1 On Detection and Concealment of Critical Roles in Tactical Wireless Networks Zhuo Lu University of Memphis Cliff Wang Army Research Office Mingkui Wei.

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

A Moving Strategy for Mobile Sink in Secure Data Collection Zhou Sha.
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Distributed Control Algorithms for Service Differentiation in Wireless Packet Networks Michael Barry, Andrew T Campbell, Andras Veres
A Novel Finger Assignment Algorithm for RAKE Receivers in CDMA Systems Mohamed Abou-Khousa Department of Electrical and Computer Engineering, Concordia.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Good afternoon everyone.
University of Waterloo & UOIT & INRIA Lille Presenter: Rongxing Lu
Location-Aware Security Services for Wireless Sensor Networks using Network Coding IEEE INFOCOM 2007 최임성.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
May 14, Organization Design and Dynamic Resources Huzaifa Zafar Computer Science Department University of Massachusetts, Amherst.
Avoiding Energy Holes in Wireless Sensor Network with Nonuniform Node Distribution Xiaobing Wu, Guihai Chen and Sajal K. Das Parallel and Distributed Systems.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Effects of Directional Antennas on e Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
End-to-End Delay Analysis for Fixed Priority Scheduling in WirelessHART Networks Abusayeed Saifullah, You Xu, Chenyang Lu, Yixin Chen.
Securing Wireless Mesh Networks By Ben Salem & Jean-Pierre Hubaux Presented by Akilesh Sadassivam (Group Leader) Harish Varadarajan Selvaganesh Dharmeswaran.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
A Study on Certificate Revocation in Mobile Ad Hoc Networks Wei Liu,Hiroki Nishiyama,Nirwan Ansari & Nei Kato ICC 2011 Nadia Adem 10/27/2014.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
WP4 deliverable Critical Infrastructure Protection: Attack Prevention Solutions and Attacks.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Distributed Monitoring and Aggregation in Wireless Sensor Networks INFOCOM 2010 Changlei Liu and Guohong Cao Speaker: Wun-Cheng Li.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
Small-Scale and Large-Scale Routing in Vehicular Ad Hoc Networks Wenjing Wang 1, Fei Xie 2 and Mainak Chatterjee 1 1 School of Electrical Engineering and.
Multipath Routing in Wireless Mesh Networks Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference on Author: Nagesh S. Nandiraju,
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Wireless communications and mobile computing conference, p.p , July 2011.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Secure In-Network Aggregation for Wireless Sensor Networks
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
BY PREETHI.E. * For people living in developed countries the absolute volume of road traffic can be a daily nuisance. In addition, the road traffic.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Bing Wang, Wei Wei, Hieu Dinh, Wei Zeng, Krishna R. Pattipati (Fellow IEEE) IEEE Transactions on Mobile Computing, March 2012.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks Mahesh K. Marina and Samir R. Das ACM MOBIHOC’02.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
Strong Barrier Coverage of Wireless Sensor Networks Benyuan Liu, Olivier Dousse, Jie Wang and Anwar Saipulla University of Massachusetts Lowell and Deutsche.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Deploying Sensors for Maximum Coverage in Sensor Network Ruay-Shiung Chang Shuo-Hung Wang National Dong Hwa University IEEE International Wireless Communications.
Copyright © 2002 OPNET Technologies, Inc. 1 Random Waypoint Mobility Model Empirical Analysis of the Mobility Factor for the Random Waypoint Model 1542.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
ProbeCast: MANET Admission Control via Probing Soon Y. Oh, Gustavo Marfia, and Mario Gerla Dept. of Computer Science, UCLA Los Angeles, CA 90095, USA {soonoh,
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Fixing the replicated Nodes in mobile Sensor Networks GUIDED BY Mr. N.SHIVA KUMAR Presented by K.Sumathy (08c117) C.Bindu Prasad (08c19)
Student: Mallesham Dasari Faculty Advisor: Dr. Maggie Cheng
Presentation transcript:

1 On Detection and Concealment of Critical Roles in Tactical Wireless Networks Zhuo Lu University of Memphis Cliff Wang Army Research Office Mingkui Wei NC State University

22 1.Introduction 2.System Models 3.Role Detection 4.Role Concealment 5.Conclusion

33 Introduction Tactical wireless networks: –Mission-critical mobile ad-hoc networks. –Allows two-way communication for warfighters. –Unique challenges due to tactical requirements, e.g., reliability and security in hostile environment.

44 Introduction Characters of tactical wireless network: –Nodes in the network are not homogenous. –Commanding and control nodes lead to a one-to- multiple communication model.

55 Research Question How to detect and conceal the roles of nodes in tactical wireless networks? –Roles of nodes: Commanding role: # of active network flow with other nodes exceeds a given threshold (not necessarily real commanders). Acting role: otherwise. –Two-fold questions: Whether we can accurately identify commanding nodes in a network from an adversary’s point of view. Whether we can protect such nodes from being identified from a defender’s point of view.

66 Contributions –Provide an initial study on role detection and concealment, which are important in tactical wireless networks. –Propose role detection and concealment methods and comprehensively evaluate their performance.

77 1.Introduction 2.System Models 3.Role Detection 4.Role Concealment 5.Conclusion

88 Network Model

99 Roles of Nodes

10 Adversary Model

11 Problem Statement

12 1.Introduction 2.System Models 3.Role Detection 4.Role Concealment 5.Conclusion

13 Role Detection

14 Detection Approach

15 Evaluation Simulation setup –100-nodes network with density 5; –Transmission range is normalized to 1; –2 commanding nodes and 98 acting nodes; –Commanding nodes communicates to 10 other nodes. –10 random acting to acting communication pairs. –Rate of each flow is random between 1M and 2M bps.

16 Evaluation Result of flow rate estimation –Most of flow rates can be accurately estimated. –Proper thresholds can help in role detection.

17 Evaluation

18 Evaluation

19 1.Introduction 2.System Models 3.Role Detection 4.Role Concealment 5.Conclusion

20 Role Concealment Flow detection and countermeasure –a: normal network operation. –b: deception traffic. –c: changing routing strategies.

21 Evaluation Deception traffic –Commanding role detection ratio ≈ 75%. –Commanding role false alarm rise to 43.5%. –Effective in conceal commanding roles.

22 Evaluation Routing changing –Use k-th shortest path, instead of the shortest path for routing. –Commanding role detection ratio ≈ 50%. –Delay degradation is notecible.

23 1.Introduction 2.System Models 3.Role Detection 4.Role Concealment 5.Conclusion

24 Conclusion Role detection in tactical wireless networks –It is possible to identify critical role of nodes accurately. Role concealment in tactical wireless networks –Deception traffic. –Routing changing. –Both can effectively conceal critical role of nodes with compromise in network performance.

25 Thank you!