A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.

Slides:



Advertisements
Similar presentations
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Intrusion Detection for Black Hole and Gray Hole in MANETs.
21-23 November, 2012, 5th IDCS, Wu Yi Shan, China Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks 1 Haojin Zhu Zhaoyu Gao Mianxiong Dong Zhenfu.
University of Waterloo & UOIT & INRIA Lille Presenter: Rongxing Lu
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Network Coding and Reliable Communications Group A Multi-hop Multi-source Algebraic Watchdog Muriel Médard † Joint work with MinJi Kim †, João Barros ‡
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Wireless Sensor Networks COE 499 Energy Aware Routing
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
An Evaluation of Routing Reliability in Non-Collaborative Opportunistic Networks Ling-Jyh Chen, Che-Liang Chiou, and Yi-Chao Chen Institute of Information.
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Structure-Free Data Aggregation in Sensor Networks.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
2010 IEEE Global Telecommunications Conference, GLOBECOM 2010 Zheng Guo; Bing Wang; Jun-Hong Cui Prediction Assisted Single-copy Routing in Underwater.
Fault-Tolerant Routing
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
ITIS 6010/8010 Wireless Network Security
Witness-based Detection of Forwarding Misbehavior in Wireless Networks
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.
Presentation transcript:

A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong Dong, Zhenfu Cao Presented by Youyou Cao

Outline  Introduction  System model  Basic iTrust misbehavior detection scheme  Advanced iTrust probabilistic misbehavior detection scheme  Experiment Results  Future work  Conclusion

Introduction Delay tolerant network(DTN)  lack of contemporaneous end-to-end path  High variation in network conditions  Difficulty to predict mobility patterns  Long feedback delay Store-carry-and-forward strategy  In-transit messages can be sent over an existing link and buffered at the next hop until the next link in path appears DTN Routing Misbehavior  Dropping packets intentionally  Selfish/Malicious  Significantly reduce the packet delivery rate, serious threat against network performance of DTN

Related work Misbehavior detection scheme for MANET:  Neighborhood monitoring ---- won’t work for DTN! black hole attack cannot be detected due to lack of witness  Destination acknowledge ---- won’t work for DTN! Lack of contemporaneous path Current misbehavior detection schemes for DTNs:  Based on forwarding history verification Problem: Transmission overhead and verification cost is high D C A E B F Negative ACK

System Model

Routing Model Use single-copy routing mechanism(First Contact routing protocol)  Note: the proposed misbehaving detection scheme can also be applied to delegation based routing protocols or multi-copy based routing protocols Assume the communication range of a mobile node is finite.  A data sender out of destination node’s communication range can only transmit data via a sequence of intermediate nodes in a multi- hop manner.

Threat model Assume each node in the networks is rational and a rational node’s goal is to maximize its own profit. Mainly consider two kinds of misbehavior node:  Selfish Due to the selfish nature and energy consuming, selfish nodes are not willing to forward bundles for others without sufficient reward.  Malicious As an adversary, the malicious nodes arbitrarily drop others’ bundles (blackhole or greyhole attack), which often take place beyond others’ observation in a sparse DTN, leading to serious performance degradation.

Design Requirements Distributed:  Require that a network authority responsible for the administration of the network is only required to be periodically available and consequently incapable of monitoring the operational minutiae of the network. Robust:  Require a misbehavior detection scheme that could tolerate various forwarding failures caused by various network environments. Scalability:  Require a scheme that works independent of the size and density of the network.

Basic iTrust scheme for misbehavior detection in DTNs Routing Evidence Generation Phase  Three kinds of data forwarding evidences to judge if a node is a malicious one or not Auditing Phase  Three misbehavior detection cases An honest data forwarding with sufficient contacts An honest data forwarding with insufficient contacts A misbehaving data forwarding with/without sufficient contacts

Routing Evidence Generation Phase message Time stamp Packet expiration time Signature generated by the source nodes on message M

Routing Evidence Generation Phase 11

Routing Evidence Generation Phase

Basic iTrust scheme illustration In the Routing Evidence Generation Phase:  A forwards packets to B,then gets the delegation history back. B holds the packet and then encounters C. C gets the contact history about B. In the Auditing Phase:  When TA decides to check B, TA will broadcast a message to ask other nodes to submit all the evidence about B, then A submits the delegation history from B, B submits the forwarding history,C submits the contact history about B.

Auditing phase  Class I (An Honest Data Forwarding with Sufficient Contacts)  Class II (An Honest Data Forwarding with Insufficient Contacts)

Auditing phase  Class III (A Misbehaving Data Forwarding with/without Sufficient Contacts)

The basic misbehavior detection algorithm

The proposed algorithm itself incurs a low checking overhead. However, to prevent malicious users from providing fake delegation/forwarding/contact evidences, TA should check the authenticity of each evidence by verifying the corresponding signatures, which introduce a high transmission and signature verification overhead. So a probabilistic misbehavior detection scheme, where the TA launches the misbehavior detection at a certain probability, is proposed to reduce the detection overhead without compromising the detection performance. The probabilistic scheme of iTrust is inspired by the Inspection game theory. From basic to probabilistic

Game theory analysis Assumptions: g: the forwarding transmission cost for each node to make a packet forwarding W: compensation received from TA if the node successfully pass the investigation C: punishment paid if the node failed the investigation V: credit received by TA for each successful data forwarding H: investigation cost for TA TA’s strategies: Inspecting (I) or Not inspecting (N) Node’s strategies: Forwarding (F) or Offending (O)

Game theory analysis

If the node chooses offending strategy, its payoff is If the node chooses forwarding strategy, its payoff is

Reduction of misbehavior detection cost

Game theory analysis Note: should be

Evaluation of the scalability of iTrust

Impact of Percentage of Malicious Nodes Malicious nodes detection rate >60% for all three case Misidentified rate drops when MNR increases Cost is linear to inspection probability

Impact of Various Packet Loss Rate iTrust is effective for both black hole and grey hole attack Misidentification rate is under 8% if the detection probability is under 10% Cost is linear to inspection probability

Impact of choosing different detection probability iTrust can significantly reduce the misbehavior detection cost Suggest a lower detection probability such as 10% or 20% Correction: Note: should change to Fig. 4(c) and 5(c)

Impact of nodes’ mobility

Impact of message generation interval

Future Work Exploiting reputation system to further improve the performance of iTrust Currently, iTrust assumes the same detection probability for each node. Intuitively, should use a lower inspection probability on honest nodes and a higher inspection probability on a misbehaving node Solution: Combine reputation system with iTrust Define the inspection probability p to be the inverse function of reputation r, we also need that 1 > p >

Conclusion iTrust: a Probabilistic Misbehavior Detection Scheme  Model iTrust as an Inspection Game and show that an appropriate probability setting could assure the security of the DTNs at a reduced detection overhead.  Simulation results confirm that iTrust will reduce transmission overhead incurred by misbehavior detection while detecting the malicious nodes effectively.