Trusted Routing in IoT

Similar documents
Security of Mobile Ad Hoc and Wireless Sensor Networks

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Routing over Low Power and Lossy Networks

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Sleep/Wake Aware Local Monitoring (SLAM)

Catching BlackHole Attacks in Wireless Sensor Networks

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, ISSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Study of RPL DODAG Version Attacks

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Defenses against Wormhole Attack

Energy Efficient Intrusion Detection System for ZigBee based Wireless Sensor Networks

Introduction to VANET

An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network

Introduction to Security. Computer Networks Term A15

Performance Analysis of Aodv Protocol under Black Hole Attack

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

International Journal of Scientific & Engineering Research, Volume 5, Issue 9, September ISSN

Design and Implementation of TARF: A Trust Aware Routing Framework WSN s

Intrusion Detection for Routing Attacks in Sensor Networks

Defending MANET against Blackhole Attackusing Modified AODV

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies

Secure routing in IoT networks with SISLOF

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

MANET ROUTING ATTACKS

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment

A Technique for Improving Security in Mobile Ad-hoc Networks

International Journal of Advance Research in Computer Science and Management Studies

Intrusion Detection System to Detect Sinkhole Attack on RPL Protocol in Internet of Things

On Demand secure routing protocol resilient to Byzantine failures

WIRELESS sensor networks have received a lot of attention

Security in Ad Hoc Networks Attacks

Comparative study on dynamic key-management techniques for cluster-based sensor networks

Lifetime Enhancement of Wireless Sensor Networks using Duty Cycle, Network Coding and Cluster Head Selection Algorithm

An Intrusion Detection System for Critical Information Infrastructures Using Wireless Sensor Network Technologies

Smart Attacks require Smart Defence Moving Target Defence

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Secure Routing for Mobile Ad-hoc Networks

GNUnet Distributed Data Storage

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

Security improvement in IOT based on Software

Windows 10 IoT Core Azure Connectivity and Security

Security Issues In Mobile Ad hoc Network Routing Protocols

Introduction and Statement of the Problem

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

International Journal of Computer Engineering and Applications, LITERATURE REVIEW OF PREVENTION AND DETECTION OF DDOS ATTACK ON WSN

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

IJMIE Volume 2, Issue 6 ISSN:

Detection and Suppression of Blackhole Attack in Leach based Sensor Network

Intrusion Detection and Prevention in Internet of Things

Network Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications

Evolutionary design of attack strategies

Securing IoT with the ARM mbed ecosystem

Internet infrastructure

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Dr. Anuj Kumar Sharma 2 Associate professor (CSE) Department of Computer Science and Engineering

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

A FAULT- AND INTRUSION-TOLERANT ARCHITECTURE FOR THE PORTUGUESE POWER DISTRIBUTION SCADA

An Implementation of Fog Computing Attributes in an IoT Environment

AN ENHANCED SECURE ROUTING ALGORITHM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices*

Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion

Detection and Removal of Vampire Attack in Wireless Sensor Network

14th ANNUAL WORKSHOP 2018 A NEW APPROACH TO SWITCHING NETWORK IMPLEMENTATION. Harold E. Cook. Director of Software Engineering Lightfleet Corporation

Variation in Wireless Sensor Network Performance Parameters under Black Hole Attack and It s Mitigation

Pritesh Jain Asst Professor, Department of CSE, Patel College of Science & Technology, Indore, Madhya Pradesh, India

ABSTRACT I. INTRODUCTION

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Quantitative Analysis and Evaluation of RPL with Various Objective Functions for 6LoWPAN

Lithe: Lightweight Secure CoAP for the Internet of Things

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid

COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRATEGY IN WSNS

Encrypted Traffic Security (ETS) White Paper

A Review on Black Hole Attack in MANET

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

CSMA based Medium Access Control for Wireless Sensor Network

HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

Survey on Delay Based Jellyfish Attack

An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities

Genetic Algorithm Based Denial of Sleep Attack Detection in WSN

Wireless Network Security Spring 2015

An On-demand Secure Routing Protocol Resilient to Byzantine Failures

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Transcription:

Trusted Routing in IoT Dr Ivana Tomić In collaborat ion w it h: Re s e arc h As s oc iate Prof. Julie A. McC ann and Im perial C ollege London AESE group Em ail: i.tom ic@ im perial.ac.uk

Outline q Sensors and Sensor Networks Are these the most Critical Components in IoT? q What is the Security & Cyber Risk in IoT? q How big is the Loss of Data due to the Break in Routing Paths? q How to establish a Trusted Routing in IoT?

