DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks



Similar documents
Security for Ad Hoc Networks. Hang Zhao

Security in Ad Hoc Network

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Introduction to Wireless Sensor Network Security

Securing MANET Using Diffie Hellman Digital Signature Scheme

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES

CHAPTER 1 INTRODUCTION

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Wireless Sensor Networks Chapter 14: Security in WSNs

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Wireless Sensor Network: Challenges, Issues and Research

Some Security Trends over Wireless Sensor Networks

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

Energy Optimal Routing Protocol for a Wireless Data Network

Prediction of DDoS Attack Scheme

Vampire Attack Detecting and Preventing in Wireless Sensor Network

A Security Architecture for. Wireless Sensor Networks Environmental

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Assessing trade-offs between energy consumption and security in sensor networks: simulations or testbeds?

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

Security Threats in Mobile Ad Hoc Networks

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

Denial of Service in Sensor Networks

Intrusion Detection for Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Protocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig

SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Research Projects in the Mobile Computing and Networking (MCN) Lab

Security Analysis of Routing Protocols in Wireless Sensor Networks

Multihop Wireless Networks

Network Security Vulnerability and Attacks on Wireless Sensor Networks: Survey

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

A Transport Protocol for Multimedia Wireless Sensor Networks

Demystifying Wireless for Real-World Measurement Applications

SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Secure Routing in Wireless Sensor Networks

EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course

Mobile and Sensor Systems

Internet of Things (IoT): A vision, architectural elements, and future directions

Applications, Advantages and Challenges of Ad Hoc Networks

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Metrics for Detection of DDoS Attacks

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Cross-layer security and resilience in wireless mesh networks

Neighborhood-Based Security Protocol for Wireless Sensor Networks

MOBILE CONVERGED NETWORKS: FRAMEWORK, OPTIMIZATION, AND CHALLENGES

Analysis of Typical Secure Routing Protocols in WSN

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Wireless Sensor Networks

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Outline. Application examples. Infrastructure-based limits? Infrastructure-based wireless networks. Possible applications

Security Issues in Mobile Ad Hoc Networks - A Survey

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Wireless Sensor Networks Chapter 3: Network architecture

A Catechistic Method for Traffic Pattern Discovery in MANET

Transcription:

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech University Lubbock, TX 79409 Research: Technology Trends Coverage of BS Control of BS Service of BS Current research area!! * Infrastructure mode ** Ad hoc mode Single hop GSM Cellular UMTS IEEE 802.11* Ad hoc/ P2P IEEE 802.11** PAN Bluetooth Multihop Cellular multihop MANET WSN VANET

On-going Research: Keywords We design and develop algorithms and communication protocols in the level of the link, network, and application layers. Wireless Networks and Mobile Computing RandomCast: Energy Efficient Randomized Communication CMM: Clustered Mobility Model Vibration-Sensitive Energy Harvesting Mobile Data Management Aggregate Caching and Data Access Strategies Cooperative Caching Strategies ConSens: Opportunistic Data Access Network Security DoS Attacks Camouflage-based Detection Cooperative Detection Google Android-based Mobile Software escort: I am not alone SMARTx: Reducing collisions Energy-Constrained Wireless Networks: Energy Harvesting Wireless Sensor Networks, Deployed in an unattended environment Required to operate for a long period time Hard to replace (or replenish) battery Environmental energy harvesting (or scavenging), Extracting an electric energy from various environmental sources for easy of battery energy replenishment Vibrations, magnetic fields, thermal gradients, lights, kinetic motions, and shock waves

Energy-Constrained Wireless Networks: Energy Harvesting (cont.) Vibration-Sensitive Energy Harvesting iphone interface PFCB-W14 sensor node sink The U.S. Army has invested about $4.2 million in the development of military Apps and the study of smart phone technology LIMITED BATTERY ENERGY!!! The U.S. Army will eliminate all the military batteries. Each soldier will equip self-powered (or batteryless) communication devices Int l Conf. on Computing, Networking and Communications (ICNC), Feb 2015 Denial-of-Service (DoS) Attack: Motivation Security threats in Wireless Sensor Networks (WSNs): Lack of physical protection Can be captured, tampered, or destroyed Shared wireless medium Air Force Summer Faculty Can overhear, duplication, corrupt, or alter data Fellowship Program (AF-SFFP): Lack of security requirements Vulnerable to Denial-of-Service (DoS) attacks Air Force Research Laboratory, Rome, NY DoS attacks Target service availability rather than subverting the service itself Disrupt network routing protocols or Interfere on-going communications Critical and challenging to develop DoS counterattack mechanisms Sensitive sensory data & secure and reliable delivery

Int l Conf. on Computing, Networking and Communications (ICNC), Feb 2015 Denial-of-Service (DoS) Attack: Selective Forwarding Attack Selective forwarding attack Selectively forward any incoming packet Randomly or strategically Target the network routing vulnerabilities of multi-hop networks Violate an implicit assumption of cooperative routing Faithfully and collaboratively route packets Unlike blackholeattack Simply refuse to forward any incoming packet Non-trivial to detect the forward misbehaviors Temporal node failures or packet collisions?? The malicious nodes (shaded in red) located in a forwarding path can selectively forward sensory data to a sink. Int l Conf. on Computing, Networking and Communications (ICNC), Feb 2015 Cooperative Hop-by-Hop Detection: Approach - Adversarial Scenarios An overhearing of implicit acknowledgment Monitor whether the one-hop forwardeenode has forwarded the received packet without receiving an explicit acknowledgment Maximize the utilization of energy harvested rather than conserve energy consumption Summarize node interactions in a triplet format Mode (M): Active (act), Harvest (hvest), or Don t Care (*) Action (A) and Following Action (F): Forward (fwd), Overhear (ohear), Receive (rcv), No Action (-) Four adversarial scenarios (SM 1 SM 4 )

Int l Conf. on Computing, Networking and Communications (ICNC), Feb 2015 Cooperative Hop-by-Hop Detection: Approach - Ideas The basic idea is Monitor and record the trace of forwarding operations What information do nodes keep to monitor the forwarding behaviors of nodes Record traces of forwarding and mode changes How to detect the forwarding misbehaviors of malicious nodes based on the forwarding traces Analyze the forwarding traces How to reduce and adjust the forwarding probability of malicious nodes and other forwarding nodes, respectively Upon detected, (i) reduce the forwarding probability by half and (ii) divide the reduced forwarding probability equally and distribute to the rest of forwarding nodes b b active harvest a m c harvest a m c harvest Int l Conf. on Computing, Networking and Communications (ICNC), Feb 2015 Cooperative Hop-by-Hop Detection: Performance Evaluation Significantly reduce the number of forwarding misbehaviors The forwarding probabilities of malicious nodes becomes lower, and thus more legitimate nodes are chosen as a forwarding node: the PDR significantly decreases

Int l Conf. on Computing, Networking and Communications (ICNC), Feb 2015 Embedding Network Security into CS Curriculum Both undergraduate and graduate CS courses that I teach, CS4331: Special Topics in Computer Science Embedded Systems CS4392: Computer Networks CS5376: Communication Networks CS5377: Distributed Computing CS5331: Special Problems in Computer Science -Wireless Networks and Mobile Computing Any Questions?