Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.

Slides:



Advertisements
Similar presentations
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
Advertisements

Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
A Distributed Algorithm for the Dead End Problem of Location Based Routing in Sensor Networks Le Zou, Mi Lu, Zixiang Xiong, Department of Electrical Engineering,
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
1 Routing Techniques in Wireless Sensor networks: A Survey.
Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
1 Enhancing Source-Location Privacy in Sensor Network Routing P. Kamat, Y. Zhang, W. Trappe and C. Ozturk Proceedings of the 25th IEEE Int. Conference.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
CS 599 Intelligent Embedded Systems1 Adaptive Protocols for Information Dissemination in Wireless Sensor Networks W.R.Heinzelman, J.kulik, H.Balakrishnan.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Routing Protocols II.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
Load Balancing Routing Scheme in Mars Sensor Network CS 215 Winter 2001 Term Project Prof : Mario Gerla Tutor: Xiaoyan Hong Student : Hanbiao Wang & Qingying.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
Cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Sidewinder A Predictive Data Forwarding Protocol for Mobile Wireless Sensor Networks Matt Keally 1, Gang Zhou 1, Guoliang Xing 2 1 College of William and.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering POWER-SPEED A Power-Controlled Real-Time Data Transport Protocol for Wireless Sensor-Actuator.
Wireless Sensor Networks COE 499 Energy Aware Routing
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
VAPR: Void Aware Pressure Routing for Underwater Sensor Networks
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
S& EDG: Scalable and Efficient Data Gathering Routing Protocol for Underwater Wireless Sensor Networks 1 Prepared by: Naveed Ilyas MS(EE), CIIT, Islamabad,
Destination-Driven On-Demand Multicast Routing Protocol for Wireless Ad Hoc Networks Ke Tian ab, Baoxian Zhang bc, Hussein Mouftah d, Zhuang Zhao be and.
 Tree in Sensor Network Patrick Y.H. Cheung, and Nicholas F. Maxemchuk, Fellow, IEEE 3 rd New York Metro Area Networking Workshop (NYMAN 2003)
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Forwarding Group Multicast Protocol (FGMP) for Multihop, Mobile Wireless Networks Speaker : Wilson Lai Date : Ching-Chuan Chiang, Mario Gerla.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
A Reliability-oriented Transmission Service in Wireless Sensor Networks Yunhuai Liu, Yanmin Zhu and Lionel Ni Computer Science and Engineering Hong Kong.
Wireless Access and Networking Technology Lab WANT Energy-efficient and Topology-aware Routing for Underwater Sensor Networks Xiaobing Wu, Guihai Chen and.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim, Dept. of Electrical & Electronic Eng., Yonsei University;
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Centralized Transmission Power Scheduling in Wireless Sensor Networks Qin Wang Computer Depart., U. of Science & Technology Beijing Edward Y. Hua Wireless.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Structure-Free Data Aggregation in Sensor Networks.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Repairing Sensor Network Using Mobile Robots Y. Mei, C. Xian, S. Das, Y. C. Hu and Y. H. Lu Purdue University, West Lafayette ICDCS 2006 Speaker : Shih-Yun.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Data Collection and Dissemination
Location Cloaking for Location Safety Protection of Ad Hoc Networks
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Data Collection and Dissemination
Presentation transcript:

Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005

Computer Science 2 Introduction and Motivation Major challenge to deployment of sensor networks is privacy Two types of privacy –Content-oriented privacy (e.g. packet data) –Contextual privacy (e.g. source location of packet) Important use of future sensor network applications is asset monitoring –Source-location privacy is critical

Computer Science 3 Example Scenario source sink

Computer Science 4 Outline Panda-Hunter Game Formal & Simulation Models Baseline Routing Routing with Fake Sources Phantom Routing Privacy for Mobile Sources Conclusions & Future Work

