1 Enhancing Source-Location Privacy in Sensor Network Routing P. Kamat, Y. Zhang, W. Trappe and C. Ozturk Proceedings of the 25th IEEE Int. Conference.

Slides:



Advertisements
Similar presentations
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Advertisements

SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Introduction to Wireless Sensor Networks
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
1 Routing Techniques in Wireless Sensor networks: A Survey.
1 Distributed Adaptive Sampling, Forwarding, and Routing Algorithms for Wireless Visual Sensor Networks Johnsen Kho, Long Tran-Thanh, Alex Rogers, Nicholas.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Haiyun Luo, Fan Ye, Jerry Cheng, Songwu Lu, Lixia Zhang
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 On Handling QoS Traffic in Wireless Sensor Networks 吳勇慶.
Brent Dingle Marco A. Morales Texas A&M University, Spring 2002
Avoiding Energy Holes in Wireless Sensor Network with Nonuniform Node Distribution Xiaobing Wu, Guihai Chen and Sajal K. Das Parallel and Distributed Systems.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Top-k Monitoring in Wireless Sensor Networks Minji Wu, Jianliang Xu, Xueyan Tang, and Wang-Chien Lee IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Sidewinder A Predictive Data Forwarding Protocol for Mobile Wireless Sensor Networks Matt Keally 1, Gang Zhou 1, Guoliang Xing 2 1 College of William and.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Mobile Routing protocols MANET
Aggregation in Sensor Networks
Routing Protocol Evaluation David Holmer
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering POWER-SPEED A Power-Controlled Real-Time Data Transport Protocol for Wireless Sensor-Actuator.
Anonymous Communication -- a brief survey
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
Algorithms for Wireless Sensor Networks Marcela Boboila, George Iordache Computer Science Department Stony Brook University.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Athanasios Kinalis ∗, Sotiris Nikoletseas ∗, Dimitra Patroumpa ∗, Jose Rolim† ∗ University of Patras and Computer Technology Institute, Patras, Greece.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
FAR: Face-Aware Routing for Mobicast in Large-Scale Sensor Networks QINGFENG HUANG Palo Alto Research Center (PARC) Inc. and SANGEETA BHATTACHARYA, CHENYANG.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
Opportunistic Flooding in Low-Duty- Cycle Wireless Sensor Networks with Unreliable Links Shuo Goo, Yu Gu, Bo Jiang and Tian He University of Minnesota,
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
A Reliability-oriented Transmission Service in Wireless Sensor Networks Yunhuai Liu, Yanmin Zhu and Lionel Ni Computer Science and Engineering Hong Kong.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Enabling QoS Multipath Routing Protocol for Wireless Sensor Networks
IHP: Innovation for High Performance Microelectronics
Xiaobing Wu, Guihai Chen and Sajal K. Das
Introduction to Wireless Sensor Networks
Presentation transcript:

1 Enhancing Source-Location Privacy in Sensor Network Routing P. Kamat, Y. Zhang, W. Trappe and C. Ozturk Proceedings of the 25th IEEE Int. Conference on Distributed Computing Systems Rutgers University Matthew Sanderson

2 Presentation Outline Introduction to issue Introduction to issue Panda vs Hunter Panda vs Hunter Techniques for Stationary Sources Techniques for Stationary Sources  Routing Protocols  Performance Comparison  Improvement for privacy. (Briefly) Mobile Sources (Briefly) Mobile Sources Related/Future Work Related/Future Work Conclusion Conclusion Questions Questions

3 The issue is privacy. “Guarantee that information is observable or decipherable by only those who are intentionally meant to observe or decipher it.” “Guarantee that information is observable or decipherable by only those who are intentionally meant to observe or decipher it.” Two broad categories: Two broad categories:  content-oriented  context-oriented

4 Content-oriented Security/Privacy Security of the contents of messages. Security of the contents of messages. Cryptographic methods. Cryptographic methods.

5 Contextual Privacy Deals with context in which the sensor application works. Deals with context in which the sensor application works. In this case: location In this case: location Not as thoroughly researched. Not as thoroughly researched. What this paper covers. What this paper covers.

6 Source-location Privacy Privacy of the node sending the initial message. Privacy of the node sending the initial message. Two metrics: Two metrics:  safety period – how long until the node is discovered  capture likelihood – how likely it will get discovered

7 Accomplishing source-location privacy Look at popular routing techniques. Look at popular routing techniques. Augment these techniques with a new approach. Augment these techniques with a new approach. Energy consumption still important. Energy consumption still important.

8 Panda-Hunter Game Model Scenario Panda-Hunter Game: Panda-Hunter Game:  A sensor network has been deployed to monitor a panda habitat.  Sensors send Panda_Here messages  Messages are forwarded to a data sink.  The hunter observes packets and traces his way back to the panda. Privacy Goal: Increase the time needed for an adversary to track and capture the panda (safety period). Privacy Goal: Increase the time needed for an adversary to track and capture the panda (safety period). Data Sink Sensor Node Slide source: Wenyuan Xu

9 Additional Game Setup Issues One panda – one source One panda – one source Additional Goal: deliver messages to base station. Additional Goal: deliver messages to base station. Concern: energy usage. Concern: energy usage. Data Sink Sensor Node

10 The Hunter Non-malicious – does not interfere with network Non-malicious – does not interfere with network Device-rich – has devices to measure angle of arriving message Device-rich – has devices to measure angle of arriving message Resource-rich – move at any rate and unlimited power Resource-rich – move at any rate and unlimited power Informed – knows how the network works Informed – knows how the network works

11 How the hunter gets each message. Two primary routing techniques. Two primary routing techniques.  Flooding  Single-path New approach: Phantom Routing. New approach: Phantom Routing.

