Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.

Slides:



Advertisements
Similar presentations
Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting Stephan Olariu Department.
Advertisements

Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
An Energy Efficient Hierarchical Heterogeneous Wireless Sensor Network
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Globecom 2004 Energy-Efficient Self-Organization for Wireless Sensor Networks: A Fully Distributed approach Liang Zhao, Xiang Hong, Qilian Liang Department.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Before start… Earlier work single-path routing in sensor networks
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Avoiding Energy Holes in Wireless Sensor Network with Nonuniform Node Distribution Xiaobing Wu, Guihai Chen and Sajal K. Das Parallel and Distributed Systems.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Maximizing the Lifetime of Wireless Sensor Networks through Optimal Single-Session Flow Routing Y.Thomas Hou, Yi Shi, Jianping Pan, Scott F.Midkiff Mobile.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
A novel gossip-based sensing coverage algorithm for dense wireless sensor networks Vinh Tran-Quang a, Takumi Miyoshi a,b a Graduate School of Engineering,
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering POWER-SPEED A Power-Controlled Real-Time Data Transport Protocol for Wireless Sensor-Actuator.
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Xiaobing Wu, Guihai Chen
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
SIMPLE: Stable Increased Throughput Multi-hop Link Efficient Protocol For WBANs Qaisar Nadeem Department of Electrical Engineering Comsats Institute of.
Junfeng Xu, Keqiu Li, and Geyong Min IEEE Globecom 2010 Speak: Huei-Rung, Tsai Layered Multi-path Power Control in Underwater Sensor Networks.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
S& EDG: Scalable and Efficient Data Gathering Routing Protocol for Underwater Wireless Sensor Networks 1 Prepared by: Naveed Ilyas MS(EE), CIIT, Islamabad,
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Opportunistic Flooding in Low-Duty- Cycle Wireless Sensor Networks with Unreliable Links Shuo Goo, Yu Gu, Bo Jiang and Tian He University of Minnesota,
Toward a Packet Duplication Control for Opportunistic Routing in WSNs Georgios Z. Papadopoulos, Julien Beaudaux, Antoine Gallais, Periklis Chatzimisios,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Ad Hoc Multicast Routing
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
A Reliability-oriented Transmission Service in Wireless Sensor Networks Yunhuai Liu, Yanmin Zhu and Lionel Ni Computer Science and Engineering Hong Kong.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Self-stabilizing energy-efficient multicast for MANETs.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Centralized Transmission Power Scheduling in Wireless Sensor Networks Qin Wang Computer Depart., U. of Science & Technology Beijing Edward Y. Hua Wireless.
Minimum Energy Reliable Paths Using Unreliable Wireless Links Qunfeng Dong, Suman Banerjee, Micah Adler, and Archan Misra Mobihoc 2005.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
4 Introduction Carrier-sensing Range Network Model Distributed Data Collection Simulation 6 Conclusion 2.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Structure-Free Data Aggregation in Sensor Networks.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks Tanya Roosta (EECS, Berkeley) In Collaboration With: Sameer Pai (ECE, Cornell)
Surviving Holes and Barriers in Geographic Data Reporting for
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng

Introduction Characteristics of wireless sensor nodes – Low cost – Simplicity Potential safety risks – Black hole attacks

Black hole attacks Compromised node (CN) attacks – Adversaries try to compromise a subset of nodes to passively intercept the packets traversing these nodes. Denial of service (DOS) attacks – Adversaries actively disrupt, change, or even paralyze the functionalities of a subset nodes, such that the normal operations of WSNs cannot be executed. Method to bypass black hole attacks – Designing routing strategies

Related work Packets delivery – Directly transmits packets by various paths – Discovering node-disjoint or edge-disjoint paths for transmission to enhance the security Shares delivery – Transforming each packet into shares, then forwarding shares along different routes – Adversary can not decode the packet without intercepting a required number of shares

Related work Shares delivery – Deterministic disjoint multi-path routing Route computation is not changed under the same topology – Randomly disjoint multi-path routing Route path is randomly generated Further strengthen and guarantee the security of packet transmission Most works have not considered network lifetime

System configurations A circular region of many-to-one high-density WSNs Sensors are uniformly and randomly distributed Relative location information of itself and its neighbors are known A link key is safe except either side of the link is physically compromised by the adversary The adversary is able to compromise multiple sensor nodes except the sink and its immediate surrounding nodes (T, M)-threshold secret sharing mechanism is used

Objective We focus on designing routing protocols to maximize the lifetime of WSNs, while guarantee the security of the whole network.

Objective Maximizing network lifetime Probability that the adversary can acquire at least T shares is Objective function

Strategy Observation – When one of the sensor nodes is out of energy in WSNs, the nodes far away from the sink node have used only 10% of their batteries Thus, our proposed scheme aims at – Utilizing the redundant energy to dispersively distribute the shares of packets all over the WSNs – Forwarding these shares to the sink node along the randomized disjoint routes.

SEDR scheme Regional dispersive routing – Using (T,M)-threshold secret sharing mechanism – The M shares are sent to M randomly selected sensors located around the source node Disjoint identical-hop routing – M shares are transmitted to other sensor nodes dispersively distributed in the network Least-hop routing – Using the shortest routing path to forward the M shares to the sink node

An example of the SEDR scheme

Energy consumption analysis Calculate the energy consumption of each step To analyze the network lifetime, we focus on the sensor node with the maximum energy consumption When the radius of WSNs is larger or equal to 4 hops, the whole-network dispersive routing does not reduce the network lifetime.

Security analysis for single black hole To ensure the security of the network, the black hole should not be able to intercept T shares when source node has sent M shares. Calculate the packet interception probability of SEDR scheme under the scenario of single black hole. For each packet, if and only if the sink node can receive at least T shares and less than T shares are intercepted by the black hole, the bi-security of the packet is guaranteed.

Security analysis for single black hole Derive the least required number of transmitted shares M, such that at least T shares are received by the sink node, the least required number. Get the maximal number of transmitted shares M, such that the number of intercepted shares by black hole to be less than T. To ensure the security of a packet,

Security analysis for single black hole To ensure the bi-security of a packet, the minimal physically secured area under bi- security requirement of SEDR scheme should ensure The cost of constructing physically secured area of SEDR scheme never exceeds the cost of I-walk’s.

Security analysis for multiple black holes Suppose k black holes are uniformly and randomly distributed in the network region. Obtain the probability for each share to traverse through black holes under the scenario of k black holes. Calculate the probability that the packet can be successfully decoded by the adversaries. If black holes do not overlap with each other, the packet interception probability is

Network lifetime analysis

Simulation configuration

Simulation results for single black hole

Simulation results for multiple black hole

Simulation results for network lifetime

Conclusions We have studied the problem of secret sharing based multi-path routing and formulated it as an optimization problem to maximize both the network security and lifetime. The SEDR scheme has been proposed to deliver sliced shares to the sink node with randomized disjoint multi-path routes. Theoretical analysis and extensive simulation results show that the SEDR scheme outperforms I-walk in both network security and lifetime under various parameters.

Thank you!