Sensor Networks: privacy-preserving queries Nguyen Dinh Thuc University of Science, HCMC

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Trust relationships in sensor networks Ruben Torres October 2004.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Xinran Wang, Sencun Zhu and Guohong Cao The Pennsylvania State University MobiHoc’ 06.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
IC-29 Security and Cooperation in Wireless Networks 1 Secure and Robust Aggregation in Sensor Networks Parisa Haghani Supervised by: Panos Papadimitratos.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
An Energy-Efficient Data Storage Scheme for Multi- resolution Query in Wireless Sensor Networks 老師 : 溫志煜 學生 : 官其瑩.
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
SafeQ: Secure and Efficient Query Processing in Sensor Networks Fei Chen and Alex X. Liu Department of Computer Science and Engineering Michigan State.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Computer Science Secure Hierarchical In-network Data Aggregation for Sensor Networks Steve McKinney CSC 774 – Dr. Ning Acknowledgment: Slides based on.
CS2510 Fault Tolerance and Privacy in Wireless Sensor Networks partially based on presentation by Sameh Gobriel.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
Secure Aggregation for Wireless Networks Lingxuan Hu David Evans [lingxuan, Department of Computer.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Aggregation in Sensor Networks
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Optimal Base Station Selection for Anycast Routing in Wireless Sensor Networks 指導教授 : 黃培壝 & 黃鈴玲 學生 : 李京釜.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Taiming Feng, Chuang wang, Wensheng Zhang and Lu Ruan INFOCOM 2008 Presented by Mary Nader.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Energy-Efficient Wake-Up Scheduling for Data Collection and Aggregation Yanwei Wu, Member, IEEE, Xiang-Yang Li, Senior Member, IEEE, YunHao Liu, Senior.
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Net 435: Wireless sensor network (WSN)
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Aggregation.
Presentation transcript:

Sensor Networks: privacy-preserving queries Nguyen Dinh Thuc University of Science, HCMC

Outline Introduction Privacy-preserving queries in sensor networks Privacy-preserving queries in two-tiered networks

Sensor networks introduction Wireless sensor network: – is a distributed system consisting of a large number of sensor notes – deployed in adverse environments that are being monitored Sensor notes: – collect and report data to the base station – use wireless multi-hop route In many application of sensor networks, some of the biggest concerns are efficiency, security and privacy preserving

Privacy-preserving queries: system model: network assumptions Network assumptions We consider a WSN consisting of 1 base station BS and n sensor nodes, denoted as N i BS has much more computation, storage and energy capabilities than sensor nodes BS and sensor nodes communicate with one another by using wireless medium Not all sensor nodes can directly communicate with BS, in such cases they need to use multi-hop path Sensor nodes don’t know the network topology but each sensor node knows its parent and children nodes

Privacy-preserving queries: system model: security assumptions Security assumptions – Assume that BS is trustworthy while any sensor node could be compromised – We only consider the attacks that outsiders or compromised sensor nodes eavesdrop sensor data, and reveal the data they receive/forward to the adversary Design goals – Privacy/confidentiality of querying results – Privacy of raw and intermediately data – efficiency

Privacy-preserving queries: solutions for range queries SMART (W. He et al) – A node’s data reading is partitioned into several pieces – These pieces are send to different nodes in network – BS receives all pieces and the summation of all data in network is revealed Scheme of Feng et al. – Each nodes i shares a secret S i with BS – Instead of reporting d i, sensor node i reports v i =d i +S i – From  v i =  d i +  S i, BS can deduce summation of all sensor data. W.He, X.Liu, H.Nguyen, K.Nahrsteld, and T.Abdelzaher, PDA: Privacy-preserving Data Aggregation in wireless sensor networks, Infocom, May 2007, Anchorage, Alaska T.Feng, C.Wang, W.Wang, and L.Ruan, Confidentiality protection for distributed sensor data aggregation, Infocom 2008, April 2008, Phoenix, Arizona

Privacy-preserving queries: solutions for answering exact queries: ideas General ideas Let x=(d 1,…,d n )  {1,…,2 m -1} n Let A nxn =[e 1 …e n ] where e i : i th column of A nxn Let x={d 1,…,d n } be the values of all the sensor nodes in the system, d i  {1,…,2 m -1}, (i=1,…,n) corresponds to the value of node N i BS maintains a non-singular matrix A nxn and each of sensor nodes N i has m successive columns When the sensor nodes propagate the values up the tree to the BS, they can help in reconstructing x

Privacy-preserving queries: solutions for answering exact queries: preparation System preparation before network deployment Assume that each sensor value is a binary number of m-bit length d i =(c i1 …c im ) BS is preloaded a binary matrix matrix A TxT, T=mxn Each sensor N i maintains m vectors of size Tx1 of A: {e i 1,…,e i m }, randomly chosen among T such vectors Note that in order to keep the individual reading secure, BS must not know the distribution of the vector. This can be done by a trusted third party

