Adaptable and Reactive Security for Wireless Sensor Networks John A. Stankovic Department of Computer Science University of Virginia.

Slides:



Advertisements
Similar presentations
Cyber-Physical Systems: Aspects as a Basis for Robustness and Openness John A. Stankovic Department of Computer Science University of Virginia March 2009.
Advertisements

KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
A High-Accuracy, Low-Cost Localization System for Wireless Sensor Networks Radu Stoleru, Tian He, John A. Stankovic, David Luebke University of Virginia.
Accurate Emulation of Wireless Sensor Networks Hejun Wu Joint work with Qiong Luo, Pei Zheng*, Bingsheng He, and Lionel M. Ni Department of Computer Science.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
Control over Networks. The Coming Revolution  Electronics advances Moore’s law Computing/memory  Metrology advances MEMS  Communication advances Layered.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SUMMARY COMMENTS ON SENSOR NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute.
Wireless Sensor Networks for Habitat Monitoring Jennifer Yick Network Seminar October 10, 2003.
Lecture 11 Intrusion Detection (cont)
Achieving Long-Term Surveillance in VigilNet Pascal A. Vicaire Department of Computer Science University of Virginia Charlottesville, USA.
Learning Micro-Behaviors In Support of Cognitive Assistance AlarmNet is a wireless sensor network (WSN) system for smart health-care that opens up new.
Anthony D. Wood, John A. Stankovic, Gilles Virone, Leo Selavo, Zhimin He, Qiuhua Cao, Thao Doan, Yafeng Wu, Lei Fang, and Radu Stoleru University of Virginia.
Chapter 1: Hierarchical Network Design
Wireless Sensor Networks Self-Healing Professor Jack Stankovic University of Virginia 2005.
Wireless Sensor Networks CS 4501 Professor Jack Stankovic Department of Computer Science Fall 2010.
DESIGN & IMPLEMENTATION OF SMALL SCALE WIRELESS SENSOR NETWORK
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
University of Virginia Wireless Sensor Networks August, 2006 University of Virginia Jack Stankovic.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Microcontroller-Based Wireless Sensor Networks
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B17 Organizational Architecture Trends.
Crowd Management System A presentation by Abhinav Golas Mohit Rajani Nilay Vaish Pulkit Gambhir.
KAIS T CS712 병렬처리 특강 - 차세대 무선네트워크 응용 및 보안 - Syllabus Network & Security Lab.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
AKARI New Generation Network Architecture SeungHo Lee.
Heavy and lightweight dynamic network services: challenges and experiments for designing intelligent solutions in evolvable next generation networks Laurent.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
1 Mobile Networks logica Contents Confidential & Proprietary to Logica © 2001 Application-Level Active Networks Presented at Dublin Breakfast Briefing,
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
Chapter 6 An Introduction to System Software and Virtual Machines.
Achieving Long-Term Surveillance in VigilNet Tian He, Pascal Vicaire, Ting Yan, Qing Cao, Gang Zhou, Lin Gu, Liqian Luo, Radu Stoleru, John A. Stankovic,
Xiong Junjie Node-level debugging based on finite state machine in wireless sensor networks.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
W. Hong & S. Madden – Implementation and Research Issues in Query Processing for Wireless Sensor Networks, ICDE 2004.
REU 2007 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Embedded, Real-Time and Wireless Systems Professor Jack Stankovic Department of Computer Science University of Virginia June 2, 2005.
David Evans Swarm Programming How to Program a MicroNet University of Virginia Department of Computer.
Wireless Sensor Networks
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
Sensor Coordination using Active Dataspaces Steven Cheung NSF NOSS PI Meeting October 18, 2004.
University of Virginia Full Life Cycle Analysis for Wireless Sensor Networks January 10, 2007 Computer Science University of Virginia Jack Stankovic.
REU 2009 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks.
Juan Alapin Alon Shahaf Traditional WSN “Sensor Clould” Other stuff??!?
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
University of Virginia Wireless Sensor Networks Sept. 12, 2007 University of Virginia Jack Stankovic.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Software Architecture of Sensors. Hardware - Sensor Nodes Sensing: sensor --a transducer that converts a physical, chemical, or biological parameter into.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Vision: A Robust Architecture for a Diverse Mobile Wireless Internet.
In the name of God.
CompTIA Security+ Study Guide (SY0-401)
Problem: Internet diagnostics and forensics
Jack Pokrzywa Director Ground Vehicle Standards, SAE International
A Network Virtual Machine for Real-Time Coordination Services
CompTIA Security+ Study Guide (SY0-401)
Chapter 3: Open Systems Interconnection (OSI) Model
Wireless Sensor Networks
Aggregation.
Presentation transcript:

Adaptable and Reactive Security for Wireless Sensor Networks John A. Stankovic Department of Computer Science University of Virginia

Outline Brief Motivation Adaptable Self-Healing Architecture –Components –AOP –Robust Decentralized Control –Lightweight Security Components Systems of Systems Summary

1. An unmanned plane (UAV) deploys motes 2. Motes establish an sensor network with power management 3.Sensor network detects vehicles and wakes up the sensor nodes Zzz... VigilNet: Surveillance System Sentry

VigilNet Architecture

Security Issues Every one of the 30 services can be attacked Too expensive to make each service attack proof Attacks will evolve anyway

Security Approach Operate in the presence security attacks –Robust decentralized control Self-Heal –AOP Evolve to new, unanticipated attacks –AOP and Wireless Downloads Lightweight solutions required due to severe constraints

Components

Aspect Oriented Programming (AOP) Functional Modules Aspects Logging Encrypt Power Control

Unanticipated Attacks What if advice was not available on the nodes –Typical for an unanticipated attack –Report event to base station –Find/Write new aspects –Disseminate to nodes

Decentralized Control Large Numbers of Nodes –Aggregate Behavior Emerges –Control/Guarantee Behavior Redundancy Mask faults/ attacks Uniformity a problem/diversity

Lightweight Components Secure (reactive/adaptive) routing Localization

SIGF The SIGF family provides incremental steps between stateless and shared-state protocols. SIGF allows efficient operation when no attacks are present, and good enough security when they are.

Adaptive, Configurable Security level can be adaptive based on the resource constraints and security requirements. Each level can be configured based on parameters.

Localization - Spotlight Run time-sync protocol Generate (invisible) light events Sensor nodes detect the events and report the timestamps The Spotlight device computes the location of the sensor nodes

Localization Robustness Execute combination of protocols

Zzz... System of Systems Sentry

Systems of Systems Inter-system security How to program and debug to ensure –Behavior –Robustness

System Architecture Internet Local Transport Protocol Local Transport Protocol Programming Station Server Nodes

System Architecture Internet Local Transport Protocol Local Transport Protocol Programming Station Server Nodes Information about Services, Interfaces Location

System Architecture Internet Programming Station Server Nodes Local Transport Protocol Local Transport Protocol High level Programming Language EXE High Level Virtual Machine High Level Virtual Machine Low Level Virtual Machine Low Level Virtual Machine

System Architecture Internet Local Transport Protocol Local Transport Protocol Programming Station Server Nodes Responsible for Resource management User access rights Security Attacks

Summary Security in WSN –Lightweight –Attack resilience –Evolve for unexpected attacks Security in Systems of Systems Self-Healing Architecture –AOP extensions –Adaptive and lightweight protocols

Acknowledgements Anthony Wood Hua Cao Radu Stoleru