Learning Routing Paths in Anonymous Wireless Protocols Yu Jin Nishith Pathak.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Mobile Ad Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
1 Estimation of Link Interference in Static Multi-hop Wireless Networks Jitendra Padhye, Sharad Agarwal, Venkat Padmanabhan, Lili Qiu, Ananth Rao, Brian.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Paper Discussion: “Simultaneous Localization and Environmental Mapping with a Sensor Network”, Marinakis et. al. ICRA 2011.
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
Real Time Flow Handoff in Ad Hoc Wireless Networks using Mobility Prediction William Su Mario Gerla Comp Science Dept, UCLA.
Explorations in Anonymous Communication Andrew Bortz with Luis von Ahn Nick Hopper Aladdin Center, Carnegie Mellon University, 8/19/2003.
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
Efficient Flooding in Ad hoc Networks using On-demand (Passive) Cluster Formation ICNS Lab Na Gajin.
Before start… Earlier work single-path routing in sensor networks
1 Sustaining Cooperation in Multi-Hop Wireless Networks Ratul Mahajan, Maya Rodrig, David Wetherall and John Zahorjan University of Washington Presented.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
IPDPS 2007 Making Peer-to-Peer Anonymous Routing Resilient to Failures Yingwu Zhu Seattle University
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Anonymous Communication -- a brief survey
Anonymous Path Routing Protocol in Wireless Sensor Networks Jang-Ping Sheu* §, Jehn-Ruey Jiang* and Ching Tu* National Central University* and National.
Prophet Address Allocation for Large Scale MANETs Matt W. Mutka Dept. of Computer Science & Engineering Michigan State University East Lansing, USA IEEE.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
PRESENTED BY, V.Rajasekaran. AD-HOC SENSOR NETWORK USING HYBRID ENERGY EFFICIENT DISTRIBUTED CLUSTERING.
SEEDEX: A MAC protocol for ad hoc networks R. Rozovsky and P. R. Kumar ACM ACM MobiHoc 2001 speaker: Chien-Wen.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Designing Reliable Delivery for Mobile Ad-hoc Networks in Robots BJ Tiemessen Advisor: Dr. Dan Massey Department of Computer Science Colorado State University.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Effects of adding Arbitrary Physical Nodes to a Mobile Ad-Hoc Network Utilizing an Anonymity System By Ian Cavitt.
William Stallings Data and Computer Communications 7th Edition
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Mobility Models for Wireless Ad Hoc Network Research EECS 600 Advanced Network Research, Spring 2005 Instructor: Shudong Jin March 28, 2005.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Communication in heterogeneous ad hoc grid Shan Natarajan.
Ad Hoc Multicast Routing
Self-stabilizing energy-efficient multicast for MANETs.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
GUIDED BY: N.SRIDHAR Assoc Professor Dept of IT GMRIT Rajam PROJECT MEMBERS: E.PRASAD BABU(06341A1214) G.SRIRAMULU(07341A1275) S.SRAVANI(07341A1272) P.KARTIKEYAN(06341A1233)
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Straight Line Routing for Wireless Sensor Networks Cheng-Fu Chou, Jia-Jang Su, and Chao-Yu Chen Computer Science and Information Engineering Dept., National.
Maximizing Ad-Hoc network lifetime Yael Ochbaum Orit Varsano Supervised by Michael Segal.
MOBILE AD-HOC NETWORKS
Session Border Controllers
Other Routing Protocols
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

Learning Routing Paths in Anonymous Wireless Protocols Yu Jin Nishith Pathak

Wireless Anonymity System Goal: –To hide the communication paths between the peers Applications: –E-Voting –Military applications Characteristics: –Lack of centralized infrastructure –Wireless medium (broadcasting)

Wireless Anonymity Protocols ANODR (UCLA, ACM MOBIHOC 2003) –Encrypted message, no covert traffic, fixed routing paths. AnonDSR (SASN 2005) –Enhancement of ANODR, covert traffic Are they secure?

Objectives Break famous wireless anonymity protocols by predicting the edges Analyze the relations between anonymity, message rate and covert traffic rate Design a better wireless anonymity system.

Problem Definition MANET: Assumptions: –Messages are encrypted. –Routing paths are predefined and fixed. –At time t i, a sender v k sends out a message to the receiver with probability p 0. –If v m is the next hop on the routing path, then p(v m,t+1 |v k,t )=1. –All the nodes except the senders will randomly broadcast with probability p 1 in each round. –The senders could also broadcast covert traffic.

Example We have limited information by passively monitoring each node. (p 0 =0.2, p 1 =0.2)

Methodology Basic Idea: If two nodes broadcast at consecutive time intervals then there is a chance that they are consecutive hops on some path in the network Determine –P ab = P(a t =1,b t+1 =1 or b t =1,a t+1 =1 ) i.e. probability that a and b broadcast at two consecutive time intervals from observed data Fit P ab for all pairs of nodes (a,b) into a mixture of two Gaussians Pairs of nodes with lower probabilities will be grouped under one Gaussian and pairs of nodes with higher probabilities will be grouped into the second Gaussian Pairs of nodes in the second Gaussian are taken as edges lying on some path in the network –Using these edges we can construct the network routing paths

Methodology EM-algorithm was used to fit a mixture of two Gaussians on – –P ab for all pairs of nodes (a,b) –Logit(P ab ) for all pairs of nodes (a,b) Alternative approach: Mixture of two multi-variate Gaussians was fit on vectors V ab = [P 11 P 01 P 10 P 00 ] for all pairs of nodes (a,b) –P 11 = P ab –P 01 = P(a t =0,b t+1 =1 or b t =0,a t+1 =1) –P 10 = P(a t =1,b t+1 =1 or b t =1,a t+1 =0) –P 00 = P(a t =0,b t+1 =0 or b t =0,a t+1 =0)

Simulation Settings

Scenarios Changing the number of observations. Changing covert traffic rate Changing message rates. Prediction rate when senders will send out both message and covert traffic.

Results Changing message rate

Results (2) Changing number of iterations

Result (3) Covert traffic rate changes, fixed

Result (4) Covert traffic rate changes, randomized

Result (5) Covert traffic rate changes, arbitrary

Result (6) Senders also broadcast randomly

Future Work Incorporate knowledge of network topology into the model Consider the effects of changing topology and increasing communication paths How to predict edges when senders broadcast randomly More complex simulation scenarios