Privacy-preserving queries: solutions for answering exact queries: data collection Data collection Each sensor knows the time at which it needs to send its report to BS If sensor node is a leaf node: – Computes y=(y i1,…,y in )=c i1 e i 1 +…+c im e i m where d i =(c i1 …c im ) is value of sensor d i – Sent result to its parent If sensor is an intermediate node: – Computes y=(y i1,…,y in )=c i1 e i 1 +…+c im e i m where d i =(c i1 …c im ) is value of sensor N i – Sent z=y+z 1 +…+z k to its parent, where z i is report data of its i th child BS, upon receiving reports from all of its children (b i ’s), solves Ax=b to deduce n values of n nodes, where b=  i b i

Privacy-preserving queries: solutions for answering exact queries: a baby example BS N4N4 N5N5 N3N3 N2N2 N1N1 x4x4 x3x3 x5x5 x2x2 x1x1 {A 1,A 2 }, d=2{A 3,A 4 }, d=3 {A 5,A 6 }, d=2 {A 9,A 10 }, d=3 {A 7,A 8 }, d=1

Privacy-preserving queries: solutions for answering exact queries: discussion Advantages Accuracy. It can answer all queries without revealing each individual data of each sensor Privacy. Each node only knows its values No key distribution Aggregation. Topology independence Low computer overhead Disadvantages Large size data are transmitted Hai Vu, Thuc Nguye, Neeraj Mittal, and S.Venkatesan, PEQ: A privacy-preserving scheme for answering exact queries in distributed sensor data networks. Proceedings of the th IEEE International Symposium on Reliable Distributed Systems, pp , 2009.

Privacy-preserving queries in 2-tiered WSN system model We consider a WSN consisting of storages nodes and regular sensors Assume that each sensor generates data values in a fixed rate and periodically submits the collected data to the closest storage node En epoch is an interval time between two submissions All sensors are synchronized The data message from sensor s i contain the sensor ID (i), the current value (t) and data

Privacy-preserving queries in 2-tiered WSN system model Storage node Sink Query Reply

Privacy-preserving queries in 2-tiered WSN adversary model and Security goals Adversary model The adversary want to obtain the sensitive data information from the SN The attacker want to breach data fidelity Security goals Against compromised storage nodes Against compromised sensors

Privacy-preserving queries in 2-tiered WSN state-of-the-art Scheme of Sheng and Li Sheng and Li proposed a scheme to preserve the privacy and integrity of range queries in SN This scheme uses the bucket partitioning idea The basic idea is to divide the domain of data values into multiple buckets In each slot, a sensor collects data items, places them into buckets, encrypts them together in each bucket, and then sends each bucket along with its bucket ID to a nearby storage node When the BS want to perform a range query, it finds the smallest set of bucket IDs that contains the range in query, sends this set to storage nodes Upon receiving the bucket ID, storage node returns the corresponding encrypted data in all those bucket BS can decrypt the encrypted buckets and verify the integrity Bo Sheng and Qun Li, Verifiable privacy-preserving range query in two- tiered sensor networks, IEEE INFOCOM 2008 proceedings, pp

Privacy-preserving queries in 2-tiered WSN an algebraic approach: problem description Problem description Let A kxn be a matrix such that a ij  {1,…,N}, N>n d 1,…,d m  {1,…,N} where d i  d j,  i  j Let c i = a id1 +…+ a idm,i=1,…,k If given c i ’s (i=1,…,k), then d j (j=1,…,m) is one of solutions of the systems a i1 x 1 +…+a in x n = c i (*) i=1,…,n; where (x 1,…,x n )  {0,1}  Determining A kxn such that (*) has only one solution: (X 1,…,X n ) such that X i =1 if i=d j (j=1,…,m) and X i =0, otherwise  We will say (d 1,…,d m ) be a solution of (*), too.

Privacy-preserving queries in 2-tiered WSN an algebraic approach: necessary conditions Establishing necessary conditions for matrix A kxn Suppose that (d 1,…,d m ) and d p 1,….,d p m ; p=1,…,q be different solution of (*), then  j a idj =  j a id 1 j =  j a id q j = c i ; (i=1,…,k) Therefore (d 1,…,d m ) is unique solution if and only if  v  {1,…,k} such that –  u  {1,…,p}\{v},  j a id u j = c i ; (i=1,…,k) –  j a id v j  c i ; (i=1,…,k)

Privacy-preserving queries in 2-tiered WSN an algebraic approach: building matrix Building matrix A kxn 1.Generates a random matrix : A’ (k-1)xn such that a ij  {1,…,t}, t<<n 2.For each pair of solutions (d 1,…,d m ) and (d’ 1,…,d’ m ) of the system (*), let x d1 +…+x dm  x d’1 +…+x d’m, where x dj, x d’j  {1,…,N}, j=1,…,m After step 2) we receive an in-equation system in which each in-equation has form x d1 +…+x dm  x d’1 +…+x d’m where (d 1,…,d m ) and (d’ 1,…,d’ m ) are solution of (*). Let (a k1,…,a kn ) be a solution of this system, then (a k1,…,a kn ) is just k th row of the desired matrix

Privacy-preserving queries in 2-tiered WSN an algebraic approach: a tiny example

Privacy-preserving queries in 2-tiered WSN an algebraic approach: an example of a baby system Data={1,3,4,6}  c={10,5,21} Data={1,4,6,2}  c={9,7,28} Sensor i storage (j,t,{9,7,28}) (i,t,{10,5,21})