Resilient Aggregation in Sensor Networks

Slides:



Advertisements
Similar presentations
Modeling of Data. Basic Bayes theorem Bayes theorem relates the conditional probabilities of two events A, and B: A might be a hypothesis and B might.
Advertisements

Regression Eric Feigelson Lecture and R tutorial Arcetri Observatory April 2014.
Chris Karlof and David Wagner
Let X 1, X 2,..., X n be a set of independent random variables having a common distribution, and let E[ X i ] = . then, with probability 1 Strong law.
Copyright (c) 2004 Brooks/Cole, a division of Thomson Learning, Inc. Chapter 6 Point Estimation.
Chapter 6 Confidence Intervals.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
The General Linear Model. The Simple Linear Model Linear Regression.
Visual Recognition Tutorial
Security for ad-hoc networks: Cryptography and beyond David Wagner U.C. Berkeley.
SUMS OF RANDOM VARIABLES Changfei Chen. Sums of Random Variables Let be a sequence of random variables, and let be their sum:
Global Synchronization in Sensornets Jeremy Elson, Richard Karp, Christos Papadimitriou, Scott Shenker.
Evaluating Hypotheses
Today Today: Chapter 8 Assignment: 5-R11, 5-R16, 6-3, 6-5, 8-2, 8-8 Recommended Questions: 6-1, 6-2, 6-4, , 8-3, 8-5, 8-7 Reading: –Sections 8.1,
Standard error of estimate & Confidence interval.
 Deviation is a measure of difference for interval and ratio variables between the observed value and the mean.  The sign of deviation (positive or.
Binary Variables (1) Coin flipping: heads=1, tails=0 Bernoulli Distribution.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Discrete Random Variables Chapter 4.
6- 1 Chapter Six McGraw-Hill/Irwin © 2005 The McGraw-Hill Companies, Inc., All Rights Reserved.
Confidence Intervals for the Mean (σ known) (Large Samples)
LECTURER PROF.Dr. DEMIR BAYKA AUTOMOTIVE ENGINEERING LABORATORY I.
Gu Yuxian Wang Weinan Beijing National Day School.
Continuous Distributions The Uniform distribution from a to b.
LECTURER PROF.Dr. DEMIR BAYKA AUTOMOTIVE ENGINEERING LABORATORY I.
Sampling Distribution of the Sample Mean. Example a Let X denote the lifetime of a battery Suppose the distribution of battery battery lifetimes has 
McGraw-Hill/IrwinCopyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. Chapter 5 Discrete Random Variables.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Chapter 7 Sampling and Sampling Distributions ©. Simple Random Sample simple random sample Suppose that we want to select a sample of n objects from a.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
Mangai Vetrivelan Snigdha Joshi Avani Atre. Sensor Network Vulnerabilities o Unshielded Sensor Network Nodes vulnerable to be compromised. o Attacks on.
Secure In-Network Aggregation for Wireless Sensor Networks
Geology 5670/6670 Inverse Theory 21 Jan 2015 © A.R. Lowry 2015 Read for Fri 23 Jan: Menke Ch 3 (39-68) Last time: Ordinary Least Squares Inversion Ordinary.
Chapter 7 Point Estimation of Parameters. Learning Objectives Explain the general concepts of estimating Explain important properties of point estimators.
Expectation. Let X denote a discrete random variable with probability function p(x) (probability density function f(x) if X is continuous) then the expected.
Wireless Sensor Networks M Homework #2. IEEE MAC Protocol - Star topology – Part I Consider a square area equipped with 30 nodes distributed.
Point Estimation of Parameters and Sampling Distributions Outlines:  Sampling Distributions and the central limit theorem  Point estimation  Methods.
1 CHAPTER 6 Sampling Distributions Homework: 1abcd,3acd,9,15,19,25,29,33,43 Sec 6.0: Introduction Parameter The "unknown" numerical values that is used.
Chapter 5 Sampling Distributions. The Concept of Sampling Distributions Parameter – numerical descriptive measure of a population. It is usually unknown.
Statistical Estimation Vasileios Hatzivassiloglou University of Texas at Dallas.
Machine Learning 5. Parametric Methods.
Statistics Sampling Distributions and Point Estimation of Parameters Contents, figures, and exercises come from the textbook: Applied Statistics and Probability.
Review of statistical modeling and probability theory Alan Moses ML4bio.
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 5 Discrete Random Variables.
Week 21 Order Statistics The order statistics of a set of random variables X 1, X 2,…, X n are the same random variables arranged in increasing order.
Computer Performance Modeling Dirk Grunwald Prelude to Jain, Chapter 12 Laws of Large Numbers and The normal distribution.
+ The Practice of Statistics, 4 th edition – For AP* STARNES, YATES, MOORE Chapter 8: Estimating with Confidence Section 8.2 Estimating a Population Proportion.
Chapter 8 Estimation ©. Estimator and Estimate estimator estimate An estimator of a population parameter is a random variable that depends on the sample.
Statistics 350 Lecture 2. Today Last Day: Section Today: Section 1.6 Homework #1: Chapter 1 Problems (page 33-38): 2, 5, 6, 7, 22, 26, 33, 34,
ETHEM ALPAYDIN © The MIT Press, Lecture Slides for.
Chapter 6: Sampling Distributions
Sampling and Sampling Distributions
Chapter Six McGraw-Hill/Irwin
Discrete Random Variables
Some General Concepts of Point Estimation
Warm Up What is the mean, median, mode and outlier of the following data: 16, 19, 21, 18, 18, 54, 20, 22, 23, 17 Mean: 22.8 Median: 19.5 Mode: 18 Outlier:
Maximum Likelihood Estimation
Distributed Energy Efficient Clustering (DEEC) Routing Protocol
t distribution Suppose Z ~ N(0,1) independent of X ~ χ2(n). Then,
Goodness-of-Fit Tests
Using the Tables for the standard normal distribution
POINT ESTIMATOR OF PARAMETERS
Chapter 8: Estimating with Confidence
Chapter 8: Estimating with Confidence
Chapter 8: Estimating with Confidence
Chapter 8: Estimating with Confidence
Chapter 8: Estimating with Confidence
Chapter 8: Estimating with Confidence
Chapter 8 Estimation.
Applied Statistics and Probability for Engineers
Overview: Chapter 2 Localization and Tracking
Presentation transcript:

