Download presentation
Presentation is loading. Please wait.
1
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Current Calendar Calendar Index Upcoming Speakers About... Artificial Intelligence Computer Graphics Computer Networking Software Engineering Systems Technical Reports About... Admissions BSCSE BSCIS BACIS CIS Minor Courses Undergrad Advising Honors Program Student Organizations About... Admissions Masters Program PhD Program Joint Programs Fellowships/Financial Aid Courses Graduate Life Student Organizations Faculty Grad Students Undergraduates Administrative Staff Computing Staff Administrative Contacts Directory of Personnel About... CSE Class Schedule CSE Course Description CSE Syllabi OSU Course Description OSU Registrar About... Policies Users Guide Help Desk (SOC) CSE Labs Staff Listing Faculty Positions Diversity Program Current Calendar Calendar Index Upcoming Speakers About... Artificial Intelligence Computer Graphics Computer Networking Software Engineering Systems Technical Reports About... Admissions BSCSE BSCIS BACIS CIS Minor Courses Undergrad Advising Honors Program Student Organizations About... Admissions Masters Program PhD Program Joint Programs Fellowships/Financial Aid Courses Graduate Life Student Organizations Faculty Grad Students Undergraduates Administrative Staff Computing Staff Administrative Contacts Directory of Personnel About... CSE Class Schedule CSE Course Description CSE Syllabi OSU Course Description OSU Registrar About... Policies Users Guide Help Desk (SOC) CSE Labs Staff Listing Faculty Positions Diversity Program Current Calendar Calendar Index Upcoming Speakers About... Artificial Intelligence Computer Graphics Computer Networking Software Engineering Systems Technical Reports About... Admissions BSCSE BSCIS BACIS CIS Minor Courses Undergrad Advising Honors Program Student Organizations About... Admissions Masters Program PhD Program Joint Programs Fellowships/Financial Aid Courses Graduate Life Student Organizations Faculty Grad Students Undergraduates Administrative Staff Computing Staff Administrative Contacts Directory of Personnel About... CSE Class Schedule CSE Course Description CSE Syllabi OSU Course Description OSU Registrar About... Policies Users Guide Help Desk (SOC) CSE Labs Staff Listing Faculty Positions Diversity Program Xun Wang †, Sriram Chellappan †, Wenjun Gu †, Wei Yu ‡ and Dong Xuan † Presented by Wei Yu † Department of Computer Science and Engineering The Ohio State University ‡ Department of Computer Science Texas A & M University Xun Wang †, Sriram Chellappan †, Wenjun Gu †, Wei Yu ‡ and Dong Xuan † Presented by Wei Yu † Department of Computer Science and Engineering The Ohio State University ‡ Department of Computer Science Texas A & M University Policy-driven Physical Attacks in Sensor Networks: Modeling and Measurement
2
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 2 Physical Attacks are Salient Threats to Sensor Networks Sensor network applications that operate in hostile environments –Volcanic monitoring –Battlefield applications –Anti sensor network forces Physical attacks are inevitable in sensor networks –Physical attacks: destroy sensors physically –Simple to launch Small form factor of sensors Unattended and distributed nature of deployment –Can be fatal to sensor networks –Different from other types of electronic attacks
3
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 3 Outline Physical attacks in sensor networks Modeling Policy-driven physical attacks Measurement of Policy-driven physical attacks Countermeasures to physical attacks Final remarks
4
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 4 Physical Attacks – A General Description Physical attacks are those that result in the physical destruction of sensors Two broad types of sensor destruction methods –Bombing: Brute-force physical destruction with bombs/ grenades; Sensors in the attack area are destroyed. Fast; Not accurate due to blind destruction. –Sweeping: Detecting sensors by detecting signals emitted by sensors then isolating an area for the detected sensor; Reaching the isolation area; Destroying small size sensors through physical destruction methods. Slow; Accurate destruction of only isolated area.
