Repelling Sybil-type attacks in wireless ad hoc systems

Size: px
Start display at page:

Download "Repelling Sybil-type attacks in wireless ad hoc systems"

Transcription

1 Outline Repelling Sybil-type attacks in wireless ad hoc systems Marek Klonowski Michał Koza Mirosław Kutyłowski Institute of Mathematics and Computer Science, Wrocław University of Technology ACISP 2, Sydney

2 Outline Outline 2 Verification Phase 3

3 Outline 2 Verification Phase 3

4 Wireless communication Single hop network Single communication channel Time divided into slots Synchronous clocks of all nodes Collision detection (single, silence, noise) A station cannot transmit and listen at the same time slot

5 Outline 2 Verification Phase 3

6 Network

7 Network

8 Network with an adversary

9 Network with two adversaries

10 Outline 2 Verification Phase 3

11 Initialization process when initialization is completed, we get the following situation: each station has its ID registered no station has more than one ID registered a basic procedure for self-organization of wireless ad hoc networks

12 Outline 2 Verification Phase 3

13 A malicious adversary: can capture some stations can have some preloaded strategy but cannot communicate outside the shared channel intends to emulate more stations to increase its chances in symmetric leader election and initialization protocols does not intend to block the network (and itself)

14 Outline 2 Verification Phase 3

15 Two parameters N min - the minimal number of honest stations in the network N max - the maximal number of stations in the network (both adversarial and honest) Computational power Parameter a denotes that a station knowing H(x) and not knowing a bits of x cannot guess x by a brute force attack with high probability.

16 Outline 2 Verification Phase 3

17 ID s listing All stations are supposed to declare their ID numbers. Adversarial stations can declare multiple identities. Phase lasts as long as there is no more station willing to declare its ID. n - number of registered ID s Verification phase Verification whether there are no ID s being emulated by the same station (physical device).

18 Verification Phase Verification Phase consists of 2n trials, each dedicated to one identity. for ID {}} for ID { for ID n for ID for ID for ID n 2 {}}{{}}{{}}{{}}{{}}{ v v2... vk v v2... vk vn 2 k }{{} T }{{} T }{{} T n }{{} Tn }{{} T n+ }{{} T 2n 2 Figure: Trials assignment

19 Trial Each trial consists of k slots. noise IDtÑÓ n transmit vt transmit vt2 transmit verify vt2 transmit vt3 noise transmit station assigned to the trial t transmit vt4 transmit vt5 verify vt4 verify vt5 Jamming pattern P t :

20 Verification message Function F F : N N (, ) k N (one-way) F ts (P i ) = F(t, s, P i ) v ts if t =, v ts = F ts (P )... F ts (P t ) if t < n, F ts (P )... F ts (P t n ) F ts (P t n+ )... F ts (P t ) if t n. ()

21 Required jamming patterns ID ID 2 ID3 ID 4 ID 5 ID ID2 ID 3 ID 4 T T 2 T 3 T 4 T 5 T 6 T 7 T 8 T 9 v 83 required jamming patterns

22 Result Trial size ( ) k > 2 m/n M a log n log n + 2 Ma (Ma) 2 Ma log n Where: n - the number of declared ID s m - the number of ID s declared by adversary M - the number of adversarial devices a - the computational bound Adversary risk We show that it is optimal for the adversary to act according to protocol and: the probability of successful cheating is n 2, cheating failures are punished.

23 Thank You! Contact information: , fax: Wrocław University of Technology, Wybrzeże Wyspiańskiego 27, 5-37 Wrocław, Poland

Bit Reversal Broadcast Scheduling for Ad Hoc Systems

Bit Reversal Broadcast Scheduling for Ad Hoc Systems Bit Reversal Broadcast Scheduling for Ad Hoc Systems Marcin Kik, Maciej Gebala, Mirosław Wrocław University of Technology, Poland IDCS 2013, Hangzhou How to broadcast efficiently? Broadcasting ad hoc systems

More information

Secure Location Verification with Hidden and Mobile Base Stations

Secure Location Verification with Hidden and Mobile Base Stations Secure Location Verification with Hidden and Mobile Base Stations S. Capkun, K.B. Rasmussen - Department of Computer Science, ETH Zurich M. Cagalj FESB, University of Split M. Srivastava EE Department,

More information

DELIS-TR Provable Unlinkability Against Traffic Analysis already after log(n) steps!

