ids in wsn - related work
DESCRIPTION
The third in a series of short presentation to introduce my master's thesis on Intrusion Detection in Wireless Sensor Networks.TRANSCRIPT
Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!
using Code Generation [email protected]
Related Work
What is Related Work to this Thesis ?
Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!
using Code Generation Techniques
Problem Context
Solution
Intrusion Detection in Wireless Sensor Networks
Intrusion Detection in Wireless Sensor Networks
50 SHADES OF GREY
Intrusion Detection in Wireless Sensor Networks
Cooperation
Reputation
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
cooperative non-cooperative
Beta(1,1) = uni(0,1)
trust
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
cooperative
non-cooperative
simple addition
aging
2nd hand appreciation weight
indirect /2nd hand reputation
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 10 20 30 40 50
Trust between i and j
Number of packets
initial trustcooperative
uncooperative2nd hand
threshold trust
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
trust threshold
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 10 20 30 40 50
Trust between i and j
Number of packets
0% failure5% failure10% failure30% failure0% with 2nd5% with 2nd10% with 2nd30% with 2nd
threshold trust
5% failure is accepted
10% almost
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 10 20 30 40 50
Trust between i and j
Number of packets
0% failure5% failure10% failure30% failure0% with 2nd5% with 2nd10% with 2nd30% with 2nd
threshold trust
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
10%
delayed failure/misuse
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Intrusion Detection Problem
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase
Intrusion Detection Problem+
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!!! keychain construction!!! neighbourhood discovery
Intrusion Detection Problem+
KlKl-1Kl-2K2K1K0 …
SHA-1
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase
Intrusion Detection Problem+
list of suspected nodes Message Authentication Code
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!!! Key Validation!!! Message Authentication
Intrusion Detection Problem+
Ki-1 = SHA-1(Ki)
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker
Intrusion Detection Problem+
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase
Intrusion Detection Problem+
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase
Intrusion Detection Problem+
Guy Fawkes Protocol}
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Guy Fawkes
• Research on WSN IDS!
• Drops on a Hot Plate!
• No Holistic Solutions!
• Almost no Algorithm can be Proven Secure!
• Passes by on Actual Problems!
• Securing WSNs!
• Impossible to Really Fully Secure!
• Resources are Scarce!
• Security = Non-Functional Additional Cost
• Not Another Drop on a Hot Plate!
• Address Actual Problems!
• Support and Nurture Future Research!
• Leverage Prior Experience in New Context
• Offer a Solution that Encompasses!
• Research! ! ! ! ! simple & formal ! ! ! ! ! ! ! ! specification!
• Development! ! ! automated &! ! ! ! ! ! ! ! platform independent!
• Integration! ! ! ! automated &! ! ! ! ! ! ! ! platform specific!
• Cost! ! ! ! ! ! optimisation of ! ! ! ! ! ! ! ! resource usage!
• Security! ! ! ! ! augment the barriers &! ! ! ! ! ! ! ! unify implementation
Christophe Van [email protected]
Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!using Code Generation Techniques
Co-Promotor: Prof. Dr. Ir. Christophe [email protected]
Promotor: Prof. Dr. Ir.Wouter [email protected]
Coach: Drs. Ir. Jef Maerien [email protected]
QA