5
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 5 Attacker Objectives and Dilemma Two objectives of the attacker –Destroy sensor network. –Preserve the sensor network deployment field. –Attacker might have certain bias between them. –How the attacker can achieve its objectives with certain bias? Choose Bombing or Sweeping? –Bombing is good at rapidly destroy sensor network, but causes too large causalities to deployment field. –Sweeping is good at preserve sensor network deployment field, but it is slow in destroying sensors. A policy-controlled combination of Bombing and Sweeping to achieve the desired bias between the two objectives –Policy-driven physical attacks
6
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 6 Policy-driven Physical Attacks Targeting phase –Search for sensors by detecting signals emitted by sensors and isolating an area (isolation-area) for each detected sensor. Destruction phase –Choose destruction method (bombing or sweeping) according to policy and information of the detected sensor. –If choose bombing Use brute-force physical destruction with bombs/ grenades or tanks/ vehicles on the isolation area of the detected sensor. –If choose sweeping Reach the isolation area of the detected sensor Destroying small size sensor through physical destruction methods (like physical force, radiation, hardware/ circuit tampering).
7
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 7 Modeling of Policy-driven Physical Attacks Sensor network signals –Passive signal and active signal Attacker capacity –Signal detection and sensor Isolation –Sensor destruction methods Attack Model –Attack model procedure –Attacker’s bias between two objectives –Attack action control
8
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 8 Network Parameters and Attacker Capacities f:Active signal frequency R ps : The maximum distance can detect a passive signal R as s : The maximum distance can detect an active signal emitted by a normal sensor θ: Isolation accuracy –r i =d i θ –Isolation/sweeping area: D sw i =πr i 2 V mv : Attacker moving speed V sw : Attacker sweeping speed μ: bombing rate R b : Radius of destruction area of each bombing
9
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 9 Policy-driven Physical Attack procedure
10
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 10 Metrics and Quantification of Policy AC: Accumulative Coverage –EL: Effectively Lifetime is the time period until when the sensor network becomes nonfunctional because the coverage falls below a certain threshold α –Coverage(t): Instant network coverage at time t DC:Destruction Casualty If the attacker attacked a set of n sensors K = {S 1,..., S n }, and the destroyed area for sensor S i is D i, then P : In Policy-driven Physical Attacks, the policy (P) represents the bias among the twin objectives of the attacker.
11
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 11 Impact of Destruction Methods on DC, AC and Attack Action Control Impact of Sweeping and Bombing on DC (Destruction area) D sw i =πr i 2, D bo i =π(r i +R be ) 2 R be is is the bombing area error margin which represents the extra casualty (extra destruction area) caused by the less- accurate bombing. Impact of Sweeping and Bombing on AC (Time cost) T sw i = t sw i + t mv i = πr i 2 /v sw + d’ i /v mv T bo i = t bo i = D bo i / π R b 2 / μ = π(r i +R be ) 2 / π R b 2 / μ Selection between Sweeping and Bombing F bo (i) = T bo i * (D bo i ) P F bo (i) = T sw i * (D sw i ) P - Choose Bombing if F bo (i) ≤ F sw (i)
12
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 12 Sensitivity of AC, DC to P with Different μand R b
13
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 13 Sensitivity of AC, DC to P with Different v sw and θ
14
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 14 Countermeasures to Physical Attacks For Blind Physical Attacks –Overly and optimally deploying sensors to prolong lifetime of sensor networks under blind physical attacks For Search-based Physical Attacks –Deterring the search process (at the target phase) ┼Physically protecting sensors
15
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 15 Final Remarks Physical attacks are patent and potent threats to sensor networks. Policy-driven physical attacks can achieve desired bias between the twin objectives of the attacker (rapidly destroying sensors, and preserving the deployment field). Viability of future sensor networks is contingent on their ability to resist physical attacks. Our research is an important first step in this regard.
16
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 16 Q&A Thank You !
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.