DELIS-TR Provable Unlinkability Against Traffic Analysis already after log(n) steps! Project Number 001907 DELIS Dynamically Evolving, Large-scale Information Systems Integrated Project Member of the FET Proactive Initiative Complex Systems DELIS-TR-0134 Provable Unlinkability Against

More information

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-

More information

Resource Allocation in Energy-constrained Cooperative Wireless Networks

Resource Allocation in Energy-constrained Cooperative Wireless Networks Resource Allocation in Energy-constrained Cooperative Wireless Networks Lin Dai City University of Hong ong Jun. 4, 2011 1 Outline Resource Allocation in Wireless Networks Tradeoff between Fairness and

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks

A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks Baruch Awerbuch Dept. of Computer Science Johns Hopkins University Baltimore, MD 21218, USA baruch@cs.jhu.edu Andrea Richa Dept. of Computer

More information

Medium Access Control Protocol for WBANS

Medium Access Control Protocol for WBANS Medium Access Control Protocol for WBANS Using the slides presented by the following group: An Efficient Multi-channel Management Protocol for Wireless Body Area Networks Wangjong Lee *, Seung Hyong Rhee

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL U.P.B. Sci. Bull., Series C, Vol. 79, Iss. 4, 2017 ISSN 2286-3540 FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL Xu ZHI 1, Ding HONGWEI 2, Liu LONGJUN 3, Bao LIYONG 4,

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Mario Strasser Computer Eng. and Networks Laboratory ETH Zurich, Switzerland strasser@tik.ee.ethz.ch Srdjan Čapkun Department of

More information

Network-Wide Broadcast

Network-Wide Broadcast Massachusetts Institute of Technology Lecture 10 6.895: Advanced Distributed Algorithms March 15, 2006 Professor Nancy Lynch Network-Wide Broadcast These notes cover the first of two lectures given on

More information

Mathematical Problems in Networked Embedded Systems

Mathematical Problems in Networked Embedded Systems Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

Chapter 10. User Cooperative Communications

Chapter 10. User Cooperative Communications Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a

More information

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Tyler W Moore (joint work with Jolyon Clulow, Gerhard Hancke and Markus Kuhn) Computer Laboratory University of Cambridge Third European

More information

Digi-Wave Technology Williams Sound Digi-Wave White Paper

Digi-Wave Technology Williams Sound Digi-Wave White Paper Digi-Wave Technology Williams Sound Digi-Wave White Paper TECHNICAL DESCRIPTION Operating Frequency: The Digi-Wave System operates on the 2.4 GHz Industrial, Scientific, and Medical (ISM) Band, which is

More information

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

Medium Access Methods. Lecture 9

Medium Access Methods. Lecture 9 Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated

More information

Safeguarding Wireless Service Access

Safeguarding Wireless Service Access Safeguarding Wireless Service Access Panos Papadimitratos Electrical and Computer Engineering Virginia Tech Wireless Service Access Service Access Points Users Wireless Service Access (cont d) Ad Hoc Networking

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

DMR Association Interoperability Certificate

DMR Association Interoperability Certificate Document 10054 DMR Association Interoperability Certificate Note to readers: This DMR Association Interoperability Certificate documents that the TB9315 product as detailed in Table A below: TABLE A :

More information

Monitoring Churn in Wireless Networks

Monitoring Churn in Wireless Networks Monitoring Churn in Wireless Networks Stephan Holzer 1 Yvonne-Anne Pignolet 2 Jasmin Smula 1 Roger Wattenhofer 1 {stholzer, smulaj, wattenhofer}@tik.ee.ethz.ch, yvonne-anne.pignolet@ch.abb.com 1 Computer

More information

Deployment Examples and Guidelines for GPS Synchronization

Deployment Examples and Guidelines for GPS Synchronization Application Note: Deployment Examples and Guidelines for GPS Synchronization For Multipoint and PTP Wireless Links This document provides deployment examples and guidelines for GPS synchronization networks

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

Near-Optimal Radio Use For Wireless Network Synch. Synchronization

Near-Optimal Radio Use For Wireless Network Synch. Synchronization Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009 Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Ad Hoc Networks - Routing and Security Issues

Ad Hoc Networks - Routing and Security Issues Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)

