Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information
|
|
- Christal Hines
- 5 years ago
- Views:
Transcription
1 Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information W. Znaidi M. Minier and JP. Babau Centre d'innovations en Télécommunication & Intégration de services PIMRC
2 Outline Introduction and related work Our proposition Simulations and some results Conclusion 2
3 a Wireless Sensors Network No infrastructure Hundreds/Thousands of tiny devices Difficult/impossible access to nodes A typical application: the fire detection Sensor Devices : Have limited energy memory and computation resources No tamper-resistant devices (physical compromising) + + = 3
4 Attacks Sinkhole attack Sybil attack Routing cycle attack Hello flooding attack Others attacks: Tampering jamming blackholes wormhole collision desynchronisation traffic analysis eavesdropping 4
5 What is a wormhole? Wormhole Attack: Two wireless devices (X and Y) connected with an out-of-band connection (by cable or high-power Wireless radios). Y captures wireless transmissions in its neighborhood transfers them through Wormhole Link to X and X reinjects all the packets there into the network (and vice versa). Characteristics: Dangerous : all the traffic attracted to X-Y Easy to mount and to launch Hard to detect 5
6 What is a wormhole? Network effect: Routing protocol may choose routes that contains the wormhole link Monitor traffic or drop packets etc. distorts the network topology Our goal: Detection and prevention of the wormhole attack in WSNs 6
7 Not specific to WSN: RFID access control system: gate equipped with contactless smart card reader contactless smart card wormhole contactless smart card emulator fast connection smart card reader emulator user may be far away from the building 7
8 Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al Use of packet leaches with geographical and temporal information requires synchronized clocks and GPS equipped devices L. Hu and al Use the direction of the antenna Of the neighbors use of directional antenna R. Maheshwari and al Search for forbidden structure caused by the wormhole Difficulty to compute a parameter to determine forbidden structure 8
9 Our detection algorithm Main idea: Every sensor node computes the connectivity degree of its neighbors Using this parameter each node declares if it detected the presence of the wormhole Assumption: Bidirectional link Static and dense network 9
10 Background used Edge-clustering coefficient: C z g g i j i j = g si j i j Ex. g=3 3 C i j = 2 4 Modified edge-clustering coefficient: C g i j\ X = z s g i j \ X g i j\ X i k j Ex. g=3 3 C i j\ k =
11 Def. of the wormhole using the edge-clustering coefficient Assumption: in a dense network such a WSN we suppose that every couple of sensor nodes has at least one common 1-2 hop neighbor Let a and b two nodes in the WSN: g = 34 a declares b as a wormhole if X V1 ( b) such C a X \ b = 0 Example: C 3 a 4 y\ X = 0 and Ca y\ X = 0 Node a declares X as a wormhole node 11
12 Limitation and Solutions Generalization: X is away l-hop from node a a declares X as a wormhole if l+ 2 k V1 ( X ) such C a k \ X = 0 But: False positive: C 3 j 4 g \ a = 0 and C j g \ a = 0 Solution: use the voting technique: every node declares a wormhole only if it received a sufficient number of alerts. 12
13 Proposed algorithm 1. Neighborhood discovery: each node maintains the list of its 1-hop and 2-hop neighbors. 2. Computing: each node computes first if it s = 0 4 then it computes. C..\. 3 C..\. 3. Isolation: if a node is declared as a wormhole it uses the voting technique Our algorithm is distributed uses local neighborhood information and no extra hardware. 13
14 Simulations Scenario: Single wormhole 2 different topologies: random and grid distribution 125 nodes over 400mx400m Disk graph connectivity model IEEE MAC layer WSNet Simulator (developed in CITI Lab) 14
15 Some results Grid topology Random topology Probability of wormhole detection graph disconnection false positive and false positive without boundary nodes 15
16 Some results Impact of the threshold T am on the false positive probability 16
17 Conclusion Our algorithm is resilient to wormhole attack: Without relying on any location inform (GPS) Without introducing any special hardware No packet added Our algorithm is simple practical local and provides a 100% detection of the wormhole detection. The mechanism used in our protocol such the edgeclustering coefficient can be used for other proposals such auto-organization in WSNs Current work: Establishment pairwise key and access control using trivariate polynomial 17
