Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Trust relationships in sensor networks Ruben Torres October 2004.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
Multiple access What if multiple machines are sharing the same link?
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
KAIST Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks Suho Yang (CS710: November 4, 2008) Kyle Jamieson, Hari Balakrishnan, Y.C. Tay LNCS.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Self-Management in Chaotic Wireless Deployments A. Akella, G. Judd, S. Seshan, P. Steenkiste Presentation by: Zhichun Li.
Resilience To Jamming Attacks
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Energy Aware Directed Diffusion for Wireless Sensor Networks Jisul Choe, 2Keecheon Kim Konkuk University, Seoul, Korea
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Delay Efficient Sleep Scheduling in Wireless Sensor Networks Gang Lu, Narayanan Sadagopan, Bhaskar Krishnamachari, Anish Goel Presented by Boangoat(Bea)
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
ARES: an Anti-jamming REinforcement System for Networks Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Christos Gkantsidis.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
SoftCOM 2005: 13 th International Conference on Software, Telecommunications and Computer Networks September 15-17, 2005, Marina Frapa - Split, Croatia.
Wireless Sensor Networks COE 499 Energy Aware Routing
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Minimum Average Routing Path Clustering Problem in Multi-hop 2-D Underwater Sensor Networks Presented By Donghyun Kim Data Communication and Data Management.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
A Power Assignment Method for Multi-Sink WSN with Outage Probability Constraints Marcelo E. Pellenz*, Edgard Jamhour*, Manoel C. Penna*, Richard D. Souza.
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
Rajani Muraleedharan and Lisa Ann Osadciw By: Mai Ali Sayed Ahmed.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Multiple Access Methods
Multiple Access Methods
Capacity of Ad Hoc Networks
Protocols.
Multiple Access Methods
Protocols.
Presentation transcript:

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented by Choi, Chang-Beom

Introductions (1/2) Characteristic of jamming attacks (DoS) ▫ No special hardware is needed in order to be launched ▫ It can be implemented by simply listening to the open medium and broadcasting in the same frequency band as the network ▫ If launched wisely, it can lead to significant benefits with small incurred cost for the attacker Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 2/$

Introductions (2/2) Vulnerabilities of Sensor Network ▫ Sensor networks rely on deployed miniature energy constrained devices to perform a certain task without a central powerful monitoring point Controllable Jamming Attacks ▫ Easy to launch and difficult to detect and confront ▫ Jammer controls probability of jamming and transmission range in order to cause maximal damage to the network Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 3/$

Modeling Assumptions(1/4) Sensor network model ▫ Each node cannot transmit and receive simultaneously ▫ There are always packets in each node’s buffer in each slot ▫ Sensor nodes are uniformly distributed in a region with spatial density ρ nodes per unit area ▫ Sensor network topology is static Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 4/$

Modeling Assumptions(2/4) Multiple access protocols are characterized by a common channel access probability γ for all nodes in a slot ▫ Probability that a packet is transmitted to j is γ/ n i Case of collision ▫ Receiver node j experiences collision if at least two nodes in its neighborhood transmit packet simultaneously ▫ Probability of collision  1 – Pr{only one or no neighbor transmits} = Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 5/$

Modeling Assumptions(3/4) Attacker model ▫ The objective of the jammer is to corrupt transmissions of legitimate nodes by causing packet collisions at receivers ▫ Jammer controls the probability q of jamming the area within its transmission range in a slot to control the aggressiveness of the attack ▫ Probability of collision Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 6/$

Modeling Assumptions(4/4) Attack detection model ▫ The monitoring mechanism  Determination of a subset of nodes that will act as network monitors  Employment of a detection algorithm at each monitor node ▫ Detection  During normal network operation, and in the absence of a jammer, it give a large enough training period (percentage of collisions)  Fix attention to a time window and check whether the percentage of collisions over this time window exceeds the learned long-term average or not  Wald’s Sequential Probability Ratio Test(SPRT)  A. Wald, Sequential Analysis, Wiley 1947 Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 7/$

