundations of Networked Computing Kirstie Bellman, Luiz DaSilva, Robert Kleinberg, Michael Mahoney, Amin Saberi, Ion Stoica, Eva Tardos, Shanghua.
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR
Troubleshooting Mesh Networks Lili Qiu Joint Work with Victor Bahl, Ananth Rao, Lidong Zhou Microsoft Research Mesh Networking Summit 2004.
DISTIN: Distributed Inference and Optimization in WSNs A Message-Passing Perspective SCOM Team
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Sensor Coordination using Active Dataspaces Steven Cheung NSF NOSS PI Meeting October 18, 2004.
Security of the Internet of Things: perspectives and challenges
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
In the name of God.
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
FAULT TOLERANT TECHNIQUES FOR WIRELESS AD HOC SENSOR NETWORKS
Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University
Intrusion Tolerance for NEST
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Performance Analysis of the CONFIDANT Protocol
Cross-layer Analysis for detecting Wireless Misbehavior
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Overview: Chapter 2 Localization and Tracking
Information Sciences and Systems Lab
Presentation transcript:

High-integrity Sensor Networks Mani Srivastava UCLA

High Integrity Sensor Networks Information returned may be distorted Malicious attack (privacy, denial of service, corruption) Noise: random error, unavoidable In the sensor In communication Fault: Persistent, transient, intermittent malfunction Easy to counter Hard to learn Hard to counter Easy to learn NEW FOCUS

Key Issues and Challenges Sensor nodes have to be cheap –Fault-tolerant, secure hardware not feasible Unmanned and untethered –No central supervision Severe resource constraints –Limited memory, CPU, b/w Scale Collaborative behavior –Decentralized in-network processing for energy efficiency Open wireless medium Handle misbehaving nodes Existing solutions not portable End-to-End Model? Robust Relaying

Spectrum of Integrity Problems Misbehavior while routing event report Well-studied ad hoc routing problems I detected a car at (x,y) I detected a car at (x,y) I detected a car at (x,y) Misbehaving Node

Spectrum of Integrity Problems It was a false alarm. No such car! I detected a car at (x,y) I detected a car at (x,y) Misbehavior during in-network processing (e.g. generation of bad event, suppression of event) Well-studied fault tolerant computing problems Misbehaving Node

Spectrum of Integrity Problems No car Detected I detected a car at (x,y) No car Detected Misbehavior during information generation (e.g. miscalibrated or compromised sensors) Our focus!

Approach: Reputation-based Framework Key Question: How do nodes trust each other? Embedded in every social network is a web of trust How do human societies evolve? –Principle of reciprocal altruism: Be nice to others who are nice to you –When faced with uncertainties: Trust those who have reputation of being trustworthy Our Approach: Form a similar community of trustworthy nodes in the network over time Why? –Sensor networks already follow a community model –Successful centralized instantiation in networks such as E-Bay But missing element is trust as nodes are dumb –Trust even nodes that are fault or compromised by internal adversaries

Basic Concept - Learning from Experience n Observe the action of other nodes – Watchdog mechanism n Develop a perception of other nodes over time – Reputation n Predict their future behavior – Trust n Cooperate/Non-cooperate with trustworthy nodes – Behavior n Share experiences to facilitate community growth – Second hand info Watchdog mechanism Reputation TrustBehavior Second hand information

Skeleton Structure of RFSN Algorithm Development Monitoring, Data Analysis Statistics…. Networking, Cryptography Development of high integrity sensor networks will be a combination of techniques from different fields Watchdog mechanism Reputation TrustBehavior Second hand information Decision theory Bayesian Analysis…

Bayesian Formulation of Sensor Integrity Reputation representation for neighbors as beta distribution –two parameters (cooperation, non-cooperation) Easy to compute reputation updates and integration using belief theory –Updates –Integration Reputation propagation via public key crypto for node authentication Trust to estimate future cooperative behavior  of node j with reputation Beta(  j,  j ) Classifying node behavior as good/bad by simple threshold on trust New reputation, ?? Old reputation, Beta(  j,  j ) ????

Conclusions Reputation-based approach is –Scalable: localized algorithms –General: communication, sensing, processing –Unified: faulty, malicious, noisy But insufficient for certain malicious attacks on integrity –Context-aware adversaries –Resource consumption attacks –Compromises of the physical world Network level techniques? Multimodality? No Event