Computer Science 5 Panda-Hunter Game Once panda is detected, source periodically sends data to sink through multi-hop routing Assume single panda, source, and sink Attacker: –Non-malicious –Device-Rich –Resource-Rich –Informed Privacy cautious routing technique prevents hunter from locating source

Computer Science 6 Formal Model Asset monitoring network: sixtuple (N, S, A, R, H, M) –N = set of sensor nodes –S = network sink –A = asset being monitored –R = routing policy of sensors to protect asset –H = hunter with movement rules M to capture asset Two privacy metrics for a routing strategy R –Φ = safety period of an R given M –L = capture likelihood of R given M Network performance –Energy Consumption (# messages sent) –Delivery Quality (avg. msg. latency, delivery ratio)

Computer Science 7 Simulation Model N = 10,000 nodes Panda appears at random location, and closest sensor periodically sends packets to the sink Simulation ends if hunter gets close to panda (i.e. within Δ hops) or hunter fails to catch panda within a threshold time

Computer Science 8 Baseline Routing Techniques Two most popular routing techniques for sensor networks –Flood-based Routing Source node forwards packets to all neighbors When a neighbor receives a packet, if it has not already seen this packet, it forwards the packet to all its neighbors with probability P forward –Single-path (Shortest-path) Routing Initial configuration phase sets up lists at sensor nodes so each node knows which neighbor is on the shortest path to the sink

Computer Science 9 Patient Adversary Model Hunter starts at sink When hunter hears a message, it moves to the message’s immediate sender Process repeats until hunter reaches source

Computer Science 10 Baseline Routing Performance

Computer Science 11 Baseline Routing Performance (2)

Computer Science 12 Routing with Fake Sources Flooding and single-path routing have poor source-privacy: –Add fake sources to inject fake packets –Lead hunter away from real source Two Issues –How to choose the fake source? –How often to inject fake packets?

Computer Science 13 Routing with Fake Sources (2)

Computer Science 14 Routing with Fake Sources (3) Fake sources still not enough Smarter Adversary can detect zigzag pattern Pick one of the two directions and follow to the source If this is not the real source, backtrack to reach the other source Fake messaging increases energy cost for little increase in source-location privacy

Computer Science 15 Phantom Routing Problem with baseline and fake messaging techniques: –Sources provide a fixed route so adversary can trace each route Goal of phantom routing: –Direct hunter away from source to phantom source Two Phases –Random walk: direct msg. to phantom source –Flooding/single-path routing: direct msg. to sink

Computer Science 16 Phantom Routing (2)

Computer Science 17 Phantom Routing (3) Random Walk Phase –Source-location privacy depends on phantom source being far from real source after h walk hops True Random Walk –Not good: Message tends to hover around real source –Proof in paper using central limit theorem Directed Random Walk –Sector-based: Each node knows east/west –Hop-based: Each node knows toward/away from source –Pick one direction randomly and each node during random walk sends the msg. to another node in that direction

Computer Science 18 Phantom Routing (4)

Computer Science 19 Phantom Routing (5) New adversary: Cautious Adversary Model –Since hunter may be stranded far from true source and not hear any messages for some time –If no message heard for some time interval, backtrack one step and wait again Results worse for cautious adversary, so it is better for hunter to be patient and wait for messages to arrive

Computer Science 20 Privacy for Mobile Sources How does source location privacy change if asset is mobile (e.g. panda walks around) Tests using a simple movement pattern: α: governs direction δ: stay time at each location d: distance of each movement T: reporting interval

Computer Science 21 Privacy for Mobile Sources Impact of panda’s velocity

Computer Science 22 Privacy for Mobile Sources Impact of hunter’s hearing range

Computer Science 23 Conclusions & Future Work Conclusions –Flooding and single-path routing have poor source location privacy –Phantom routing can be used with either routing protocol to greatly enhance privacy at a small cost of communication overhead Future Work –Authors: Investigate stronger adversarial models and multiple asset tracking scenarios –Multiple hunters: Could they collude to find panda faster –Multiple sinks: Sensors transmit to randomly chosen sink