IDS in WSN - Related Work

Preview:

DESCRIPTION

The third in a series of short presentation to introduce my master's thesis on Intrusion Detection in Wireless Sensor Networks.

Citation preview

Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!

using Code Generation TechniquesChristophe.VanGinneken@student.kuleuven.be

Related Work

What is Related Work to this Thesis ?

Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!

using Code Generation Techniques

Problem Context

Solution

Intrusion Detection in Wireless Sensor Networks

Intrusion Detection in Wireless Sensor Networks

50 SHADES OF GREY

Intrusion Detection in Wireless Sensor Networks

Cooperation

Reputation

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

cooperative non-cooperative

Beta(1,1) = uni(0,1)

trust

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

cooperative

non-cooperative

simple addition

aging

2nd hand appreciation weight

indirect /2nd hand reputation

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 10 20 30 40 50

Trust between i and j

Number of packets

initial trustcooperative

uncooperative2nd hand

threshold trust

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

trust threshold

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 10 20 30 40 50

Trust between i and j

Number of packets

0% failure5% failure10% failure30% failure0% with 2nd5% with 2nd10% with 2nd30% with 2nd

threshold trust

5% failure is accepted

10% almost

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 10 20 30 40 50

Trust between i and j

Number of packets

0% failure5% failure10% failure30% failure0% with 2nd5% with 2nd10% with 2nd30% with 2nd

threshold trust

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

10%

delayed failure/misuse

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Intrusion Detection Problem

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase

Intrusion Detection Problem+

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!!! keychain construction!!! neighbourhood discovery

Intrusion Detection Problem+

KlKl-1Kl-2K2K1K0 …

SHA-1

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase

Intrusion Detection Problem+

list of suspected nodes Message Authentication Code

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!!! Key Validation!!! Message Authentication

Intrusion Detection Problem+

Ki-1 = SHA-1(Ki)

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker

Intrusion Detection Problem+

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase

Intrusion Detection Problem+

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase

Intrusion Detection Problem+

Guy Fawkes Protocol}

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Guy Fawkes

• Research on WSN IDS!

• Drops on a Hot Plate!

• No Holistic Solutions!

• Almost no Algorithm can be Proven Secure!

• Passes by on Actual Problems!

• Securing WSNs!

• Impossible to Really Fully Secure!

• Resources are Scarce!

• Security = Non-Functional Additional Cost

• Not Another Drop on a Hot Plate!

• Address Actual Problems!

• Support and Nurture Future Research!

• Leverage Prior Experience in New Context

• Offer a Solution that Encompasses!

• Research! ! ! ! ! simple & formal ! ! ! ! ! ! ! ! specification!

• Development! ! ! automated &! ! ! ! ! ! ! ! platform independent!

• Integration! ! ! ! automated &! ! ! ! ! ! ! ! platform specific!

• Cost! ! ! ! ! ! optimisation of ! ! ! ! ! ! ! ! resource usage!

• Security! ! ! ! ! augment the barriers &! ! ! ! ! ! ! ! unify implementation

Christophe Van Ginneken!Christophe.VanGinneken@student.kuleuven.be

Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!using Code Generation Techniques

Co-Promotor: Prof. Dr. Ir. Christophe Huygens!Christophe.Huygens@cs.kuleuven.be

Promotor: Prof. Dr. Ir.Wouter Joosen!Wouter.Joosen@cs.kuleuven.be

Coach: Drs. Ir. Jef Maerien !Jef.Maerien@cs.kuleuven.be

QA