18 Thank you! Questions? 18
19 WSN s Key management using trivariate Polynomials Wassim Znaidi Encadrants: Marine Minier 19
20 Motivation Resource constraints: public keys not possible Symmetric method: keys shared between nodes. Assumptions: Static node deployed anytime Trusted and powerful Sink All information are extract when a node is captured 20
21 21 Main Idea Blundo Model : Our trivariate polynomial : Characteristic: t-secure Danger: If t nodes are compromised all the system is broken 1 ij a where1 mod (Q) ) ( 0 = = Q t y x i a y x f j i j i j 1 ijk a 1 where mod (Q) ) ( 0 = = Q t z y x i a z y x f k j i k j i jk ) ( ) ( x y f y x f with = ) ( ) ( z x y f z y x f with =
22 22 Initialization phase (before nodes deployment) The BS loads into each node i: : order of node i 2 authentication parameters: ) ( ) ( z y id f z y i f i = i z ) 1 ( i a' w i z N h = ) 0 ( i a w N h =
23 Pair-wise key establishment 23
24 Path-key establishment A pair-wise key established between non-neighboring nodes u and v Find a secure path of already established pair-wise keys Follow the pair-wise key establishment process where all exchanged messages between u and v are authenticated throw the path 24
25 Thank you! Questions? 25
26 Pair-wise key establishment 26
Chapter 6: Securing neighbor discovery
Securit and Cooperation in Wireless Networks http://secowinet.epfl.ch/ the wormhole attack; centralized and decentralized wormhole detection mechanisms; 007 Levente Buttán and Jean-Pierre Hubau Introduction
More informationWireless Sensor Network Wormhole Detection using an Artificial Neural Network
Int'l Conf. Wireless Networks ICWN'15 115 Wireless Sensor Network Wormhole Detection using an Artificial Neural Network Mohammad Nurul Afsar Shaon and Ken Ferens Department of Electrical and Computer Engineering
More informationDistributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security
Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #19 Vehicular Network Security & Privacy 2016 Patrick Tague 1 Class #19 Review of some vehicular network stuff How wireless attacks affect vehicle
More informationA Group-Based Deployment for Wormhole Prevention in Sensor Networks
JOURAL OF IFORATIO SCIECE AD EGIEERIG 27, 79-93 (2011) A Group-ased Deployment for Wormhole Prevention in Sensor etworks GU-HSI LAI +, CHE-SE OUYAG * AD CHIA-EI CHE + + Department of Information anagement
More informationResearch Article MDS-Based Wormhole Detection Using Local Topology in Wireless Sensor Networks
Distributed Sensor Networks Volume 212, Article ID 14572, 9 pages doi:1.1155/212/14572 Research Article MDS-Based Wormhole Detection Using Local Topology in Wireless Sensor Networks Xiaopei Lu, Dezun Dong,
More informationData Gathering and Personalized Broadcasting in Radio Grids with Interferences
Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia
More informationLocation Determination Technologies for Sensor Networks
Location Determination Technologies for Sensor Networks Moustafa Youssef University of Maryland at College Park UMBC Talk March, 2007 Motivation Location is important: Determining the location of an event
More informationWormhole Attack Detection in Wireless Sensor Network using Discrete Wavelet Transform
Int'l Conf. Wireless Networks ICWN'16 29 Wormhole Attack Detection in Wireless Sensor Network using Discrete Wavelet Transform Mohammad Nurul Afsar Shaon and Ken Ferens Department of Electrical and Computer
More informationWORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks
WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks Hai Vu, Ajay Kulkarni, Kamil Sarac, and Neeraj Mittal Department of Computer Science The University of Texas
More informationWORMHOLE attack is one of the most severe security
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 6, DECEMBER 2011 1787 Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks Dezun Dong, Member, IEEE, Mo Li, Member, IEEE, Yunhao Liu,
More informationQuantum Wireless Sensor Networks
Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.
More informationRadio Network Clustering from Scratch
Radio Network Clustering from Scratch Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer {kuhn,moscitho,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland Abstract.
