Attack-Resistant Location Estimation in Sensor Networks

Similar documents
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks

Internet Sustainability and Network Marketing Safety

Research Article BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks

Prediction of DDoS Attack Scheme

Secure Neighbor Discovery in Wireless Sensor Networks

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE Wireless Networks

A Novel Defense Mechanism against Distributed Denial of Service Attacks using Fuzzy Logic

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

THIS: THreshold security for Information aggregation in Sensor networks

CSC 774 Advanced Network Security. Outline. Related Work

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

INTRUSION DETECTION TECHNIQUES IN MOBILE AD HOC AND WIRELESS SENSOR NETWORKS

ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Wireless Sensor Networks Chapter 14: Security in WSNs

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik

Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network

CELL BREATHING FOR LOAD BALANCING IN WIRELESS LAN

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network

University of L Aquila Center of Excellence DEWS Poggio di Roio L Aquila, Italy

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks

Securing MANET Using Diffie Hellman Digital Signature Scheme

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Secure Key Management Scheme in Wireless Mesh Networks

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation

In the first part of the talk, some common location-based security vulnerabilities will be presented. In the second part, the state-of-the-art

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Single Sign-On Secure Authentication Password Mechanism

Load Balancing among Access Points

Internet of Things (IoT): A vision, architectural elements, and future directions

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

Algorithms for Interference Sensing in Optical CDMA Networks

Special Properties of Ad-hoc Wireless Network and Security Models

Introduction to Wireless Sensor Network Security

Firewall Verification and Redundancy Checking are Equivalent

Distributive Reprogramming of Wireless Sensor Nodes with Secure Data Transmission

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

Protein Protein Interaction Networks

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

CHAPTER 1 INTRODUCTION

Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

ISSN: (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

International Journal of Recent Trends in Electrical & Electronics Engg., Feb IJRTE ISSN:

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Gossiping using the Energy Map in Wireless Sensor Networks

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

An Implementation of Public Key Infrastructure Using Wireless Communication Networks

Security Threats in Mobile Ad Hoc Networks

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

An Efficient Filter for Denial-of-Service Bandwidth Attacks

Decentralized Utility-based Sensor Network Design

Trust and Reputation Management in Distributed Systems

An Efficient Secure Route Discovery Protocol for DSR

A Model For Revelation Of Data Leakage In Data Distribution

DAG based In-Network Aggregation for Sensor Network Monitoring

Wireless Sensor Network: Challenges, Issues and Research

Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

Strictly as per the compliance and regulations of:

Survey on different attacks in Wireless Sensor Networks and their prevention system

ROPE: ROBUST POSITION ESTIMATION IN WIRELESS SENSOR NETWORKS

Problems of Security in Ad Hoc Sensor Network

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

About the Authors Preface Acknowledgements List of Acronyms

Towards Efficient Routing in Vehicular Ad Hoc Networks

SECURITY SCHEMES FOR WIRELESS SENSOR NETWORKS WITH MOBILE SINK

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Electronic Network - Advantages and Disadvantages

KeyWORDS Of Certificate Revocation

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

A Security Architecture for. Wireless Sensor Networks Environmental

Cyber-Security Analysis of State Estimators in Power Systems

Transcription:

Secure location determination and verification in wireless networks 1. Lazos, L. and Poovendran, R. 2004. SeRLoc: secure rangeindependent localization for wireless sensor networks. In Proceedings of the 3rd ACM Workshop on Wireless Security (Philadelphia, PA, USA, October 01-01, 2004). WiSe '04. 2. S. Ray, R. Ungrangsi, F. D. Pellegrini, A. Trachtenberg, and D. Starobinski. Robust location detection in emergency sensor networks. In Proceedings of IEEE INFOCOM 2003, April 2003. 3. Liu, D., Ning, P., and Du, W. K. 2005. Attack-resistant location estimation in sensor networks. In Proceedings of the 4th international Symposium on information Processing in Sensor Networks (IPSN) (Los Angeles, California, April 24-27, 2005). 4. Ekici, E.; Mcnair, J.; Al-Abri, D., "A Probabilistic Approach to Location Verification in Wireless Sensor Networks," Communications, 2006. ICC '06. IEEE International Conference on, vol.8, no., pp.3485-3490, June 2006. 1/15 Attack-Resistant Location Estimation in Sensor Networks Dependable Computing Systems Laboratory DongHoon Shin 24 October 2007 2 1

