IC-29 Security and Cooperation in Wireless Networks 1 Secure and Robust Aggregation in Sensor Networks Parisa Haghani Supervised by: Panos Papadimitratos.

Slides:



Advertisements
Similar presentations
Distributed Algorithms for Mobile Sensor Networks Chelsea Sanders Ben Tullis.
Advertisements

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
Haowen chan  cmu Outline  The Secure Aggregation Problem  Algorithm Description  Algorithm Analysis Proof (sketch) of correctness Proof (sketch) of.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
1 Routing Techniques in Wireless Sensor networks: A Survey.
A Query-Based Routing Tree in Sensor Networks In Chul Song Yohan Roh Dongjoon Hyun Myoung Ho Kim GSN 2006 (Geosensor Network) 1.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Xinran Wang, Sencun Zhu and Guohong Cao The Pennsylvania State University MobiHoc’ 06.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Joint work with Xinran Wang, Sencun Zhu and Guohong Cao Dept. of Computer Science &
Computer Science SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao April 24, 2007.
Location-Aware Security Services for Wireless Sensor Networks using Network Coding IEEE INFOCOM 2007 최임성.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
KUASAR An efficient and light-weight protocol for routing and data dissemination in ad hoc wireless sensor networks David Andrews Aditya Mandapaka Joe.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
Sencun Zhu Sanjeev Setia Sushil Jajodia Presented by: Harel Carmit
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Adaptive Topology Discovery in Hybrid Wireless Networks
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
SIA: Secure Information Aggregation in Sensor Networks Dhiman Barman Authors: Bartosz Przydateck, Dawn Song, and Adrian Perrig CMU SenSys 2003.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
1 A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, and.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Computer Science Secure Hierarchical In-network Data Aggregation for Sensor Networks Steve McKinney CSC 774 – Dr. Ning Acknowledgment: Slides based on.
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
Secure Aggregation for Wireless Networks Lingxuan Hu David Evans [lingxuan, Department of Computer.
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
Aggregation in Sensor Networks
Presented by Fei Huang Virginia Tech April 4, 2007.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
SIA: Secure Information Aggregation in Sensor Networks B. Przydatek, D. Song, and A. Perrig. In Proc. of ACM SenSys 2003 Natalia Stakhanova cs610.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Sensor Networks: privacy-preserving queries Nguyen Dinh Thuc University of Science, HCMC
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
Jun Luo Panos Papadimitratos Jean-Pierre Hubaux By: Mai Ali Sayed.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes Haowen Chan, Adrian Perrig Carnegie Mellon University 1.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
Presentation transcript:

IC-29 Security and Cooperation in Wireless Networks 1 Secure and Robust Aggregation in Sensor Networks Parisa Haghani Supervised by: Panos Papadimitratos Marcin Poturalski Prof. Jean-Pierre Hubaux

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani2 Outline  Problem context  Related work  System model  SHIA  Proposed schemes Scheme 1 : Approximate Attacker Localization Scheme 2 : Attacker Localization  Conclusion  Future Work

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani3 Problem Context  Wireless Sensor Networks Often deployed in security-critical applications Sensors have limited resources → Efficient aggregation techniques Hostile environment → Secure aggregation

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani4 Related work  [Yang06] “SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks”, Yi Yang, Xinran Wang, Sencun Zhu. 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, May  [Chan06] “Secure Hierarchical In-Network Aggregation in Sensor Networks”, Haowen Chan, Adrian Perrig and Dawn Song.13 ACM conf. on computer and communications security, November  [Wu07] “Secure data aggregation without persistent cryptographic operations in wireless sensor networks”, K. Wu, D. Dreef, B. Sun, and Y. Xiao, Ad Hoc Networks, vol. 5, no. 1, pp. 100–111, 2007.

