Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Dynamic Location Discovery in Ad-Hoc Networks
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
HIERARCHY REFERENCING TIME SYNCHRONIZATION PROTOCOL Prepared by : Sunny Kr. Lohani, Roll – 16 Sem – 7, Dept. of Comp. Sc. & Engg.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
Range-Free Sensor Localization Simulations with ROCRSSI-based Algorithm Matt Magpayo
Range-Based and Range-Free Localization Schemes for Sensor Networks
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Preparation for In-class Presentations.
Robust Range-Independent Localization for Wireless Sensor Networks Radha Poovendran Joint work with Loukas Lazos Network Security Lab University of Washington.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
“Localization in Underwater Sensor Networks” Presented by: Ola Ibrahim EL naggar J presentation.
A High-Accuracy, Low-Cost Localization System for Wireless Sensor Networks Radu Stoleru, Tian He, John A. Stankovic, David Luebke University of Virginia.
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks Lei Fang (Syracuse) Wenliang (Kevin) Du (Syracuse) Peng Ning (North Carolina State)
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 13th Lecture Christian Schindelhauer.
TPS: A Time-Based Positioning Scheme for outdoor Wireless Sensor Networks Authors: Xiuzhen Cheng, Andrew Thaeler, Guoliang Xue, Dechang Chen From IEEE.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Jana van Greunen - 228a1 Analysis of Localization Algorithms for Sensor Networks Jana van Greunen.
LAD: Location Anomaly Detection for Wireless Sensor Networks Wenliang (Kevin) Du (Syracuse Univ.) Lei Fang (Syracuse Univ.) Peng Ning (North Carolina State.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
1 Fault Tolerance in Collaborative Sensor Networks for Target Detection IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO. 3, MARCH 2004.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Speed and Direction Prediction- based localization for Mobile Wireless Sensor Networks Imane BENKHELIFA and Samira MOUSSAOUI Computer Science Department.
A Distributed Localization Scheme for Wireless Sensor Networks with Improved Grid-Scan and Vector- Based Refinement Jang-Ping Sheu, Pei-Chun Chen, and.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Sensor Positioning in Wireless Ad-hoc Sensor Networks Using Multidimensional Scaling Xiang Ji and Hongyuan Zha Dept. of Computer Science and Engineering,
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
Localization With Mobile Anchor Points in Wireless Sensor Networks
Architectures and Applications for Wireless Sensor Networks ( ) Localization Chaiporn Jaikaeo Department of Computer Engineering.
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors Weikuan Yu Dept. of Computer and Info. Sci. The Ohio State University.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Multi-hop-based Monte Carlo Localization for Mobile Sensor Networks
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Localization and Secure Localization. The Problem The determination of the geographical locations of sensor nodes Why do we need Localization? –Manual.
1 Diversifying Sensors to Improve Network Resilience Wenliang (Kevin) Du Electrical Engineering & Computer Science Syracuse University.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
Localization and Secure Localization. Learning Objectives Understand why WSNs need localization protocols Understand localization protocols in WSNs Understand.
Secure In-Network Aggregation for Wireless Sensor Networks
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
C. Savarese, J. Beutel, J. Rabaey; UC BerkeleyICASSP Locationing in Distributed Ad-hoc Wireless Sensor Networks Chris Savarese, Jan Beutel, Jan Rabaey.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Similarity Measurement and Detection of Video Sequences Chu-Hong HOI Supervisor: Prof. Michael R. LYU Marker: Prof. Yiu Sang MOON 25 April, 2003 Dept.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Presented by Edith Ngai MPhil Term 3 Presentation
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors
Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Attack-Resistant Location Estimation in Sensor Networks
Wireless Mesh Networks
Resilient Aggregation in Sensor Networks
Presentation transcript:

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless Sensor Networks

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security2 Regular node Beacon node Background -- Localization Data usually combined with locations –Fire alarm, target tracking Traditional GPS –Expensive; does not work indoors GPS-less localization techniques –AHLoS, APS-AoA, DV-Hop, Centroid, APIT, etc.