More informationFraud within Asymmetric Multi-Hop Cellular Networks
Financial Cryptography 2005 EPFL, Lausanne, Switzerland ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Wireless networks Single-hop cellular network Multi-hop network Multi-hop cellular network Asymmetric multi-hop
More informationDistributed Optimization over Networks Gossip-Based Algorithms
Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random
More informationLinks Failure Analysis of Averaging Executed by. Protocol Push sum
Contemporary Engineering Sciences, Vol. 9, 1, no., 7-3 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.19/ces.1.113 Links Failure Analysis of Averaging Executed by Protocol Push sum Martin Kenyeres Dept.
More informationData Gathering and Personalized Broadcasting in Radio Grids with Interferences
Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,b,, Bi Li b,a,c, Nicolas Nisse b,a, Hervé Rivano d, Min-Li Yu e a Univ. Nice Sophia Antipolis, CNRS,
More informationConsensus Algorithms for Camera Sensor Networks. Roberto Tron Vision, Dynamics and Learning Lab Johns Hopkins University
Consensus Algorithms for Camera Sensor Networks Roberto Tron Vision, Dynamics and Learning Lab Johns Hopkins University Camera Sensor Networks Motes Small, battery powered Embedded camera Wireless interface
More informationPreventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach
Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach L. Lazos, R. Poovendran, C. Meadows 2, P. Syverson 2, L. W. Chang 2 University of Washington, Seattle, Washington, 2
More informationAsymptotics, asynchrony, and asymmetry in distributed consensus
DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex
More informationPerformance of dual-searcher mobiles in hotspot scenarios
Performance of dual-searcher mobiles in hotspot scenarios 1. Introduction Third Generation Partnership Project (3GPP) High Speed Packet Access (HSPA) Release 8 specifications introduced the RRC signaling
More informationOn Selfish Behavior in CSMA/CA Networks
On Selfish Behavior in CSMA/CA Networks Mario Čagalj1 Saurabh Ganeriwal 2 Imad Aad 1 Jean-Pierre Hubaux 1 1 LCA-IC-EPFL 2 NESL-EE-UCLA March 17, 2005 - IEEE Infocom 2005 - Introduction CSMA/CA is the most
More informationSecret sharing schemes
Secret sharing schemes Martin Stanek Department of Computer Science Comenius University stanek@dcs.fmph.uniba.sk Cryptology 1 (2017/18) Content Introduction Shamir s secret sharing scheme perfect secret
More informationOn Alarm Protocol in Wireless Sensor Networks
On Alarm Protocol in Wireless Sensor Networks Jacek Cichoń, Rafal Kapelko, Jakub Lemiesz, and Marcin Zawada Institute of Mathematics and Computer Science, Wrocław University of Technology, Poland Abstract.
More informationSieving for Shortest Vectors in Ideal Lattices:
Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective Joppe W. Bos Microsoft Research LACAL@RISC Seminar on Cryptologic Algorithms CWI, Amsterdam, Netherlands Joint work with Michael
More informationOutline Network structure and objectives Routing Routing protocol protocol System analysis Results Conclusion Slide 2
2007 Radio and Wireless Symposium 9 11 January 2007, Long Beach, CA. Lifetime-Aware Hierarchical Wireless Sensor Network Architecture with Mobile Overlays Maryam Soltan, Morteza Maleki, and Massoud Pedram
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationSecure, Reliable, and Resilient Design of Wireless Sensor Networks via Random Graph Modeling. Osman Yağan
Texas A&M University, October 20th, 2016 1 Secure, Reliable, and Resilient Design of Wireless Sensor Networks via Random Graph Modeling Osman Yağan Dept. of ECE and CyLab Carnegie Mellon University oyagan@ece.cmu.edu
More informationL7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015
L7. Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang, 5 March 2015 1 Outline The basic foundation: multiplicative group modulo prime The basic Diffie-Hellman (DH) protocol The discrete logarithm
More informationPower Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications
Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications Andrey Bernstein 1, Daniel Bienstock 2, David Hay 3, Meric Uzunoglu 4, Gil Zussman 5 1 Computer and Communication
More informationObservations on Linear Key Predistribution Schemes and Their Applications to Group Deployment of Nodes
Observations on Linear Key Predistribution Schemes and Their Applications to Group Deployment of Nodes Alexey Urivskiy JSC InfoTeCS ourivski@mail.ru, urivskiy@infotecs.ru June 20, 2012 Key Predistribution