More information

Secure Localization in Wireless Sensor Networks: A Survey

Secure Localization in Wireless Sensor Networks: A Survey Secure Localization in Wireless Sensor Networks: A Survey arxiv:1004.3164v1 [cs.cr] 19 Apr 2010 Waleed Ammar, Ahmed ElDawy, and Moustafa Youssef {ammar.w, aseldawy, moustafa}@alex.edu.eg Computer and Systems

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #4 OMNET++ Intro; Physical Layer Threats 2015 Patrick Tague 1 Class #4 OMNET++ Intro PHY layer basics and threats 2015 Patrick Tague 2 Intro to

More information

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional

More information

CS 438 Communication Networks Spring 2014 Homework 2 Due Date: February 19

CS 438 Communication Networks Spring 2014 Homework 2 Due Date: February 19 1. Questions to ponder a) What s the tradeoffs between copper and optical? b) Introduce two multiple access methods / protocols that weren t covered in class. Discuss their advantages and disadvantages.

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Min Song, Trent Allison Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529, USA Abstract

More information

Thwarting Control-Channel Jamming Attacks from Inside Jammers

Thwarting Control-Channel Jamming Attacks from Inside Jammers IEEE TRANSACTIONS ON OBILE COPUTING, VOL. X, NO. X, 1 Thwarting Control-Channel Jamming Attacks from Inside Jammers Sisi Liu, Student ember, IEEE, Loukas Lazos, ember, IEEE, and arwan runz, Fellow, IEEE

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich

More information

A Fast Initialization Algorithm for Single-Hop Wireless Networks

A Fast Initialization Algorithm for Single-Hop Wireless Networks A Fast Initialization Algorithm for ingle-hop Wireless Networks hyue-horng hiau hang-biau Yang Department of omputer cience and Engineering National un Yat-sen University Kaohsiung, Taiwan 804, R.O.. shiaush@cse.nsysu.edu.tw

More information

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Qing Zhao, Lang Tong, Anathram Swami, and Yunxia Chen EE360 Presentation: Kun Yi Stanford University

More information

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates Cooperative Broadcast for Maximum Network Lifetime Ivana Maric and Roy Yates Wireless Multihop Network Broadcast N nodes Source transmits at rate R Messages are to be delivered to all the nodes Nodes can

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

TMA4155 Cryptography, Intro

TMA4155 Cryptography, Intro Trondheim, December 12, 2006. TMA4155 Cryptography, Intro 2006-12-02 Problem 1 a. We need to find an inverse of 403 modulo (19 1)(31 1) = 540: 540 = 1 403 + 137 = 17 403 50 540 + 50 403 = 67 403 50 540

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks 1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,

More information

Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks

Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks Chengzhi Li, Huaiyu Dai, Liang Xiao 2 and Peng Ning 3 ECE Dept, 2 Dept Comm Engineering, 3 CS Dept, NC State

More information

Lecture 8: Media Access Control

Lecture 8: Media Access Control Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks 1 Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks Guobao Sun, Student Member, IEEE, Fan Wu, Member, IEEE, Xiaofeng Gao, Member, IEEE, Guihai Chen, Member, IEEE, and Wei Wang,

More information

Time-Optimal Information Exchange on Multiple Channels

Time-Optimal Information Exchange on Multiple Channels Time-Optimal Information Exchange on Multiple Channels Stephan Holzer 1, Yvonne-Anne Pignolet 2, Jasmin Smula 1, Roger Wattenhofer 1 1 Computer Eng. and Networks Laboratory (TIK), ETH Zurich, Switzerland

More information

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone Politecnico di Milano Facoltà di Ingegneria dell Informazione 3 Basic concepts Wireless Networks Prof. Antonio Capone Wireless Networks Wireless or wired, what is better? Well, it depends on the situation!

