Dynamic Energy-based Encoding and Filtering in Sensor Networks (DEEF)

Similar documents
Virtual Energy-Efficient Encryption and Keying (VEEEK) for Wireless Sensor Networks

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

Fast distribution of Data in Wireless Sensor Network using Concurrency Operation

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Sleep/Wake Aware Local Monitoring (SLAM)

Routing protocols in WSN

Capacity Assurance in Hostile Networks

Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

A Technique for Improving Security in Mobile Ad-hoc Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

SECURITY IN WIRELESS SENSOR NETWORKS EMPLOYING MACGSP6. Yuttasart Nitipaichit. B.E. in Electrical Engineering, Chiang Mai University, Thailand, 1996

Fuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Path Renewal Method in Filtering Based Wireless Sensor Networks

Lecture 8 Wireless Sensor Networks: Overview

ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION

Part I. Wireless Communication

Lifetime Enhancement of Wireless Sensor Networks using Duty Cycle, Network Coding and Cluster Head Selection Algorithm

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Secure Data Collection for Wireless Sensor Networks

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Secure Routing and Transmission Protocols for Ad Hoc Networks

An Efficient Secured Scheme for Detecting Source of Packet Drop and Forgery Attack in WSN

Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng

MAC LAYER. Murat Demirbas SUNY Buffalo

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks

Energy Efficient MAC Protocols Design for Wireless Sensor Networks

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

Rogue Access Point Detection using Temporal Traffic Characteristics

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

Towards a Wireless Lexicon. Philip Levis Computer Systems Lab Stanford University 20.viii.2007

SUMMERY, CONCLUSIONS AND FUTURE WORK

CSC 774 Advanced Network Security

Chapter 18 Privacy Enhancing Technologies for Wireless Sensor Networks

Etiquette protocol for Ultra Low Power Operation in Sensor Networks

Wireless Sensor Networks: From Science to Reality. Kay Römer ETH Zurich

PRESENTED BY SARAH KWAN NETWORK CODING

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105

An Energy Efficient Intrusion Detection System in MANET.

sensors ISSN

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Research on Transmission Based on Collaboration Coding in WSNs

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

The Design and Evaluation of Interleaved Authentication for Filtering False Reports in Multipath Routing WSNs

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Reliable Broadcast Message Authentication in Wireless Sensor Networks

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

Sybil Attack Detection in Mobile Adhoc Network

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Outline. Overview of ad hoc wireless networks (I) Overview of ad hoc wireless networks (II) Paper presentation Ultra-Portable Devices.

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid

INSENS: Intrusion-tolerant routing for wireless sensor networks. By: Jing Deng, Richard Han, and Shivakant Mishra

Computation of Multiple Node Disjoint Paths

Wireless Network Security Spring 2011

Extensions at Broadcast Growth Codes

A Lightweight Statistical Authentication Protocol for Access Control in Wireless LANs

Catching BlackHole Attacks in Wireless Sensor Networks

Energy Efficiency and Latency Improving In Wireless Sensor Networks

Wireless Sensor Networks, energy efficiency and path recovery

Information Brokerage

Chapter 4: Implicit Error Detection

Wireless Sensor Networks

Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks

A Passive Approach to Wireless NIC Identification

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

WSN Routing Protocols

Ad hoc and Sensor Networks Chapter 3: Network architecture

Sensor Networks and Security Issues

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

Spoofing Detection in Wireless Networks

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

An Energy Efficient Cluster based Load Balance Routing for Wireless Sensor Network

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

Selective Forwarding Attacks Detection in WSNs

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

Evolutionary design of attack strategies

Performance Comparison of Caching Strategies for Information-Centric IoT

Credit-Based Authorization

Research Article Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs

Coding for the Network: Scalable and Multiple description coding Marco Cagnazzo

CS 268: Computer Networking. Taking Advantage of Broadcast

Quality-Assured Energy Balancing for Multi-hop Wireless Multimedia Networks via 2-D Channel Coding Rate Allocation

Transcription:

Dynamic Energy-based Encoding and Filtering in Sensor Networks (DEEF) Hailong Hou, *Cherita Corbett, Yingshu Li, Raheem Beyah Georgia State University, Department of Computer Science * Sandia National Labs

OUTLINE Motivation Overview Related Work Encoding Process Energy-Based Keying DEEF-T and DEEF-NT Performance Evaluation Conclusions Future Work 1

Motivation WSNs Unattended Self organizing Limited capabilities Energy Computational Communication For protocols Simplicity Effectiveness Sink Neighbor Source+Neighbor Source Dormant nodes 2