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security3 Attacks against Localization Impersonate beacon nodes: Wrong measurement or wrong location Compromise beacon nodes: Wrong measurement or wrong location Replay beacon signals: Wrong measurement Challenges in defending these attacks –Resource constraints on sensor nodes –Lack of physical protection –Local collaboration v.s. global threat –Difficulty of authenticating beacon signals

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security4 Range-Based Localization A few beacon nodes with known locations. Two phases: –Phase 1: Estimating distance (RSSI, TDoA, or ToA) –Phase 2: Solving equations by using MMSE A B C A, B, C: beacon nodes

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security5 Impact of Malicious Attacks Obtained through simulation MMSE with 1 malicious beacon signal + 9 benign beacon signals A single malicious signal  arbitrarily large location error

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security6 Attack-Resistant Location Discovery Goal –Resilient location estimation when there are malicious location references Our approaches –Attack-resistant MMSE: identify “inconsistency” among malicious and benign beacon signals –Voting-based scheme: have each location reference vote on the location of the non-beacon node.

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security7 Assumptions Use a key management protocol that provides a unique pair-wise key between any two nodes. –E.g., TinyKeyMan This implies –Each sensor node is uniquely identified –Beacon packets can be authenticated The content, not the signal

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security8 Assumptions (Cont’d) Each sensor node uses at most one beacon signal from each beacon node –Represented as a location reference  x i, y i,  i  –Location of the beacon node and the measured distance. Attacker model –A malicious beacon node can provide arbitrary location references

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security9 Attack-Resistant MMSE Observation: there is “inconsistency” between benign and malicious location references Intuition: identify the most inconsistent location references before final estimation Consistency metric (  2 ): mean square error of distance measurement

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security10 Attack-Resistant MMSE (Cont’d) Ideally, get the largest consistent set of location references –MMSE can achieve more accurate result with more benign location references What we have: check consistency, given a set of location references and a pre-defined threshold τ –If  2 >  2  inconsistent; otherwise, consistent Two remaining questions –How to determine the largest consistent set –How to set an appropriate threshold

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security11 Determining the Largest Consistent Set A simple solution –Try every combination of location references –Expensive: 10 location references, and 5 of them in the largest consistent set  at least 387 MMSE operations Greedy algorithm –Multiple rounds –Remove the most inconsistent location reference in each round –Not guaranteed to find the largest consistent set

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security12 Greedy Algorithm Consistent? A set of m location references and a predefined threshold τ Find consistent set and output result Yes No Consistency Test subsets with i-1 items Consistency Test The one with the smallest MSE i=mi=m i=i-1 i>3? No Fail to find consistent set Yes 10 location references, and 5 of them in the largest consistent set  50 MMSE operations on average

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security13 Investigate the distribution of MSE  2 when there is no malicious attack If the measurement errors are independent, we have where μ i and σ i are the mean and variance of e i 2, and Threshold τ

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security14 Theoretical Results v.s. Simulation Results The threshold should not be too small or too large.

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security15 Voting-Based Scheme Partition the target field into grid with M small squares (cells) Each location reference votes on the possible locations of node Identify the cell (or cells) with the largest vote

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security16 No overlap between the cell and the ring iif –The maximum distance from A to a point in the cell d max (A) < max(0,δ-ε), or –The minimum distance from A to a point in the cell d min (A) > δ+ε Overlap Test

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security17 Granularity M Fine granularity (large M) results in high accuracy but high computation and storage cost, Coarse granularity (small M) results in low accuracy but low computation and storage cost

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security18 Iterative Refinement Idea –Repeat the basic voting algorithm on the result of the last voting round Stop conditions –Achieve the required accuracy (size of cells) –Size of the cell cannot be reduced anymore We use the second stop condition in our experiments

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security19 Simulation Evaluation Evaluate the ability of the proposed methods to tolerate malicious attacks Three attack scenarios –One malicious location reference (9 + 1) –Multiple non-colluding malicious location references (9 + 3) –Multiple colluding malicious location references (9 + 3) Configuration: –30m X 30m target field –Radio signal range 22m –Distance error evenly distributed in (  4, 4)

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security20 Evaluation of Attack-Resistant MMSE

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security21 Evaluation of Voting-Based Scheme

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security22 Comparison Due to the non-optimal solution given by greedy algorithm.

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security23 Implementation Target at MICA2 motes running TinyOS ROMRAM MMSE2, AR-MMSE3, Voting-Based4, Code Size (byte)

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security24 Execution Time 1 malicious location reference

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security25 Field Experiment Use RSSI to measure distance

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security26 1 Malicious Beacon

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security27 3 Non-Colluding Malicious Beacons

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security28 3 Colluding Malicious Beacons

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security29 Conclusion We have been investigating various techniques to secure localization in sensor networks –Prevention –Toleration –Detection and response Future work –Light-weighted secure and resilient solutions –Secure and resilient localization for dynamic sensor networks