Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes JieJun Kong Dapeng Wu Xiaoyan Hong and Mario Gerla.

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

A Formal Analysis of Onion Routing 10/26/2007 Aaron Johnson (Yale) with Joan Feigenbaum (Yale) Paul Syverson (NRL)
Chris Karlof and David Wagner
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
The Capacity of Wireless Networks
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
By Md Emran Mazumder Ottawa University Student no:
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
A Survey of Secure Wireless Ad Hoc Routing
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
CIS 5371 Cryptography 3b. Pseudorandomness.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Motion-MIX Mobile Traffic Sensor Network vs. Motion-MIX : Tracing & Protecting Mobile Wireless Nodes # Jiejun Kong, # # Jiejun Kong, * Dapeng Wu, + Xiaoyan.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Secure and Anonymous Mobile Ad-hoc Routing Jiejun Kong, Mario Gerla Department of Computer Science University of California, Los Angeles August 4, 2005.
Asymptotic Critical Transmission Radius for Greedy Forward Routing in Wireless Ad Hoc Networks Chih-Wei Yi Submitted to INFOCOM 2006.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Impact of Different Mobility Models on Connectivity Probability of a Wireless Ad Hoc Network Tatiana K. Madsen, Frank H.P. Fitzek, Ramjee Prasad [tatiana.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 CIS 5371 Cryptography 3. Private-Key Encryption and Pseudorandomness B ased on: Jonathan Katz and Yehuda Lindel Introduction to Modern Cryptography.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Anonymous Communication -- a brief survey
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 Collaborative Processing in Sensor Networks Lecture 5 - Visual Coverage Hairong Qi, Associate Professor Electrical Engineering and Computer Science University.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Mobility Models for Wireless Ad Hoc Network Research EECS 600 Advanced Network Research, Spring 2005 Instructor: Shudong Jin March 28, 2005.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
1 11 Distributed Channel Assignment in Multi-Radio Mesh Networks Bong-Jun Ko, Vishal Misra, Jitendra Padhye and Dan Rubenstein Columbia University.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Group Multicast Capacity in Large Scale Wireless Networks
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.
Presentation transcript:

Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes JieJun Kong Dapeng Wu Xiaoyan Hong and Mario Gerla

Outline Background. Mobility anonymity attacks. Countermeasure ( Motion-MIX). Asymptotic network security model. Security analysis of motion-MIX.

Mobile Traffic Sensor Network Recent advances in manufacturing technologies have enabled the physical realization of small, light-weight, low-power, and low-cost micro air vehicles.

Concept of Mobile Anonymity In fixed networks  anonymity: identity and location are synonyms In mobile networks  anonymity: identity and location are not synonyms.  motion pattern is also a security concern.  venue: the smallest area to which the adversary can “pinpoint” the node only via the node’s communication.

Motion pattern attack by mobile traffic analysis If the adversary moves faster than the victim, it can always trace it’s motion pattern. Mobile Anonymity Attacks

Venue privacy attack (VPA)  (VPA-a): enumerates the set of currently active nodes.  (VPA-b): computes related metrics such as the size of the set.  (VPA-c): performs traffic analysis against a venue. (How many and what kind of connections in-and-out the venue). Mobile Anonymity Attacks

Adversary model  Capable of scanning the entire network area in short time.  Honest-but-curious.  Polynomially-bounded cryptanalyst who cannot invert one-way functions or differentiate cryptographically strong pseudorandom bits from truly random bits with non-negligible probability. Network model  Pairwise key sharing. Design Assumption

Motion-MIX K incoming mobile nodes or wireless packet flows get fully mixed in the Motion-MIX. K-anonymity: the adversary cannot differentiate these k nodes.

In motion-MIX, any mobile node inside a motion-MIX venue should send out decoy traffic to ensure k-anonymity. The above algorithm running on mobile nodes can ensure that there are approximate k wireless transmission in its one- hop neighborhood during the unit time interval.

Adversary’s capability decides the inner circle. The roaming nodes decide the outer ring.

Content Analysis A mobile node should be indistinguishable from other nodes in the same motion-MIX venue from the adversary’s view. A mobile node’s traffic should be indistinguishable from another’s in the same motion-MIX venue from the adversary’s view.

Necessary Conditions Identity-free routing Every mobile node does not reveal its own identity to other nodes. One-time packet content 1 sender to 1 recipient & 100 different senders to 100 different recipients E.g., for 100 packets, the 2 extreme cases (1 sender to 1 recipient & 100 different senders to 100 different recipients) and all cases in-between are equally probable. Avoid being captured the mobile node’s radio signature.

Negligible function Definition Definition: A function u: N → R is negligible, if for every positive integer c and all sufficiently large n’s (i.e., there exists N c >0, for all n>N c ), In cryptography, the longer the key length is, the more asymptotically secure a cryptosystem is. In our analysis, the larger the network scale is, the more asymptotically secure the network is.

Underlying Mobile Networking Model The spatial distribution of a node is expressed as For random waypoint (RWP) mobility model in a square network area of size a×a.

Underlying Mobile Networking Model If there are N nodes in the network and each of them roams independently and identically. Random presence of mobile nodes is modeled by a spatial Poisson point process. Uniform Non-uniform

Security Guarantee of Motion-MIX Theorem 1: The security breach probability of motion-MIX, ( the probability that there are less than k uncompromised nodes in the venue quantified by Δ’), is negligible with respect to the network scale N.

Security Guarantee of Motion-MIX Theorem 2: The security breach probability of node tracing, ( the probability that the adversary can trace an active transmitting mobile node v’s motion pattern without losing the target), is negligible with respect to N and |T|.

Security Guarantee of Motion-MIX Publicity assumption : The adversary knows the entire identity set and the network area, it can estimate that the expected number of nodes in each venue is Nodes in each venue transmit k = E(k  ') real/decoy packets in a fully distributed manner.

Security Guarantee of Motion-MIX Theorem 3: In a wireless ad hoc network, a motion-MIX is min(k,E(k Δ’ ))-anonymous, where Δ’ is the size of the least enlarged venue defined on the venue size Δ.