Surviving Attacks on Disruption- Tolerant Networks without Authentication John Burgess, George Dean Bissias, Mark Corner, Brian Neil Levine University.

Slides:



Advertisements
Similar presentations
Scalable Routing in Delay Tolerant Mobile Networks Hao Wen 1 Jia Liu, Chuang Lin, Fengyuan Ren, Chuanpin Fu 1 Department of Computer Science, Tsinghua.
Advertisements

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science R3: Robust Replication Routing in Wireless Networks with Diverse Connectivity Characteristics.
Thesis Presentation Supervisor: Prof. Jörg Ott Student: Junxi Yin Espoo,
Supporting Cooperative Caching in Disruption Tolerant Networks
Enhancing DTN capacity with Throwboxes (work-in-progress)
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science R3: Robust Replication Routing in Wireless Networks with Diverse Connectivity Characteristics.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Denial of Service in Sensor Networks Szymon Olesiak.
Contact quality based forwarding strategy for delay tolerant network Qaisar Ayub, Sulma Rashid, M.Soperi Mohd Zahid, Abdul Hanan Abdullah Adviser:Frank.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Understanding Stateful vs Stateless Communication Strategies for Ad hoc Networks Victoria Manfredi, Mark Crovella, Jim Kurose MobiCom 2011.
Car Hacking Patrick, James, Penny.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Approximating Sensor Network Queries Using In-Network Summaries Alexandra Meliou Carlos Guestrin Joseph Hellerstein.
Analyzing Multi-channel MAC Protocols for Underwater Sensor Networks Presenter: Zhong Zhou.
Using Redundancy to Cope with Failures in a Delay Tolerant Network Sushant Jain, Michael Demmer, Rabin Patra, Kevin Fall Source:
Carnegie Mellon University Complex queries in distributed publish- subscribe systems Ashwin R. Bharambe, Justin Weisz and Srinivasan Seshan.
© Manasa Resilience of Flooding Protocol – A Case Study EECS 801 Graduate Reading © 2008–Manasa K Aug Manasa K Department of Electrical Engineering.
PROXY FOR CONNECTIVITY We consider the k shortest edge disjoint paths between a pair of nodes and define a hyperlink, whose ‘connectivity’ is defined as:
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh Soon Y. Oh, Joon-Sang Park, Mario Gerla Computer Science Dept. UCLA.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
University of Massachusetts, Amherst An Energy-Efficient Architecture for DTN Throwboxes Nilanjan Banerjee, Mark Corner, Brian N. Levine
Sociological Influences on Mobile Wireless Networks Chunming Qiao, Ph.D., Professor University at Buffalo (SUNY) Director, Laboratory for Advanced Network.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Wei Gao Joint work with Qinghua Li, Bo Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University Multicasting.
UMass DieselNet: A Disruption-Tolerant Network Testbed John Burgess Department of Computer Science UMass Amherst John Burgess Department of Computer Science.
Sensor Network Architectures muse. Objectives Be familiar with how application needs impact deployment strategies Understand key benefits/costs associated.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
Challenged Networking An Experimental Study of New Protocols and Architectures Erik Nordström.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Context-aware Adaptive Routing for Delay Tolerant Networking Mirco Musolesi Joint work with Cecilia Mascolo Department of Computer Science University College.
Wireless Ad Hoc Podcasting. Ad hoc ad hoc network typically refers to a system of network requiring little or no planning a decentralized type of wireless.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Disruption Tolerant Networks Aruna Balasubramanian University of Massachusetts Amherst 1.
Disruption Tolerant Networks Aruna Balasubramanian University of Massachusetts Amherst 1.
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
ALeRT Project Georgia Tech and UMass Amherst DARPA DTN Meeting 2 August 2005 Washington, DC.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Department of Computer Science Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani DTN Routing as a Resource Allocation Problem.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling Olaf Landsiedel 1, Euhanna Ghadimi 2, Simon Duquennoy 3, Mikael Johansson 2 1 Chalmers University.
UCLA ENGINEERING Computer Science RobustGeo: a Disruption-Tolerant Geo-routing Protocol Ruolin Fan, Yu-Ting Yu *, Mario Gerla UCLA, Los Angeles, CA, USA.
© 2008 Frans Ekman Mobility Models for Mobile Ad Hoc Network Simulations Frans Ekman Supervisor: Jörg Ott Instructor: Jouni Karvo.
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
Event Based Routing In Delay Tolerant Networks Rohit Mullangi And Lakshmish Ramaswamy DTN is fundamentally an opportunistic network environment, where.
Evaluating Mobility Support in ZigBee Networks
Wireless Access and Networking Technology Lab WANT Energy-efficient and Topology-aware Routing for Underwater Sensor Networks Xiaobing Wu, Guihai Chen and.
Routing Metrics and Protocols for Wireless Mesh Networks Speaker : 吳靖緯 MA0G0101.
指導教授:許子衡 教授 學 生:黃群凱 2016/2/251 Proceedings of the 2008 IEEE International Conference on Vehicular Electronics and Safety Columbus, OH, USA. September 22-24,
Data Stashing: Energy-Efficient Information Delivery to Mobile Sinks through Trajectory Prediction (IPSN 2010) HyungJune Lee, Martin Wicke, Branislav Kusy,
2005/12/14 1 Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Xin Yu Department of Computer Science.
Mesh-based Geocast Routing Protocols in an Ad Hoc Network
Feng Li, Jie Wu, Avinash Srinivasan
Introduction to Wireless Sensor Networks
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
En Wang 1,2 , Yongjian Yang 1 , and Jie Wu 2
RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong
Inference Integrity in Wireless Networks
Achieving Resilient Routing in the Internet
Presentation transcript:

