Adversary Models in Wireless Networks: Research Challenges Radha Poovendran Network Security Lab (NSL) University of Washington.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
Perspective on Overlay Networks Panel: Challenges of Computing on a Massive Scale Ben Y. Zhao FuDiCo 2002.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
David B. Johnson Rice University Department of Computer Science DSR Status Update Monarch Project 55th.
Joint work with Svilen Mihaylov, Marie Jacob, Mengmeng Liu, Sudipto Guha, Boon Thau Loo DMSN 2008 August 24, 2008 Zachary G. Ives University of Pennsylvania.
Grant agreement n° SDN architectures for orchestration of mobile cloud services with converged control of wireless access and optical transport network.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Cross Layer Design in Wireless Networks Andrea Goldsmith Stanford University Crosslayer Design Panel ICC May 14, 2003.
Challenge: Securing Routing Protocols Adrian Perrig
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
CS541 Advanced Networking 1 Cognitive Radio Networks Neil Tang 1/28/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Towards a More Functional and Secure Network Infrastructure Dan Adkins, Karthik Lakshminarayanan, Adrian Perrig (CMU), and Ion Stoica.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Securing Wireless Mesh Networks By Ben Salem & Jean-Pierre Hubaux Presented by Akilesh Sadassivam (Group Leader) Harish Varadarajan Selvaganesh Dharmeswaran.
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Patrick Tague, David Slater, and Radha Poovendran Network Security.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Sharanya Eswaran, Penn State University Matthew Johnson, CUNY Archan Misra, Telcordia Technolgoies Thomas La Porta, Penn State University Utility-driven.
Layered Approach using Conditional Random Fields For Intrusion Detection.
Ness Shroff Dept. of ECE and CSE The Ohio State University Grand Challenges in Methodologies for Complex Networks.
The Smart Grid Enabling Energy Efficiency and Demand Response Clark W
NSF Critical Infrastructures Workshop Nov , 2006 Kannan Ramchandran University of California at Berkeley Current research interests related to workshop.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,
Wireless Networks Breakout Session Summary September 21, 2012.
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
Page 1 Intelligent Quality of Service Routing for Terrestrial and Space Networks Funda Ergun Case Western Reserve University.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
WP4 deliverable Critical Infrastructure Protection: Attack Prevention Solutions and Attacks.
1. Process Gather Input – Today Form Coherent Consensus – Next two months.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Research Interest overview and future directions Mina Guirguis Computer Science Department Texas State University – San Marcos CS5300 9/16/2011.
CROSS-LAYER OPTIMIZATION PRESENTED BY M RAHMAN ID:
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
COGNITIVE RADIO NETWORKING AND RENDEZVOUS Presented by Vinay chekuri.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Overview: Layerless Dynamic Networks Lizhong Zheng.
Urban Wireless Community Networks: Challenges and Solutions for Smart City Communications Renato Lo Cigno Joint Brainstorming.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Illinois Center for Wireless Systems Wireless Networks: Algorithms and Optimization R. Srikant ECE/CSL.
Dynamic Task Allocation in a turn based strategy game Gilles Schtickzelle September 2012 ULB.
Wireless Mesh Networks Myungchul Kim
Algorithms and Optimization Aravind Srinivasan University of Maryland.
April Master Project Presentation1 Security Issues for Stigmergic Systems Weilin Zhong.
Adaptable and Reactive Security for Wireless Sensor Networks John A. Stankovic Department of Computer Science University of Virginia.
Towards Secure and Dependable Software-Defined Networks Fernando M. V. Ramos LaSIGE/FCUL, University of Lisbon
Theme Guidance - Network Traffic Proposed NMLRG IETF 95, April 2016 Sheng Jiang (Speaker, Co-chair) Page 1/6.
The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks Tanya Roosta (EECS, Berkeley) In Collaboration With: Sameer Pai (ECE, Cornell)
In the name of God.
Overview of Research in Dependable Computing Systems Lab
UNIT II –Part 2.
Jack Pokrzywa Director Ground Vehicle Standards, SAE International
Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran
Wireless communications and networking UniPD
TRUST:Team for Research in Ubiquitous Secure Technologies
NSF CSR PI Meeting Breakout Session: Integrated Networked Systems and Internet of Things Saurabh Bagchi Purdue University.
Towards Next Generation Panel at SAINT 2002
High-Level Synthesis for Side-Channel Defense
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Adversary Models Do we need new adversary models for embedded systems and networks? What should be this adversary model? What are the new threats? Incorporate.
Presentation transcript:

Adversary Models in Wireless Networks: Research Challenges Radha Poovendran Network Security Lab (NSL) University of Washington

Questions Posed by the Committee What are the three fundamental limitations of today's security mechanisms? What are the three most important research challenges? What are promising innovations and abstractions for future systems? What are possible milestones for the next 5 to10 years?

Three fundamental limitations of today's security mechanisms Refer to Virgil’s presentation Force-fitting the old models into the wireless environment Considering security as an overlay instead of a critical robustness requirement Optimizing network performance independently of security

Most Important Challenges Identifying the primitives that can be used to characterize adversary models –Characterize space of attacks against the network operations –Incorporate resource constraints for the adversary (mobility, computation, stealthiness, multiple presence) –Address adaptive (intelligent) as well as mobile adversary –Differentiate selfish vs. malicious behavior and network faults Defining suitable security metrics –To quantify the impact of an attack on the network or individual nodes –To couple the network performance with security –Flexible enough to incorporate cross-layer impact while being adaptive to attacks Not Ignoring the fact that in large scale networks, statistics often beat out carefully designed attacks (such as MITM)—Leading to “Passive attacks of probabilistic nature may be resource and computationally efficient than active attacks in WSN/RFID.” Designing security protocols that leak minimal side information!

Promising innovations and abstractions Graph abstractions –Network connectivity, Throughput –Robustness to intelligent attacks Probabilistic Analysis Techniques for –Modeling attacks –Quantifying the impact of attacks –Tuning defense strategy Potential New Primitives (More from Peng, Adrian) New Approaches in Network Optimization

Possible milestones for the next 5 to10 years Joint design of performance and security Development of performance metrics –Characterizing/Knowing the limitations of our solutions Adversarial models and extensions of them for –Heterogeneous environments –Resource as well as location adaptive attacks Also need breakthrough in new crypto primitives –Lightweight, suitable for resource constrained devices

Final Thoughts Biggest Limitation: Security is considered as an afterthought, decoupled from network performance Biggest Challenge: Define cross-layer security/performance metrics and realistic attack models Final Goal: Span the space of attacks and quantify their impact