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th

More information

A Wireless Communication System using Multicasting with an Acknowledgement Mark

A Wireless Communication System using Multicasting with an Acknowledgement Mark IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 07, Issue 10 (October. 2017), V2 PP 01-06 www.iosrjen.org A Wireless Communication System using Multicasting with an

More information

Location Privacy of Distance Bounding Protocols

Location Privacy of Distance Bounding Protocols Location rivacy of Distance Bounding rotocols Kasper Bonne Rasmussen Department of Computer Science ETH Zurich 809 Zurich, Switzerland kasperr@inf.ethz.ch Srdjan Čapkun Department of Computer Science ETH

More information

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004 Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization

More information

Computing functions over wireless networks

Computing functions over wireless networks This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/

More information

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks 1 An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks Yeh-Cheng Chang, Cheng-Shang Chang and Jang-Ping Sheu Department of Computer Science and Institute of Communications

More information

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical

More information

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,

More information

VANET. Gilles Guette and Bertrand Ducourthial. IEEE MoVeNet 2007, Pisa. Laboratoire Heudiasyc, UMR CNRS 6599 Université de Technologie de Compiègne

VANET. Gilles Guette and Bertrand Ducourthial. IEEE MoVeNet 2007, Pisa. Laboratoire Heudiasyc, UMR CNRS 6599 Université de Technologie de Compiègne 1 1 out + On the Gilles Guette and Bertrand Ducourthial Laboratoire Heudiasyc, UMR CNRS 6599 Université de Technologie de Compiègne IEEE MoVeNet 2007, Pisa Outlines 2 2 out + 1 2 3 : hypotheses vs. impact

More information

Broadcast in Radio Networks in the presence of Byzantine Adversaries

Broadcast in Radio Networks in the presence of Byzantine Adversaries Broadcast in Radio Networks in the presence of Byzantine Adversaries Vinod Vaikuntanathan Abstract In PODC 0, Koo [] presented a protocol that achieves broadcast in a radio network tolerating (roughly)

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation

More information

Jamming Games for Power Controlled Medium Access with Dynamic Traffic

Jamming Games for Power Controlled Medium Access with Dynamic Traffic Jamming Games for Power Controlled Medium Access with Dynamic Traffic Yalin Evren Sagduyu Intelligent Automation Inc. Rockville, MD 855, USA, and Institute for Systems Research University of Maryland College

More information

Propagating Trust in Ad-hoc Networks for Reliable Routing

Propagating Trust in Ad-hoc Networks for Reliable Routing Propagating Trust in Ad-hoc Networks for Reliable Routing Asad Amir Pirzada, Amitava Datta and Chris McDonald School of Computer Science & Software Engineering The University of Western Australia Sequence

More information

Fractional Cooperation and the Max-Min Rate in a Multi-Source Cooperative Network

Fractional Cooperation and the Max-Min Rate in a Multi-Source Cooperative Network Fractional Cooperation and the Max-Min Rate in a Multi-Source Cooperative Network Ehsan Karamad and Raviraj Adve The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of

More information

Jamming-resistant Broadcast Communication without Shared Keys

Jamming-resistant Broadcast Communication without Shared Keys Jamming-resistant Broadcast Communication without Shared Keys Christina Pöpper System Security Group ETH Zurich, Switzerland poepperc@inf.ethz.ch Mario Strasser Communication Systems Group ETH Zurich,

More information

Application Note. Understanding PassPort Radio Systems

Application Note. Understanding PassPort Radio Systems Application Note Understanding PassPort Radio Systems PassPort radio systems are being widely used in the United States and other countries. Learn about this technology and how to test PassPort with an

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation

More information

Wireless Networks (PHY): Design for Diversity

Wireless Networks (PHY): Design for Diversity Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:

More information

Robust Key Establishment in Sensor Networks

Robust Key Establishment in Sensor Networks Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research

More information

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant

More information

Introduction to Cryptography CS 355

Introduction to Cryptography CS 355 Introduction to Cryptography CS 355 Lecture 25 Mental Poker And Semantic Security CS 355 Fall 2005 / Lecture 25 1 Lecture Outline Review of number theory The Mental Poker Protocol Semantic security Semantic

More information

Secure Reac)ve Ad Hoc Rou)ng. Hongyang Li

Secure Reac)ve Ad Hoc Rou)ng. Hongyang Li Secure Reac)ve Ad Hoc Rou)ng Hongyang Li Proac)ve vs. Reac)ve Rou)ng Proac&ve Reac&ve Build routing tables Know path to destination? Route Find path Route 2 Why Reac)ve Ad Hoc Rou)ng Unstable network condi)ons:

More information

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space Overview A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications Tevfik Yucek and Huseyin Arslan Cognitive Radio Multidimensional Spectrum Awareness Challenges Spectrum Sensing Methods

More information

An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University Intel-NTU

More information

WiMedia Interoperability and Beaconing Protocol

WiMedia Interoperability and Beaconing Protocol and Beaconing Protocol Mike Micheletti UWB & Wireless USB Product Manager LeCroy Protocol Solutions Group T he WiMedia Alliance s ultra wideband wireless architecture is designed to handle multiple protocols

More information

Enforcer 32WE-APP. The control panel Enforcer 32WE-APP is certified to EN50131 Grade 2 and offers a wide range of certified wireless accessories.