Sensors and networks: A value-creation framework q A heavy reliance on wireless communications (typically a best-effort network). q A range of communication protocols to satisfy the communication needs of diverse applications. Wireless Sensor Network many low-cost, low-power devices communicating wirelessly with BS Sources of information

IoT systems differ from traditional IT systems? q Environment: physical exposure of IoT devices q Resources: sensors are low-cost, low-power, resource constrained devices q Variety: more types of devices and different types of networks in IoT q Volume: billions of IoT devices compared to millions of IT devices q Consequences: disruption of IoT systems could lead to large economic losses and have a significant impact on the welfare of people BUT it also creates new opportunities for all that information to be compromised!

The communication protocols have not been designed with a security goal in mind WSN Layered Architecture Denial of service, Man in the middle Multi-Layer Application Layer Transport Layer Network Layer Data Link Layer Physical Layer Attacks on reliability, Malicious code attack Data integrity attack, Energy drain attack, Desyncronisation attack Spoofing/replaying information, Selective forwarding/black holes, Sinkhole attack, Sybil attack, Node replication attacks, Wormhole attack, Hello flood attack External vs. Internal Attacks

The network level attacks can cause data loss and increase the data collection latency Network communication can be attacked, causing the loss of data which can compromise system functionality and cause failure.? SENSITIVE DATA! TIME-CRITICAL DATA! 2 4 1 3 6 2 4 1 3 6 2 4 1 3 6 7 8 9 7 8 9 I am the root! 7 8 9 Blackhole attack Sinkhole attack Replay attack

Understanding the impact and consequences of an attack helps to prevent possible DoS Implementation: Contiki OS & Cooja (Contiki simulator), 100nodes random topology Observations: Ø Each attack has it s own signature wrt to the network performance. Ø Two groups: 1. attacks that introduce additional data reduced PDR and increased E2E delay 2. attacks that reduce no. of packets reduced PDR and reduced E2E delay.

A novel self-healing scheme that detects and recovers from common attack scenarios

Each sensor builds a trust model of its neighbourhood to adapt routing decisions q Pairwise trust between a node and its neighbours. q Choose your routing paths accordingly. q This allows data to flow around regions of the network affected by an attack.

A simple notification scheme propagates routing decisions from the affected areas to the sink q Change due to a potentially malicious activity in the neighbourhood triggers the creation of mobile agents. q They spread the information in network so that the damage of an attack is bounded.

Our solution reduces data loss due to the varied attack scenarios down to 1% (5% on average) Sinkhole attacks: a) 50 nodes, multiple attackers b) 25, 50 and 100 nodes, single attacker Blackhole attacks: a) 50 nodes, multiple attackers b) 25, 50 and 100 nodes, single attacker Replay attacks: a) 50 nodes, multiple attackers b) 25, 50 and 100 nodes, single attacker

It achieves low overheads of 1% and a detection reliability of 99.3% tested across scenarios Overhead in 50 nodes network, multiple attackers a) sinkhole attack b) blackhole attack c) replay attack The sensitivity of our solution can be adjusted per user requirements by setting a sensitivity parameter α. While α = 0.9 gives the lowest number of false positives, we opted for more conservative approach and α = 0.7 which ensures a good sensitivity to all attacks with 99.3% detection reliability.

To conclude Our experimental results showed high effectiveness in terms of data loss rate requiring low operational overheads for varied attack scenarios. CISCO/Silicon Valley Community Foundation Fog to FIELD S4 (EPSRC Programme Grant): Science for Sensor Systems Software [1] I. Tomić and J. A. McCann. A Survey of potential security issues in existing wireless sensor network protocols, IEEE Internet of Things Journal, 2017. [2] I. Tomić et al. Run time self-healing security for wireless sensor networks. July 2017. Under review. [3] https://labs.ripe.net/members/ivana_tomic/iot-turning-evil

Thank you for your attention!