Resilient Aggregation in Sensor Networks David Wagner

An abstract model Consider only a single base station and n associated sensor nodes. Ignore the inner workings of the specific aggregation and communication protocol. Ignore the structure of the multi-hop network.

Threat model Each sensor node has a secure channel back to the base station. Secure channels are independent. The adversary can inject arbitrarily chosen malicious data readings at a few sensors. The adversary’s capabilities are not unlimited. Base stations remain trustworthy and unassailable.

Central question for secure aggregation Which aggregation functionalities can be securely and meaningfully computed, in the presence of a few compromised nodes? Any aggregate that is resilient against malicious attack will also be resilient against random failure.

Attacks on existing aggregation functions The average is insecure. The sum is insecure. The minimum is insecure. The maximum is insecure. A single node can exert control over the whole function. The count can be secured!

Estimation theory Root mean square error: Given a sequence of observations X1,…,Xn from a known parameterized distribution p(X|θ) , where θ is a hidden parameter, the goal is to estimate θ as accurately as possible. Root mean square error:

Suppose attack is specified by function A, the inaccuracy is measured by An aggregation function is (k, α) resilient if f satisfies the following equation.

Informal result: Let f be an unbiased estimator, let σ denote the standard deviation of f(X1,…,Xn) in the absence of compromised nodes. If f is (k,α) resilient, then it can be computed at a base station with bias on the order of ±ασ or less. Conversely, if f is not (k,α) resilient, then no matter how f is computed, the adversary can skew the result by more than ±ασ at least some of the time.

Satisfactory and unsatisfactory aggregation functions Data model: For continuous data, assume that each sensor reading follows the Gaussian distribution. For 0/1-valued data, assume that each sensor reading follows the Bernoulli distribution.

2. The minimum and maximum They are not (1,α) resilient The count The average and sum They are not (1,α) resilient. 2. The minimum and maximum They are not (1,α) resilient The count It is (k, α) resilient. The median

Tools for achieving resilient aggregation: Truncation Trimming Open problem: Consider in-network aggregation in the future. Consider more complex aggregation functions.