More informationTopology Control in Large-Scale Wireless Sensor Networks: Between Information Source and Sink
Topology Control in Large-Scale Wireless Sensor Networks: Between Information Source and Sink Masoumeh Haghpanahi, Mehdi Kalantari, Mark Shayman Department of Electrical & Computer Engineering, University
More informationOn the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
More informationPerformance Evaluation of Anti-Collision Algorithms for RFID System with Different Delay Requirements
Performance Evaluation of Anti-Collision Algorithms for RFID System with Different Delay Requirements Warakorn Srichavengsup Computer Engineering, Robotics and Technology Laboratory Faculty of Engineering,
More informationQuantum threat...and quantum solutions
Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique
More informationQuantitative Analysis of the VANET Connectivity: Theory and Application
Quantitative Analysis of the VANET Connectivity: Theory and Application Xin Jin, Weijie Su, YAN Wei School of EECS, School of Mathematical Sciences, Peking University E-mail: {jinxin, yanwei@net.pku.edu.cn},
More informationA Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks
A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks Joydeep Chandra 1, Ingo Scholtes 2, Niloy Ganguly 1, Frank Schweitzer 2 1 - Dept. of Computer Science and Engineering,
More informationThe k-neighbors Approach to Interference Bounded and Symmetric Topology Control in Ad Hoc Networks
The k-neighbors Approach to Interference Bounded and Symmetric Topology Control in Ad Hoc Networks Douglas M. Blough Mauro Leoncini Giovanni Resta Paolo Santi Abstract Topology control, wherein nodes adjust
More informationDownlink Traffic Scheduling in Green Vehicular Roadside Infrastructure
Downlink Traffic Scheduling in Green Vehicular Roadside Infrastructure Abdulla A. Hammad, Terence D. Todd, George Karakostas and Dongmei Zhao Department of Electrical and Computer Engineering McMaster
More informationSecure and reliable connectivity in heterogeneous wireless sensor networks
Secure and reliable connectivity in heterogeneous wireless sensor networks Rashad Eletreby and Osman Yağan Department of Electrical and Computer Engineering and CyLab, Carnegie Mellon University, Pittsburgh,
More informationReducing The Data Transmission in Wireless Sensor Networks Using The Principal Component Analysis
Reducing The Data Transmission in Wireless Sensor Networks Using The Principal Component Analysis A Rooshenas, H R Rabiee, A Movaghar, M Y Naderi The Sixth International Conference on Intelligent Sensors,
More informationFormalization of Normal Random Variables
Formalization of Normal Random Variables M. Qasim, O. Hasan, M. Elleuch, S. Tahar Hardware Verification Group ECE Department, Concordia University, Montreal, Canada CICM 16 July 28, 2016 2 Outline n Introduction
More informationFlow-level performance of wireless data networks
Flow-level performance of wireless data networks Aleksi Penttinen Department of Communications and Networking, TKK Helsinki University of Technology CLOWN seminar 28.8.08 1/31 Outline 1. Flow-level model
More informationCri$ques Ø 5 cri&ques in total Ø Each with 6 points
Cri$ques Ø 5 cri&ques in total Ø Each with 6 points 1 Distributed Applica$on Alloca$on in Shared Sensor Networks Chengjie Wu, You Xu, Yixin Chen, Chenyang Lu Shared Sensor Network Example in San Francisco
More informationAsymmetric Encryption
-3 s s Encryption Comp Sci 3600 Outline -3 s s 1-3 2 3 4 5 s s Outline -3 s s 1-3 2 3 4 5 s s Function Using Bitwise XOR -3 s s Key Properties for -3 s s The most important property of a hash function
More informationRemote Estimation Games over Shared Networks
October st, 04 Remote Estimation Games over Shared Networks Marcos Vasconcelos & Nuno Martins marcos@umd.edu Dept. of Electrical and Computer Engineering Institute of Systems Research University of Maryland,
More informationON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS. Michael G. Rabbat
ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS Michael G. Rabbat Dept. of Electrical and Computer Engineering McGill University, Montréal, Québec Email: michael.rabbat@mcgill.ca ABSTRACT This paper
More informationبسم الله الرحمن الرحيم
بسم الله الرحمن الرحيم Reliability Improvement of Distributed Detection in Clustered Wireless Sensor Networks 1 RELIABILITY IMPROVEMENT OF DISTRIBUTED DETECTION IN CLUSTERED WIRELESS SENSOR NETWORKS PH.D.
