Repelling Sybil-type attacks in wireless ad hoc systems

Similar documents
Bit Reversal Broadcast Scheduling for Ad Hoc Systems

Secure Location Verification with Hidden and Mobile Base Stations

DELIS-TR Provable Unlinkability Against Traffic Analysis already after log(n) steps!

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Resource Allocation in Energy-constrained Cooperative Wireless Networks

Wireless Network Security Spring 2014

Lecture on Sensor Networks

A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks

Medium Access Control Protocol for WBANS

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping

Network-Wide Broadcast

Mathematical Problems in Networked Embedded Systems

Achieving Network Consistency. Octav Chipara

Chapter 10. User Cooperative Communications

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks

Digi-Wave Technology Williams Sound Digi-Wave White Paper

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Medium Access Methods. Lecture 9

Safeguarding Wireless Service Access

Wireless Network Security Spring 2016

DMR Association Interoperability Certificate

Monitoring Churn in Wireless Networks

Deployment Examples and Guidelines for GPS Synchronization

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

Near-Optimal Radio Use For Wireless Network Synch. Synchronization

Wireless Network Security Spring 2015

Ad Hoc Networks - Routing and Security Issues

Secure Localization in Wireless Sensor Networks: A Survey

Wireless Network Security Spring 2015

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks

CS 438 Communication Networks Spring 2014 Homework 2 Due Date: February 19

Wireless Network Security Spring 2012

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks

Thwarting Control-Channel Jamming Attacks from Inside Jammers

From Shared Memory to Message Passing

A Fast Initialization Algorithm for Single-Hop Wireless Networks

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

TMA4155 Cryptography, Intro

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks

Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks

Lecture 8: Media Access Control

CS434/534: Topics in Networked (Networking) Systems

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks

Time-Optimal Information Exchange on Multiple Channels

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

A Wireless Communication System using Multicasting with an Acknowledgement Mark

Location Privacy of Distance Bounding Protocols

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Computing functions over wireless networks

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks

VANET. Gilles Guette and Bertrand Ducourthial. IEEE MoVeNet 2007, Pisa. Laboratoire Heudiasyc, UMR CNRS 6599 Université de Technologie de Compiègne

Broadcast in Radio Networks in the presence of Byzantine Adversaries

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Jamming Games for Power Controlled Medium Access with Dynamic Traffic

Propagating Trust in Ad-hoc Networks for Reliable Routing

Fractional Cooperation and the Max-Min Rate in a Multi-Source Cooperative Network

Jamming-resistant Broadcast Communication without Shared Keys

Application Note. Understanding PassPort Radio Systems

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Wireless Network Security Spring 2016

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

Wireless Networks (PHY): Design for Diversity

Robust Key Establishment in Sensor Networks

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Introduction to Cryptography CS 355

Secure Reac)ve Ad Hoc Rou)ng. Hongyang Li

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks

WiMedia Interoperability and Beaconing Protocol

Enforcer 32WE-APP. The control panel Enforcer 32WE-APP is certified to EN50131 Grade 2 and offers a wide range of certified wireless accessories.

Cooperation in Random Access Wireless Networks

The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Detecting Malicious Nodes in RSS-Based Localization

Cooperative versus Full-Duplex Communication in Cellular Networks: A Comparison of the Total Degrees of Freedom. Amr El-Keyi and Halim Yanikomeroglu

Jamming-resistant Multi-radio Multi-channel Opportunistic Spectrum Access in Cognitive Radio Networks

PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical

MAC Theory. Chapter 7

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks

Principles of Ad Hoc Networking

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

Talk More Listen Less: Energy- Efficient Neighbor Discovery in Wireless Sensor Networks

Acknowledged Broadcasting and Gossiping in ad hoc radio networks

Cognitive Radio Network Setup without a Common Control Channel

On Practical Selective Jamming of Bluetooth Low Energy Advertising

Transcription:

Outline Repelling Sybil-type attacks in wireless ad hoc systems Marek Klonowski Michał Koza Mirosław Kutyłowski Institute of Mathematics and Computer Science, Wrocław University of Technology ACISP 2, Sydney

Outline Outline 2 Verification Phase 3

Outline 2 Verification Phase 3

Wireless communication Single hop network Single communication channel Time divided into slots Synchronous clocks of all nodes Collision detection (single, silence, noise) A station cannot transmit and listen at the same time slot

Outline 2 Verification Phase 3

Network

Network

Network with an adversary

Network with two adversaries

Outline 2 Verification Phase 3

Initialization process when initialization is completed, we get the following situation: each station has its ID registered no station has more than one ID registered a basic procedure for self-organization of wireless ad hoc networks

Outline 2 Verification Phase 3

A malicious adversary: can capture some stations can have some preloaded strategy but cannot communicate outside the shared channel intends to emulate more stations to increase its chances in symmetric leader election and initialization protocols does not intend to block the network (and itself)

Outline 2 Verification Phase 3

Two parameters N min - the minimal number of honest stations in the network N max - the maximal number of stations in the network (both adversarial and honest) Computational power Parameter a denotes that a station knowing H(x) and not knowing a bits of x cannot guess x by a brute force attack with high probability.

Outline 2 Verification Phase 3

ID s listing All stations are supposed to declare their ID numbers. Adversarial stations can declare multiple identities. Phase lasts as long as there is no more station willing to declare its ID. n - number of registered ID s Verification phase Verification whether there are no ID s being emulated by the same station (physical device).

Verification Phase Verification Phase consists of 2n trials, each dedicated to one identity. for ID {}} for ID { for ID n for ID for ID for ID n 2 {}}{{}}{{}}{{}}{{}}{ v v2... vk v v2... vk................................................... vn 2 k }{{} T }{{} T }{{} T n }{{} Tn }{{} T n+ }{{} T 2n 2 Figure: Trials assignment

Trial Each trial consists of k slots. noise IDtÑÓ n transmit vt transmit vt2 transmit verify vt2 transmit vt3 noise transmit station assigned to the trial t transmit vt4 transmit vt5 verify vt4 verify vt5 Jamming pattern P t :

Verification message Function F F : N N (, ) k N (one-way) F ts (P i ) = F(t, s, P i ) v ts if t =, v ts = F ts (P )... F ts (P t ) if t < n, F ts (P )... F ts (P t n ) F ts (P t n+ )... F ts (P t ) if t n. ()

Required jamming patterns ID ID 2 ID3 ID 4 ID 5 ID ID2 ID 3 ID 4 T T 2 T 3 T 4 T 5 T 6 T 7 T 8 T 9 v 83 required jamming patterns

Result Trial size ( ) k > 2 m/n M a log n log n + 2 Ma + 2 + (Ma) 2 Ma log n Where: n - the number of declared ID s m - the number of ID s declared by adversary M - the number of adversarial devices a - the computational bound Adversary risk We show that it is optimal for the adversary to act according to protocol and: the probability of successful cheating is n 2, cheating failures are punished.

Thank You! Contact information: Marek.Klonowski@pwr.wroc.pl, Michal.Koza@pwr.wroc.pl, Miroslaw.Kutylowski@pwr.wroc.pl, +48 7 3229, fax: +48 7 32 25 Wrocław University of Technology, Wybrzeże Wyspiańskiego 27, 5-37 Wrocław, Poland