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani5 System Model Network Assumptions  Wireless sensor network of n sensors  A single base station (querier) Security Associations  Each sensor shares a unique symmetric key with the querier Attacker model  Attacker is in complete control of t<n nodes lie about its measurement modify aggregation messages and relay

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani6 Secure In-Network Aggregation (SHIA) [Chan06] 0. Aggregation Tree Formation 1. Query Dissemination - Query Message contains a nonce N

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani7 Secure In-Network Aggregation (SHIA) [Chan06] (cont’d) 2. Aggregation-Commit Goal : Constructing a commitment structure (hash tree) Leaf nodes: send up their values Internal nodes: perform aggregation, create a commitment to the set of inputs used to calculate the aggregation

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani8 Secure In-Network Aggregation (SHIA) [Chan06] (cont’d) 3. Result check 3a. Dissemination of off-path values 3b. Collection of Confirmation -Value Inclusion Possible based on off-path values -Ack only if inclusion verified 3c. Verification of Confirmation

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani9 Secure In-Network Aggregation (SHIA) [Chan06] (cont’d)  Main Pros Optimally Secure Low Edge Congestion Complexity  Naïve approach : O(h)  Delayed aggregation : O(log 2 n)  Main Cons Even a single node not acknowledging = querier drops the aggregation result Required Info : Exact number of alive nodes and their corresponding keys.

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani10 Lets not Forget….  The querier’s goal is to acquire some knowledge out of the network.  The querier should query the network again SHIA proposes : No Aggregation  Therefore, If attacker exists SHIA-No Aggregation …  As a result : Even higher complexity than when using no aggregation!!

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani11 Proposed Schemes  Approach Localize the attacker Eventually omit it from the network  We Propose 2 schemes for attacker localization  Extra Assumption in both schemes: The BS knows the topology of the aggregation tree

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani12 Scheme 1: Approximate Attacker Localization If inclusion verified -A leaf node a: -- Send up ACK a and level info -An intermediate node b: -- XOR ACKs of all received messages with the same level info -- Add its own ACK b and level info Otherwise -Send nothing  Replacing the result-check phase of SHIA

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani13 Scheme 1 (cont’d)  BS receives one message per level  BS knows the topology Can verify messages in each level Can go down until it encounters dicrepency!  Complexity O(h)

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani14 Scheme 1 (cont’d)  Example : maximum one node failure in each level, no attackers Maximum number of checks in level l is : n l +1

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani15 Scheme 1 (cont’d)  Attacker can act in three possible ways Follow the protocol in the check-phase  For BS: Similar to having several dead nodes’ in a level Inject garbage: send random messages pretending it has received from its children  For BS: Disables BS from proceeding to the next layers Pretend to be dead by sending nothing  For BS: Similar to dead node case  Worst case: BS stops at the level in which the attacker lies

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani16 Scheme 1 (cont’d)  An important constraint Assuming BS can at most check if at least k nodes out of n l nodes in level l have confirmed num of legitimate messages: MAC of size M Probability of an attacker success:

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani17 Scheme 2: Attacker Localization  Goal: Localize the attacker more precisely Have an estimate of the aggregation value’s closeness to the true value  Apply IF the result-check phase of SHIA fails  Complexity O(n)

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani18 Scheme 2 (cont’d) 1. Hierarchical Collection of Confirmation If value inclusion verified -Leaf node s --M s = Enc Ks (N) --Send M s to parent -Intermediate node u, with children {u1,u2,…uk} --Wait a certain time --If did not receive from uj ---M nr : “no message received” flag ---M uj = M nr --N s : Separation flag --M u = Enc Ku (N||M u1 ||N s ||M u2 …N s ||M uk ) --send M u Otherwise -Send nothing

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani19 Scheme 2 (cont’d) 2. Hierarchical Decryption of Confirmations at BS, using the topology of the aggregation tree  Three Possible cases: Enc Ku (N||M u1 ||Ns||M u2 …Ns||M uk ) Enc Ku (N||M u1 ||Ns…||M nr ||…Ns||M uk )  BS Marks u and u d Enc Ku (N||M u1 ||Ns…|| nonsense ||…Ns||M uk )  BS Marks u and u d

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani20 Scheme 2 (cont’d)  Theorem 1 The attacker localizer scheme enables the BS to mark all attackers, for which another attacker does not exist in their path to BS.  Theorem 2 The BS is able to estimate the aggregation value’s closeness to the true value.

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani21 Conclusion  Existing schemes have significant limitations  We proposed two schemes Scheme 1  More robust against node failure and single attackers  O(h) complexity Scheme 2:  Localize the attacker more precisely  Give an estimate of the aggregation value  O(n) complexity

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani22 Future Work  Proposing methods for local recovery of the aggregation tree Schemes for omitting attackers !  Investigating iterative methods Lower communication load?

8 March 07 IC-29 Security and Cooperation in Wireless Networks Parisa Haghani23  Thank you !  Questions ?