More informationJoint Problem of Power Optimal Connectivity and Coverage in Wireless Sensor Networks
1 Joint Problem of Power Optimal Connectivity and Coverage in Wireless Sensor Networks Malik Magdon-Ismail, Fikret Sivrikaya, Bülent Yener Department of Computer Science Rensselaer Polytechnic Institute
More informationCS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing
Lecture 11: Key Management, Secret Sharing Céline Blondeau Email: celine.blondeau@aalto.fi Department of Computer Science Aalto University, School of Science Key Management Secret Sharing Shamir s Threshold
More informationWiFi MAC Models David Malone
WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,
More informationCensoring for Improved Sensing Performance in Infrastructure-less Cognitive Radio Networks
Censoring for Improved Sensing Performance in Infrastructure-less Cognitive Radio Networks Mohamed Seif 1 Mohammed Karmoose 2 Moustafa Youssef 3 1 Wireless Intelligent Networks Center (WINC),, Egypt 2
More informationA Combinatorial Approach to Key Predistribution. for Distributed Sensor Networks
A Combinatorial Approach to Key Predistribution for Distributed Sensor Networks Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo and Jooyoung Lee National Security
More informationarxiv: v1 [quant-ph] 4 Mar 2009
Topological optimization of quantum key distribution networks arxiv:0903.0839v1 [quant-ph] 4 Mar 2009 R Alléaume 1, F Roueff 1, E Diamanti 1 and N Lütkenhaus 2,3 1 Telecom ParisTech & LTCI - CNRS, Paris,
More informationSecurity Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationTechnical Report Communicating Secret Information Without Secret Messages
Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,
More informationAN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN
AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN A Thesis Presented to The Academic Faculty by Bryan Larish In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy
More informationNetwork Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Slides are partially based on the joint work of Christos Litsas, Aris Pagourtzis,
More informationGIS-based Smart Campus System using 3D Modeling
GIS-based Smart Campus System using 3D Modeling Smita Sengupta GISE Advance Research Lab. IIT Bombay, Powai Mumbai 400 076, India smitas@cse.iitb.ac.in Concept of Smart Campus System Overview of IITB Campus
More informationRobustness of Interdependent Random Geometric Networks
1 Robustness of Interdependent Random Geometric Networks Jianan Zhang, Student Member, IEEE, Edmund Yeh, Senior Member, IEEE, and Eytan Modiano, Fellow, IEEE Abstract We propose an interdependent random
More informationComplexity of automatic verification of cryptographic protocols
Complexity of automatic verification of cryptographic protocols Clermont Ferrand 02/02/2017 Vincent Cheval Equipe Pesto, INRIA, Nancy 1 Cryptographic protocols Communication on public network Cryptographic
More informationSPATIAL INFORMATION GRID AND ITS APPLICATION IN GEOLOGICAL SURVEY
SPATIAL INFORMATION GRID AND ITS APPLICATION IN GEOLOGICAL SURVEY K. T. He a, b, Y. Tang a, W. X. Yu a a School of Electronic Science and Engineering, National University of Defense Technology, Changsha,
More informationTime Synchronization
Massachusetts Institute of Technology Lecture 7 6.895: Advanced Distributed Algorithms March 6, 2006 Professor Nancy Lynch Time Synchronization Readings: Fan, Lynch. Gradient clock synchronization Attiya,
More informationDesigning securely connected wireless sensor networks in the presence of unreliable links
Designing securely connected wireless sensor networks in the presence of unreliable links Osman Yağan and Armand M. Makowski Department of Electrical and Computer Engineering and the Institute for Systems
More informationI N T R O D U C T I O N : G R O W I N G I T C O M P L E X I T Y
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R I n v a r i a n t A n a l y z e r : A n A u t o m a t e d A p p r o a c h t o
More informationImplementing Information paths in a Dense Wireless Sensor Network