Motivation & Goal Motivation Most of existing location discovery protocols for wireless sensor networks (WSNs) are vulnerable in hostile environments. Authentication can certainly enhance the security of location discovery, but cannot guarantee it. Replaying beacon packets Goal Forging beacon packets with keys learned through compromised nodes Develop attack-resistant location estimation techniques to tolerate the malicious attacks against range-based location discovery in WSNs. 3/15 Attack Resistant Location Estimation Attack-Resistant Minimum Mean Square Estimation Exploits the inconsistency among location references Employs the minimum mean square estimation (MMSE) to identify and remove malicious location references Voting-Based Location Estimation Has location reference vote on the cells in which node may reside Provides an iterative refinement of voting results 4/15 2

Assumptions & Threat Model All beacon nodes are uniquely identified. Each non-beacon node uses at most one location reference derived from the beacon signals sent by each beacon node. Distances measured from beacon signals (e.g., with RSSI or TDoA) are used for location estimation. A location reference obtained from a beacon signal is denoted as a triple <x, y, δ>. An attacker may change any field in a location reference. Multiple malicious beacon nodes may collude together to make the malicious location references appear to be consistent. 5/15 Attack-Resistant MMSE Algorithm 1. First, estimate the sensor s location with a existing MMSE-based method, and then assess if the estimation location could be derived from a set of consistent location references. If yes, accept the estimation result Otherwise, identify and remove the most inconsistent location reference, and repeat the above process 2. The process continues until we find a set of consistent location references or it is not possible to find such a set. Mean square error and τ-consistent If ς 2 < τ 2, L is said to be τ-consistent. 6/15 3

Attack-Resistant MMSE Given a set L of n-location references and a threshold τ, find the largest set of τ-consistent location references Naïve approach: check all subsets of L with i location references about τ- consistency i starts from n and drops until a subset of L is found τ-consistent or it is not possible to find such a set If the largest set consists of m elements, # of MMSE method to be used is at least, 1+ n C m+1 + + n C n times, e.g. if n=10 and m=5, 387 times are needed to perform the MMSE method. Greedy Algorithm In first round, starts with the set of all location references In each round, it first verifies if the current set of location references is τ- consistent If yes, the algorithm outputs the estimated location and stops. Otherwise, it considers all subsets of location with one fewer location reference, and chooses the subset with least mean square error as input to the next round. Uses a MMSE method at most 1+n+(n-1)+ + 4 times when m=5. For the earlier example, performs MMSE operations for about 50 times. 7/15 Attack-Resistant MMSE Determine threshold τ τ depends on the measurement error model Assume the measurement error model will not change Performs simulation off-line and determine an appropriate τ The measurement error of a benign location reference <x i, y i, δ i, > can be given by Obtain the distribution of the mean square error through following Lemma1 Choose a value of τ corresponding to a high cumulative probability 8/15 4

Voting-Based Location Estimation Basic Scheme Determine the target field First, identifies the minimum rectangular that covers all the locations declared in location references Extend this rectangular by the transmission range of a beacon signal Divide the target field into M small squares (cells) with same side length L Keeps a voting state variable for each cell, initially set to 0 Find a candidate ring at (x, y) For a benign location reference <x, y, δ>, this location reference must be in a ring centered at (x, y), with inner radius max{δ-ε,0} and outer radius δ+ε Identifies the cells that overlap with the corresponding candidate ring Increments the voting variables for these cells by 1 9/15 Voting-Based Location Estimation Overlap of Candidate Rings and Cells Check if the candidate ring at A overlaps with a cell The candidate ring does not overlaps with the cell only when Compute d min and d max 10/15 5

Voting-Based Location Estimation Overlap of Candidate Rings and Cells (con t) Limit the examinations of cells Iterative Refinement Number of cells M is a critical parameter The larger M, the more precise the location is, but more storage required Granularity of the partition is limited by memory size Iterative refinement 1. M is chosen according to the memory constraint. 2. After the first round, a sensor node find the cells having the largest vote. 3. In the next round, performs the voting process for the smallest rectangle that contains all cell having the largest vote. 4. The iterative refinement process continues until a desired precision is reached or the estimation cannot be refined. 11/15 Simulation Evaluation Three Attack Scenarios A single malicious location reference Declares a wrong location e meters away from the beacon node s real location Multiple non-colluding malicious location references Each of them independently declares a wrong location. Multiple colluding malicious location references Malicious location references declare false locations. Coordinate with each other so that the malicious location references may appear to be consistent to a victim node. 12/15 6

Simulation Evaluation Evaluation of Attack-Resistant MMSE 13/15 Simulation Evaluation Evaluation of Voting-Based Scheme 14/15 7

Future Research Study the techniques that utilize location references from nonbeacon nodes that already estimated their locations Investigate the effect of error propagation due to the estimation errors at non-beacon nodes Study how to combine the proposed techniques with other protection mechanisms such as wormhole detection 15/15 8