Surviving Attacks on Disruption- Tolerant Networks without Authentication John Burgess, George Dean Bissias, Mark Corner, Brian Neil Levine University of Massachusetts, Amherst

Goal Understand DTN vulnerability Attack analysis Experimental evaluation

Disruption Tolerant Networks Networking for intermittently connected nodes Rural Internet Urban blind spots Sparse sensor networks Connectivity on a spectrum

Unique Vulnerability Measured by packet delivery rate Nodes physically unsecured Traditional defenses are inappropriate: graph theoretical results are limited identity management not always practical

Undisturbed Decimated Attack strength Weak Strong Network impact Attack Universe Weak attacks: random node selection easy to evaluate Strong attacks: optimal node selection strong attack NP-hard to evaluate

Outline Attack Strategies Data Experimental Results Conclusion

Attacks: Weak Nodes chosen at random Attack defined by enumerating strategies Remove Node Drop all packets Flood packets Routing table falsification ACK counterfeiting

Attacks: Strong Intractable to determine optimal attack set Throughput is difficult metric to analyze Even simple metrics lead to NP-hard problem Instead, greedily remove vertices that most lower temporal connectivity

Data: DieselNet 40 buses protocol 60 days of traces Transmission events feed a simulator Various routing protocols tested

Data: Haggle 41 devices in human mobility experiment Bluetooth 3 days of traces Haggle connections more frequent than DieselNet Haggle traces broken down to better match DieselNet

Experiments: weak attack Evaluated delivery rate via given routing protocol subject to given attack strategy Used DieselNet data only ReplicativeForwarding Metric based MaxPropMaxForw RandomRandPropRandForw Routing Protocols Attack Strategies Remove node Drop all Flooding Routing table Falsification ACK counterfeiting

Experiments: weak attack MaxProp Minimum delivery rate above 20% ACK counterfeiting is most effective attack

Experiments: ACK Counterfeiting Devise an ACK counterfeiting defense ACKs should propagate after packets Drop ACK if you haven’t seen packet yet Defense improves minimum packet delivery rate Drop All attack just as effective as ACK counterfeiting

Experiments: strong attack Seek to establish the validity of greedy attack Find best k vertices in terms of temporal reachability via brute force evaluation for small k Compare brute force results to greedy approach Evaluate greedy attack for larger values of k Evaluate both DieselNet and Haggle

Haggle: Brute vs. Greedy Experiments: strong attack For temporal reachability- best 5 nodes to remove almost always the same as 5 greedy choices Results for DieselNet similar

Experiments: strong attack Haggle: greedy attack Displays roughly the same resilience to attack at DieselNet Packet delivery rate degrades more slowly as more nodes are

Conclusion DTNs have unique susceptibility to attack Susceptibility understood with attack analysis Experiments on real traces show attack efficacy