Related Work Tinysec introduced in [4] - link layer security architecture utelsa proposed in [6] - comprehensive message authentication scheme Intrusion-tolerant routing (INSENS) was proposed in [12] - localize damage by establishing multiple disjoint paths Statistical En-route Filtering (SEF) proposed in [11] - probabilistically verify data authenticity and drops false data *The aforementioned protocols require a significant amount of data packet overhead and/or an increase in message exchanges. We propose a lightweight technique for detecting outsider attacks, that consists of an encoding scheme, and dynamic energy-based keying, obviating the need to re-key 3

Encoding Process Instead of sending the hash code and the data, the resultant hash code is used locally at nodes The computed hash code is used to encode {ID,type,data} The hash code can be mapped to a set of actions on the data stream combination Each node sends its ID, type, data bits to its next hop The receiver node will perform the same hash operation ID Type Data Tx-ed in clear Hash function As a result, we have a simple and effective encoding scheme that provides authenticity and integrity without redundant transmissions 4

Energy-based Keying Approach motivated by battery-based IDS [26-29] by Jacoby et.al. General Idea - Sensor nodes have limited states (Det, Tran, Enc, Dec, Idle, etc.) Compound states can be observed by downstream nodes that observe traffic Accordingly, watching nodes can infer the energy of the nodes they are observing This value changes every n transmission and is used as a shared key (seed) 5

Energy-based Keying (continued) How is the key computed? How is energy costs calculated (details on page 4 of paper)? 6

Energy-based Keying (continued) We assume energy has been mapped to fairly coarse bins Authentication information stored in nodes Energy status is updated as packets from watched nodes pass the watching nodes Perceived and Bridge Energy is maintained (page 4) 7

DEEF-T and DEEF-NT DEEF Traditional (DEEF-T) Every node watches its peers DEEF Non-Traditional (DEEF-NT) Every node probabilistically watches a set of predetermined nodes 8

DEEF in Action Topology-Revisit Node Responsibilities Watcher Forwarder Originator Associated Energy Costs Packet Tx (Etx) Packet Rx (Erx) Packet Sensing (Es) (aka event detection (Ed)) Packet Encoding (Eenc) Packet Decoding (Edec) Keep-alive (Ea) Every node tracks its Current Energy (Ec) Perceived Energy (Ep) Sink Neighbor Source+Neighbor Source Dormant nodes 9

Performance Evaluation (a) (c) (e) (b) (d) (f) Figure 5. (a) Effectiveness of DEEF-T vs. DEEF-NT where r = 3; (b) Effectiveness of DEEF-NT with varying r; (c) Sink drop probability considering event detection set size DEEF-T vs. DEEF-NT where r = 3; (d) Sink drop probability considering event detection set size for DEEF-NT with varying r; (e) Average cost to send valid packet in DEEF-T and DEEF-NT where r = 3; (f) Average cost to send valid packet in DEEF-NT with varying r. 10

Performance Evaluation - Observations (continued) While DEEF-T offers 99% drop probability of illegitimate packets at the first hop (Figure 5a), it more than doubles the amount of energy consumed for legitimate traffic in DEEF-NT at the fifth hop (Figure 5e) At the 15 th hop, DEEF-T consumes 3 to 6 times more energy than DEFF-NT, and the separation of energy costs significantly increases as the network scales 11

Performance Evaluation - Observations (continued) When storage is a concern and DEEF-NT is watching the same number of nodes as DEEF-T (i.e., r = 3), DEEF-NT can achieve at best 77% drop probability at the 100 th hop. At which point the illegitimate packet would have consumed 52% more energy than DEEF- T On the other hand, DEEF-NT can achieve at least a 90% drop probability within 9 hops if each node is watching at least 25% of the network (r = 50). Requiring more storage, however giving the benefit of a high drop probability within a few hops and lowering energy costs when dealing with legitimate packets 12

Performance Evaluation - Observations (continued) From this analysis, one could argue that DEEF-T is better suited where storage is the most critical resource and where the network tends to be less chatty, whereas DEEF-NT is most beneficial for chatty networks and/or when storage is not the crippling resource 13

Conclusion The benefits of this scheme are the following: Since there is no hash code to transmit, the packet size does not grow unnecessarily, avoiding bandwidth overhead increasing the overall network lifetime It is a simple technique it is also viable for other resource constrained devices Albeit theoretically possible to insert malicious packets, as the packet size grows due to data bits, it is less likely The key changes dynamically without re-keying. Downside of DEEF-NT is that it can be fooled if a compromised legitimate node inserts a malicious packet, which looks like a legitimate packet 14

Future Work Detect internal threats by employing intermediate nodes to utilize a weighted voting scheme Simulate more complicated scenarios where other than static routing is used Determine optimal bin size Address synchronization issues: Borderline bin scenarios Unreliable MAC, etc. Validate work via experimentation 15