A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.

Slides:



Advertisements
Similar presentations
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
Secure and Trustworthy Data Management for Vehicular Cyber Physical Systems Dr. Wenjia Li Assistant Professor in Computer Science New York Institute of.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Chapter 19: Network Management Business Data Communications, 4e.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
Applied Cryptography for Network Security
Winter Retreat Connecting the Dots: Using Runtime Paths for Macro Analysis Mike Chen, Emre Kıcıman, Anthony Accardi, Armando Fox, Eric Brewer
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
A Survey on Interfaces to Network Security
Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented.
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Common Devices Used In Computer Networks
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 ACTIVE FAULT TOLERANT SYSTEM for OPEN DISTRIBUTED COMPUTING (Autonomic and Trusted Computing 2006) Giray Kömürcü.
LiSP: A Lightweight Security Protocol for Wireless Sensor Networks TAEJOON PARK and KANG G. SHIN The University of Michigan Presented by Abhijeet Mugade.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
K. Salah1 Security Protocols in the Internet IPSec.
Design for a generic knowledge base for autonomic QoE optimization in multimedia access networks September 9, 2008 Bong-Kyun Lee Dept. of Information and.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Problem: Internet diagnostics and forensics
Chapter 19: Network Management
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Trustworthiness Management in the Social Internet of Things
Giannis F. Marias, Vassileios Tsetsos,
RSVP: A New Resource ReSerVation Protocol
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung Kim, Jongsoo Jang Electronics and Telecommunications Research Institute(ETRI) Korea Speaker: Kangwoo Lee

A N T S 2Contents Motivation Trust Management Based Security Framework Architecture Trust Management Component Network I/O Application Description Component Security Response Component Example Scenario Conclusion

A N T S 3Motivation ■ Sensor network applications (e.g. monitoring safety, tracking environmental pollutants) need security at design time ■ Existing research efforts ■ Focus on specific security fields, such as secure routing or intrusion tolerance ■ Main solutions recur to cryptographic algorithms, and are lacking the complementary tool for managing trust ■ Proposed solution ■ An effective security solutions from a system architectural view ■ Trustworthy relationship can be evaluated locally to guide node behavior

A N T S 4 Solution Illustration A B C D Local node Neighboring node of local node Radio range Monitor range (promiscuous mode) Receipt of packet Sensor Field Logically assess neighboring nodes trustworthiness Gather available network knowledge Manage (store & update) the trust value of neighboring node Securely take network action (routing, intrusion detection…) Monitor of packet A B C D

A N T S 5 Security Framework Architecture We consider a general sensor network case One base station n nodes The architecture running locally gives nodes the abilities Appropriate to different application requirements Collect traffic actively or passively Assess the trustworthiness of their neighboring nodes Guide network action

A N T S 6 Security Framework Application Description Component Used to set application-dependent parameters considering nature of sensor networks Security related information, such as: Key management scheme Hash function used Message authentication code length Trust level (Trust Regulation Table) Weight and adjustment factors used in trust evaluation procedure

A N T S 7 Security Framework Network I/O Responsibility: Receive incoming packets Send outgoing packets Control the rate of incoming and outgoing packets Pass required information for trust evaluation

A N T S 8 Security Framework Trust Management Component –1 A localized trust model Recommendation-based trust Trust-based recommendation Give an individual node the ability to estimate its local environment and take action to carry out its network duty A set of logical computation to get a numerical trust value

A N T S 9 Security Framework Trust Management Component –2 Entities Defined judge : performs evaluation suspect : the adjacent neighbor of the judge and will be evaluated juries : maintain the trust value of the same suspect with the judge and send it out periodically or intentionally Trust relationship not symmetric If A trust B, B maybe not trust A, where A and B are mutually neighboring nodes. time-evolving Need be updated upon receipt of new interactive communication or new recommendations. Judge Suspect Jury

A N T S 10 Security Framework Trust Management Component –3 Trust Evaluation Based on the localized trust model Two kinds of knowledge are needed personal reference direct interaction with the suspect reference reputation sent by the juries Trust value Deduced from the trust evaluation procedure Represented by real numbers, between 0 and 1 Indicate the extent of trust the judge may have in the suspect Conceptual Trust Model

A N T S 11 Security Framework Trust Management Component –4 Personal Reference Parameters about cryptographic operations Represent the security mechanisms used Can disclose attacks (e.g. message forgery and modification) Parameters about nodes’ interactive behavior Reflect nodes availability Can reveal attacks (e.g. dropping and denial-of- service)

A N T S 12 Security Framework Trust Management Component –5 Reference Reference generation Recommendation protocols Active protocol– reference request Anti-active protocol– abnormal personal reference report Reference computation trust-based recommendation

A N T S 13 Security Framework Trust Management Component – 6 Context Maintain weighted values, passed from parameter database Deliver necessary parameters to personal reference and trust value computation procedure Trust value Weighted summation between the personal reference and reference

A N T S 14 Security Framework Security Response Component Integrate the mostly existing security research directions in WSN Using available trustworthiness and a lightweight trust policy Refer to recommendation protocol Perform appropriate network activities based on the available trust relationship Reliability analysis, secure routing, intrusion detection, and intrusion tolerance

A N T S 15 Security Framework Example Scenario –1 We give an example to show the secure routing path selection between base station and node D as an example Define the routing selection metric as unit trust value in consideration of both security and energy-savings together, notated as uT. Each possible path holds an uT, which can be expressed as:

A N T S 16 Security Framework Example Scenario –2

A N T S 17Conclusion An complete security architecture from system view Adaptive to different application requirements Make good use of available network knowledge Deduce trustworthy relationship based on localized trust model Execute network action efficiently due to the available evidence

A N T S 18 Thanks for Listening !!