Enforcer 32WE-APP. The control panel Enforcer 32WE-APP is certified to EN50131 Grade 2 and offers a wide range of certified wireless accessories. Enforcer 32WE-APP Enforcer 32WE-APP Enforcer 32WE is the first wireless system on the market that is capable to guarantee high performance maximum security wireless protection via the advanced two way

More information

Cooperation in Random Access Wireless Networks

Cooperation in Random Access Wireless Networks Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department

More information

The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS

The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS A Thesis in Computer Science and Engineering by Xuan Jiang c 2011 Xuan

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Detecting Malicious Nodes in RSS-Based Localization

Detecting Malicious Nodes in RSS-Based Localization Detecting Malicious Nodes in RSS-Based Localization Manas Maheshwari*, Sai Ananthanarayanan P.R.**, Arijit Banerjee*, Neal Patwari**, Sneha K. Kasera* *School of Computing University of Utah Salt Lake

More information

Cooperative versus Full-Duplex Communication in Cellular Networks: A Comparison of the Total Degrees of Freedom. Amr El-Keyi and Halim Yanikomeroglu

Cooperative versus Full-Duplex Communication in Cellular Networks: A Comparison of the Total Degrees of Freedom. Amr El-Keyi and Halim Yanikomeroglu Cooperative versus Full-Duplex Communication in Cellular Networks: A Comparison of the Total Degrees of Freedom Amr El-Keyi and Halim Yanikomeroglu Outline Introduction Full-duplex system Cooperative system

More information

Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks

Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks 1 Qian Wang, Hai Su, Kui Ren, and Kai Xing Department of ECE, Illinois Institute of Technology, Email:

More information

PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION

PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION Patrick Tague, Mingyan Li, and Radha Poovendran Network Security Lab NSL, Department of Electrical Engineering, University

More information

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical Standby Energy [digitalstrom.org] MAC Theory Chapter 7 0 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy lost Make electricity smart cheap networking (over

More information

MAC Theory. Chapter 7

MAC Theory. Chapter 7 MAC Theory Chapter 7 Ad Hoc and Sensor Networks Roger Wattenhofer 7/1 Standby Energy [digitalstrom.org] 10 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy

More information

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,

More information

Principles of Ad Hoc Networking

Principles of Ad Hoc Networking Principles of Ad Hoc Networking Michel Barbeau and Evangelos Kranakis November 12, 2007 Wireless security challenges Network type Wireless Mobility Ad hoc Sensor Challenge Open medium Handover implies

More information

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced

More information

Talk More Listen Less: Energy- Efficient Neighbor Discovery in Wireless Sensor Networks

Talk More Listen Less: Energy- Efficient Neighbor Discovery in Wireless Sensor Networks Talk More Listen Less: Energy- Efficient Neighbor Discovery in Wireless Sensor Networks Ying Qiu, Shining Li, Xiangsen Xu and Zhigang Li Presented by: Korn Sooksatra, Computer Science, Georgia State University

More information

Acknowledged Broadcasting and Gossiping in ad hoc radio networks

Acknowledged Broadcasting and Gossiping in ad hoc radio networks Acknowledged Broadcasting and Gossiping in ad hoc radio networks Jiro Uchida 1, Wei Chen 2, and Koichi Wada 3 1,3 Nagoya Institute of Technology Gokiso-cho, Syowa-ku, Nagoya, 466-8555, Japan, 1 jiro@phaser.elcom.nitech.ac.jp,

More information

Cognitive Radio Network Setup without a Common Control Channel

Cognitive Radio Network Setup without a Common Control Channel Cognitive Radio Network Setup without a Common Control Channel Yogesh R Kondareddy*, Prathima Agrawal* and Krishna Sivalingam *Electrical and Computer Engineering, Auburn University, E-mail: {kondayr,

More information

On Practical Selective Jamming of Bluetooth Low Energy Advertising

On Practical Selective Jamming of Bluetooth Low Energy Advertising On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,

More information