Attacker Payoff(1/5) Instantaneous Payoff of the attacker U mI ▫ It depends on jamming probability q and network access probability γ ▫ Transmitters are uniformly distributed with density ργ ▫ Total number of transmitters in the jammed area A is Poisson distributed with spatial density λ = ργ which is A ργ ▫ The number of potential receivers is A ρ (1- γ ) ▫ The probability of success of an attempted transmission is Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 8/$

Attacker Payoff(2/5) Instantaneous Payoff of the attacker U mI ▫ The number of successful transmission links Y follows the binomial distribution ▫ Payoff for the jammer ▫ Instantaneous pay off for the attacker that jams with probability q ▫ The instantaneous payoff for the network in the absence of jammer Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 9/$

Attacker Payoff(3/5) Cumulative Payoff ▫ The number of jammed links until the jammer is detected and the notification message is transferred out of the jammed area ▫ The probability of successful channel access for a node on the route of the notification message in the presence of jamming ▫ Average waiting time for node before successful transmission Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 10/$

Attacker Payoff(4/5) Cumulative Payoff Let average number of hops needed to deliver the alarm out of area be H ▫ The Average time needed for the alarm to propagate out of the jamming area is where is the average number of neighbors of a node along the path The total time until the jamming activity stops is Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 11/$ Where D(q,r) is detection time

Attacker Payoff(5/5) Cumulative Payoff Cumulative payoff Cumulative payoff for the network Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 12/$

Constant Jamming Power and one monitor node ▫ The objective function is the total delay ▫ An adversary tries to maximize total delay by controlling q ▫ The network tries to minimize total delay by selecting γ Problem Formulation Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 13/$ Attacker Problem Network Problem

Problem Formulation Constant Jamming Power and one monitor node ▫ With perfect knowledge  Solution is determined by the energy and payoff constraints ▫ Without perfect knowledge  Approximate the solution of the max-min(min-max) problem Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 14/$ Attacker Problem Network Problem

Numerical Result For Lack of Knowledge Case Sensor node transmission range R = 20m Node density ρ = Energy constraint E/P = 500 Payoff threshold U 0 = 500 transmission Attacker transmission range R m = 200m Energy constraint E m /P m = 1000 Target payoff U 0 m = 500 p FA = 0.02, p D = 0.98 Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 15/$

Problem Formulation Constant Jamming Power and several monitor nodes ▫ Nodes can be classified in different classes C 1, … C k such that nodes in class C n have n neighbors ▫ Assign the role of monitor to nodes of a class with n* neighbors to minimize detection time Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 16/$ Detection delay balancing problem Since detection time is decreasing in q regardless of number of neighbors, the smallest feasible q imposed by the energy constraint is the solution for the attacker

Problem Formulation Controllable Jamming Power and several monitor nodes ▫ Jammer can choose transmission power level with probability q j such that ▫ With probability q 0 = 1 – q the jammer remains silent ▫ Different jamming power levels lead to different jamming area ▫ Monitor nodes located in outer zones  Perceive lower jamming probability, pass notification message faster ▫ Monitor nodes located in inner zones  Detect faster, delay in passing the message out of the jamming area Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 17/$

Problem Formulation Controllable Jamming Power and several monitor nodes ▫ Detection plus notification time for inner zone ▫ Detection plus notification time for outer zone Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 18/$ From numerical solutions for different, Optimal solution without knowledge of monitor neighborhood is to jam the inner region The theoretical proof or disproof of this observation is deferred for future study

Conclusion Controllable jamming attacks ▫ Easy to launch ▫ Difficult to detect and confront ▫ Comparisons between  Perfect knowledge of the attacker and network strategy  Lack of knowledge of the attacker and network strategy Further research ▫ Consider about multi-channel networks ▫ Find alternatives for modeling lack of knowledge for the attacker and the network ▫ Considering multiple potentially co operating attackers Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 19/$