Implementing Information paths in a Dense Wireless Sensor Network Masoumeh Haghpanahi, Mehdi Kalantari and Mark Shayman Department of Electrical & Computer Engineering, University of Maryland {masoumeh,mehkalan,shayman}@eng.umd.edu
More informationOptimization of the Hamming Code for Error Prone Media
Optimization of the Hamming Code for Error Prone Media Eltayeb Abuelyaman and Abdul-Aziz Al-Sehibani College of Computer and Information Sciences Prince Sultan University Abuelyaman@psu.edu.sa Summery
More informationCollaborative Target Detection in Wireless Sensor Networks with Reactive Mobility
1 / 24 Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility Rui Tan 1 Guoliang Xing 1 Jianping Wang 1 Hing Cheung So 2 1 Department of Computer Science City University of Hong
More informationCascading Failures in Power Grids - Analysis and Algorithms
Cascading Failures in Power Grids - Analysis and Algorithms Saleh Soltan 1, Dorian Mazaruic 2, Gil Zussman 1 1 Electrical Engineering, Columbia University 2 INRIA Sophia Antipolis Cascading Failures in
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationIndoor Localization Without the Pain
Krishna Kant Chintalapudi, Anand Padmanabha Iyer, Venkata N. Padmanabhan Presentation by Adam Przedniczek 2011-10-19 This presentation was based on the publication by Krishna Kant Chintalapudi, Anand Padmanabha
More informationTarget Tracking and Classification using Collaborative Sensor Networks
Target Tracking and Classification using Collaborative Sensor Networks Xiaodong Wang Department of Electrical Engineering Columbia University p.1/3 Talk Outline Background on distributed wireless sensor
More informationA Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo 3rd Biennial Canadian Discrete
More informationReal-World Testing of On-Path Support
Real-World Testing of On-Path Support Kishan Shenoi, Chip Webb, Josh Karnes Ixia This material is for informational purposes only and subject to change without notice. It describes Ixia s present plans
More informationOptimization of the Hamming Code for Error Prone Media
278 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 2008 Optimization of the Hamming Code for Error Prone Media Eltayeb S. Abuelyaman and Abdul-Aziz S. Al-Sehibani
More informationANALYTICAL MODEL OF A VIRTUAL BACKBONE STABILITY IN MOBILE ENVIRONMENT
(The 4th New York Metro Area Networking Workshop, New York City, Sept. 2004) ANALYTICAL MODEL OF A VIRTUAL BACKBONE STABILITY IN MOBILE ENVIRONMENT Ibrahim Hökelek 1, Mariusz A. Fecko 2, M. Ümit Uyar 1
More informationA Statistical Framework for Intrusion Detection in Ad Hoc Networks
A Statistical Framewor for Intrusion Detection in Ad Hoc Networs Dhanant Subhadrabandhu, Saswati Sarar, Farooq Anjum Abstract We focus on detecting intrusions in ad hoc networs using the misuse detection
More informationAsymptotic Distribution of The Number of Isolated Nodes in Wireless Ad Hoc Networks with Unreliable Nodes and Links
Asymptotic Distribution of The Number of Isolated Nodes in Wireless Ad Hoc Networs with Unreliable Nodes and Lins Chih-Wei Yi, Peng-Jun Wan, Kuo-Wei Lin and Chih-Hao Huang Department of Computer Science
More informationSide-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman
Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman Presenter: Reza Azarderakhsh CEECS Department and I-Sense, Florida Atlantic University razarderakhsh@fau.edu Paper by: Brian
More informationCLASSICAL CRYPTOSYSTEMS IN A QUANTUM WORLD
CLASSICAL CRYPTOSYSTEMS IN A QUANTUM WORLD Mark Zhandry Stanford University * Joint work with Dan Boneh But First: My Current Work Indistinguishability Obfuscation (and variants) Multiparty NIKE without
More informationCORA: Correlation-based Resilient Aggregation in Sensor Networks
CORA: Correlation-based Resilient Aggregation in Sensor Networks Levente Buttyán, Péter Schaffer, István Vajda Laboratory of Cryptography and Systems Security (CrySyS) Department of Telecommunications
More informationComputational Models for Wireless Sensor Networks: A Survey
Computational Models for Wireless Sensor Networks: A Survey Apostolos Filippas 2, Stavros Nikolaou 2, Andreas Pavlogiannis 2, Othon Michail 1,2, Ioannis Chatzigiannakis 1,2, and Paul G. Spirakis 1,2 1
More informationUtility Maximizing Routing to Data Centers
