31
Lowering the Impact of Intrusion Detection on Resources in Wireless Sensor Networks using Code Generation Techniques [email protected]

IDS in WSN - Related Work

Embed Size (px)

DESCRIPTION

The third in a series of short presentation to introduce my master's thesis on Intrusion Detection in Wireless Sensor Networks.

Citation preview

Page 1: IDS in WSN - Related Work

Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!

using Code Generation [email protected]

Page 2: IDS in WSN - Related Work

Related Work

Page 3: IDS in WSN - Related Work
Page 4: IDS in WSN - Related Work

What is Related Work to this Thesis ?

Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!

using Code Generation Techniques

Problem Context

Solution

Page 5: IDS in WSN - Related Work

Intrusion Detection in Wireless Sensor Networks

Page 6: IDS in WSN - Related Work

Intrusion Detection in Wireless Sensor Networks

50 SHADES OF GREY

Page 7: IDS in WSN - Related Work

Intrusion Detection in Wireless Sensor Networks

Cooperation

Reputation

Page 8: IDS in WSN - Related Work
Page 9: IDS in WSN - Related Work

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

Page 10: IDS in WSN - Related Work

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

cooperative non-cooperative

Beta(1,1) = uni(0,1)

trust

Page 11: IDS in WSN - Related Work

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

cooperative

non-cooperative

simple addition

aging

2nd hand appreciation weight

indirect /2nd hand reputation

Page 12: IDS in WSN - Related Work

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 10 20 30 40 50

Trust between i and j

Number of packets

initial trustcooperative

uncooperative2nd hand

threshold trust

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

trust threshold

Page 13: IDS in WSN - Related Work

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 10 20 30 40 50

Trust between i and j

Number of packets

0% failure5% failure10% failure30% failure0% with 2nd5% with 2nd10% with 2nd30% with 2nd

threshold trust

5% failure is accepted

10% almost

Page 14: IDS in WSN - Related Work

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 10 20 30 40 50

Trust between i and j

Number of packets

0% failure5% failure10% failure30% failure0% with 2nd5% with 2nd10% with 2nd30% with 2nd

threshold trust

Reputation

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.

ACM Transactions on Sensor Networks (TOSN), 4(3):15.!

10%

delayed failure/misuse

Page 15: IDS in WSN - Related Work
Page 16: IDS in WSN - Related Work

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Intrusion Detection Problem

Page 17: IDS in WSN - Related Work

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase

Intrusion Detection Problem+

Page 18: IDS in WSN - Related Work

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!!! keychain construction!!! neighbourhood discovery

Intrusion Detection Problem+

KlKl-1Kl-2K2K1K0 …

SHA-1

Page 19: IDS in WSN - Related Work

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase

Intrusion Detection Problem+

list of suspected nodes Message Authentication Code

Page 20: IDS in WSN - Related Work

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!!! Key Validation!!! Message Authentication

Intrusion Detection Problem+

Ki-1 = SHA-1(Ki)

Page 21: IDS in WSN - Related Work

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker

Intrusion Detection Problem+

Page 22: IDS in WSN - Related Work

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase

Intrusion Detection Problem+

Page 23: IDS in WSN - Related Work

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Algorithm to solve the Intrusion Detection Problem!!

1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase

Intrusion Detection Problem+

Guy Fawkes Protocol}

Page 24: IDS in WSN - Related Work

Cooperation

Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.

In Wireless Sensor Networks, pages 263–278. Springer.!

Guy Fawkes

Page 25: IDS in WSN - Related Work
Page 26: IDS in WSN - Related Work

• Research on WSN IDS!

• Drops on a Hot Plate!

• No Holistic Solutions!

• Almost no Algorithm can be Proven Secure!

• Passes by on Actual Problems!

• Securing WSNs!

• Impossible to Really Fully Secure!

• Resources are Scarce!

• Security = Non-Functional Additional Cost

Page 27: IDS in WSN - Related Work
Page 28: IDS in WSN - Related Work

• Not Another Drop on a Hot Plate!

• Address Actual Problems!

• Support and Nurture Future Research!

• Leverage Prior Experience in New Context

Page 29: IDS in WSN - Related Work
Page 30: IDS in WSN - Related Work

• Offer a Solution that Encompasses!

• Research! ! ! ! ! simple & formal ! ! ! ! ! ! ! ! specification!

• Development! ! ! automated &! ! ! ! ! ! ! ! platform independent!

• Integration! ! ! ! automated &! ! ! ! ! ! ! ! platform specific!

• Cost! ! ! ! ! ! optimisation of ! ! ! ! ! ! ! ! resource usage!

• Security! ! ! ! ! augment the barriers &! ! ! ! ! ! ! ! unify implementation

Page 31: IDS in WSN - Related Work

Christophe Van [email protected]

Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!using Code Generation Techniques

Co-Promotor: Prof. Dr. Ir. Christophe [email protected]

Promotor: Prof. Dr. Ir.Wouter [email protected]

Coach: Drs. Ir. Jef Maerien [email protected]

QA