12 Routing Techniques - Flooding Flooding-based: source sends the message to all its neighbors, who in turn do the same. Flooding-based: source sends the message to all its neighbors, who in turn do the same. If node has received it already, the node discards it. If node has received it already, the node discards it. Performance drawbacks, but easy implementation. Performance drawbacks, but easy implementation.

13 Probabilistic Flooding Like flooding, but with a probability. Like flooding, but with a probability. When a node receives a message, it randomly generates a number uniformly distributed between 0 and 1. When a node receives a message, it randomly generates a number uniformly distributed between 0 and 1. If # < forwarding probability, it sends, otherwise, it doesn't. If # < forwarding probability, it sends, otherwise, it doesn't.

14 Single-Path Routing Instead of sending out to all neighbors, single-path sends out to one or a small subset of neighbors. Instead of sending out to all neighbors, single-path sends out to one or a small subset of neighbors. Usually require extra hardware or a pre- configuration phase. Usually require extra hardware or a pre- configuration phase. Data Sink Sensor Node

15 How well do they work?

16 Performance Comparison cont.

17 Privacy of Routing Techniques Problems with single-path and flooding Problems with single-path and flooding  Single-path reduces energy, but poor at protecting source- location privacy.  Flooding isn't any better, because the shortest-path is still contained within the flood.  Probabilistic flooding helps – higher safety period, but at the cost of delivery ratio. There is room for improvement. There is room for improvement.  Maybe trick the hunter?

18 Routing with Fake Sources Idea: inject fake messages to throw off hunter. Idea: inject fake messages to throw off hunter. Multiple ways this can be done. Multiple ways this can be done.  Short-lived – similar to probabilistic flooding.

19 Persistent Fake Source Short-lived fake sources can only draw the hunter away momentarily. Short-lived fake sources can only draw the hunter away momentarily. A persistent fake source is more effective, but requires a global overview of network. A persistent fake source is more effective, but requires a global overview of network. Source sends its hop count to sink – sink instigates a fake source at a node with the same hop count in the opposite direction. Source sends its hop count to sink – sink instigates a fake source at a node with the same hop count in the opposite direction. Works best when fake source sends at higher rate than real source, but requires large energy budget. Works best when fake source sends at higher rate than real source, but requires large energy budget.

20 Problem with Fake Sources: Perceptive Hunter Recall the assumptions on our hunter – he's informed. Recall the assumptions on our hunter – he's informed. Once he realizes the fake source, he knows which direction to go for the real source. Once he realizes the fake source, he knows which direction to go for the real source. We need a new approach. We need a new approach.

21 Phantom Routing Idea: entice hunter to phantom instead of source. Idea: entice hunter to phantom instead of source. Has two phases: Has two phases:  Random walk phase  Flood/Single-path phase

22 Types of Random Walk Sector-based – requires knowledge of landmark nodes to send message away from source. Sector-based – requires knowledge of landmark nodes to send message away from source. Hop-based – requires knowledge of the hop count from each node to the base station. Hop-based – requires knowledge of the hop count from each node to the base station.

23 Phantom Routing Performance Can significantly improve the safety period. Can significantly improve the safety period. Higher the hopcount, higher the safety period. Higher the hopcount, higher the safety period. Also increases latency (Random walk of 20: 30% increase = 4x privacy). Also increases latency (Random walk of 20: 30% increase = 4x privacy).

24 Possible Counter: Cautious Hunter Since the phantom routing may leave the hunter stranded, after some time, the cautious hunter may go back. Since the phantom routing may leave the hunter stranded, after some time, the cautious hunter may go back. No benefit – no progress made by hunter. No benefit – no progress made by hunter. Better to be patient. Better to be patient.

25 Mobile Source Need to rethink entire process again. Need to rethink entire process again. Depends on panda's movement pattern and velocity. Depends on panda's movement pattern and velocity.

26 Panda Velocity More profound on single-path routing, as subsequent route may have little overlap compared to flooding. More profound on single-path routing, as subsequent route may have little overlap compared to flooding. Panda's speed with single-path is protection enough. Panda's speed with single-path is protection enough. Improves privacy of phantom routing. Improves privacy of phantom routing.

27 Hunter's Range Not so surprising, if the hunter's hearing range is increased, the hunter is more effective.

28 Related/Future Material Entrapping Adversaries for Source Protection in Sensor Networks Entrapping Adversaries for Source Protection in Sensor Networks  Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, Fillia Makedon – Dartmouth College Preserving Source Location Privacy in Monitoring-based Wireless Sensor Networks Preserving Source Location Privacy in Monitoring-based Wireless Sensor Networks  Yong Xi, Loren Schwiebert, Weisong Shi – Wayne State University Location Privacy in Sensor Networks Against a Global Eavesdropper Location Privacy in Sensor Networks Against a Global Eavesdropper  Kiran Mehta, Donggang Liu, Matthew Wright – University of Texas at Arlington

29 Conclusion The panda-hunter game is somewhat contrived. The panda-hunter game is somewhat contrived.  Does a great job at visualizing concept. Concept is simple and effective. Concept is simple and effective. Source-location privacy for sensor networks seems to be a minor issue. Source-location privacy for sensor networks seems to be a minor issue.  I'm willing to admit I'm wrong here.  Come up with some examples.

30 Questions? ?