0-0 Utility Maximizing Routing to Data Centers M. Sarwat, J. Shin and S. Kapoor (Presented by J. Shin) Sep 26, 2011 Sep 26, 2011 1 Outline 1. Problem Definition - Data Center Allocation 2. How to construct
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationNotes for Lecture 17
U.C. Berkeley CS276: Cryptography Handout N17 Luca Trevisan March 17, 2009 Notes for Lecture 17 Scribed by Matt Finifter, posted April 8, 2009 Summary Today we begin to talk about public-key cryptography,
More informationDan Boneh. Introduction. Course Overview
Online Cryptography Course Introduction Course Overview Welcome Course objectives: Learn how crypto primitives work Learn how to use them correctly and reason about security My recommendations: Take notes
More informationarxiv: v1 [cs.cr] 22 May 2014
Distance-bounding facing both mafia and distance frauds: Technical report Rolando Trujillo-Rasua 1, Benjamin Martin 2, and Gildas Avoine 2,3 arxiv:1405.5704v1 [cs.cr] 22 May 2014 1 Interdisciplinary Centre
More informationAttack Graph Modeling and Generation
Attack Graph Modeling and Generation Ratnesh Kumar, Professor, IEEE Fellow Electrical and Computer Engineering, Iowa State University PhD Students: Mariam Ibrahim German Jordanian University Attack Graph:
More informationCollaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks
Collaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks Simulation and Theoretical Results Jun Wang Paulo Urriza Prof. Danijela Čabrić UCLA CORES Lab March 12, 2010
More informationImmediate Detection of Predicates in Pervasive Environments
Immediate Detection of redicates in ervasive Environments Ajay Kshemkalyani University of Illinois at Chicago November 30, 2010 A. Kshemkalyani (U Illinois at Chicago) Immediate Detection of redicates......
More informationComputing and Communicating Functions over Sensor Networks
Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]
More informationExploring Human Mobility with Multi-Source Data at Extremely Large Metropolitan Scales. ACM MobiCom 2014, Maui, HI
Exploring Human Mobility with Multi-Source Data at Extremely Large Metropolitan Scales Desheng Zhang & Tian He University of Minnesota, USA Jun Huang, Ye Li, Fan Zhang, Chengzhong Xu Shenzhen Institute
More informationA Mobile World of Security
A Mobile World of Security Christine Neuberg, Panos Papadimitratos, Christina Fragouli and Ruediger Urbanke EPFL, Switzerland christine.neuberg@epfl.ch, panos.papadimitratos@epfl.ch, christina.fragouli@epfl.ch,
More informationOn the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone
On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone Xiaodong Hu 1, Evgeniy Grechnikov 2 1 Department of Mathematics, Shandong University, Jinan 251, China. 2 Department
More informationLecture 1: Introduction to Public key cryptography
Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means
More informationA Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Maura B. Paterson Department of Economics, Mathematics and Statistics Birkbeck, University of London Malet Street, London
More informationI. INTRODUCTION. A. Wireless Sensor Networks
005 IEEE. Personal use of this material is permitted. Permission from IEEE must be http://dx.doi.org/0.09/infcom.007. Packetostatics: Deployment of Massively Dense Sensor Networks as an Electrostatics
More informationResilient Asymptotic Consensus in Robust Networks
Resilient Asymptotic Consensus in Robust Networks Heath J. LeBlanc, Member, IEEE, Haotian Zhang, Student Member, IEEE, Xenofon Koutsoukos, Senior Member, IEEE, Shreyas Sundaram, Member, IEEE Abstract This
More informationWhat s under the hood? Improving SCADA security with process awareness
What s under the hood? Improving SCADA security with process awareness Justyna J. Chromik University of Twente Enschede, The Netherlands j.j.chromik@utwente.nl Anne Remke University of Münster Münster,
More informationRound-Efficient Multi-party Computation with a Dishonest Majority
Round-Efficient Multi-party Computation with a Dishonest Majority Jonathan Katz, U. Maryland Rafail Ostrovsky, Telcordia Adam Smith, MIT Longer version on http://theory.lcs.mit.edu/~asmith 1 Multi-party
More information