20
Trust Based Routing In wireless sensor Network

Trust Based Routing In wireless sensor Network

Embed Size (px)

Citation preview

Page 1: Trust Based  Routing In wireless sensor Network

Trust Based Routing In wireless sensor Network

Page 2: Trust Based  Routing In wireless sensor Network

Characteristics:Temporarily formedNodes act as routersInfrastructure-lessLimited resources wireless medium

Applications:Military battlefield

networks. Personal Area Networks Disaster and rescue

operation

About Sensor Network

Page 3: Trust Based  Routing In wireless sensor Network

Attacks on Wireless Networks

Passive attacksDo not change the routing informationListen to get valuable information

Active attacksUse its energy to manipulate the routing

information

Page 4: Trust Based  Routing In wireless sensor Network

Passive attack

passive attack "attempts to learn or make use of information from the system but does not affect system resources"

Traffic analysis

each message is encrypted because it is not important whether the data is

readable(understandable) to the attacker. Here, the adversary attempts to find patterns in the communication between two node, which might allow the adversary to derive certain assumptions based on these patterns.

Page 5: Trust Based  Routing In wireless sensor Network

Passive attack

Traffic analysis

Node Node

Attacker

Page 6: Trust Based  Routing In wireless sensor Network

Active Attack

Active attacks include security threats in which an node triesto manipulate code or data while it is transmitted between nodes. The most common examples of this kind of attack arealterations, in which an data is deleted or tampered with by an intruder .

Page 7: Trust Based  Routing In wireless sensor Network

Active Attacks

Modification: Malicious node can modify routing information

Fabrication: Generating false routing message

Impersonation: Initiate attack by masquerading as another

node

Page 8: Trust Based  Routing In wireless sensor Network

Active attack

CMalicious Node

A B

Page 9: Trust Based  Routing In wireless sensor Network

Existing Security Solutions

Intrusion preventionEncryption, authentication.

Nodes are required to have pre-shared keys or digital certificates.

Central trust authority or pre configuration is not practical for ad-hoc networks

Page 10: Trust Based  Routing In wireless sensor Network

Dynamic Source Routing (DSR) Protocol

On demand protocol: route information discovered only as needed.

Source routing: entire path to destination supplied by source in packet header.

Procedure: • Route discovery• Route maintenance• Routing

Page 11: Trust Based  Routing In wireless sensor Network

Route Discovery

.Route Request:

Source broadcasts Route Request message for specified destinationIntermediate node adds itself to path in message and forwards message toward destination

A B C D E

A A,B,CA,B A,B,C,D

Page 12: Trust Based  Routing In wireless sensor Network

Route Discovery

.

Route Reply:Destination unicasts Route Reply message to source

Page 13: Trust Based  Routing In wireless sensor Network

DSR route discovery method

B

FD

A

C

H

GE

Page 14: Trust Based  Routing In wireless sensor Network

Route Maintenance

Used when link breakage occursLink breakage may be detected using link-layer ACKs, “passive

ACKs”, DSR ACK request.

Route Error message sent to source of message being forwarded when

break detected.

Intermediate nodes “eavesdrop”, adjust cached routes .

Source deletes route; tries another if one cached, or issues new Route

Request.

A B C D E

ROUTE BROKEN C-D

Page 15: Trust Based  Routing In wireless sensor Network

DSR Based Model

Trust Based Routing

To compute the direct trust in a node. In doing so we measure the accuracy and sincerity of the immediate neighboring nodes by monitoring their participation in the packet forwarding.

As soon as it hears its immediate neighbour forwarding the packet, the node

checks the integrity of the packet by verifying it for requisite modifications. If the integrity check passes, it confirms that the node has acted in a benevolent manner and so its direct trust counter is incremented. Similarly, if the integrity check fails or the forwarding node does not transmit the packet, its corresponding direct trust measure is decremented.

Page 16: Trust Based  Routing In wireless sensor Network

Trust Calculation

To represent the direct trust in a node y by node x as T, andis given by the following equation:

Txy = W(PA) x PA + W(Pp) x Pp

• PA = represents the category Packet Acknowledgements that maintains a count of the number of packets that have been forwarded by a node.

• Pp= represents the category Packet Precision, which preserves a count of

the number of packets forwarded correctly.

• W reflects the weight or priority assigned to that category.

• PA is used to detect grey and black hole attacks, in which a node due to selfish or

malicious reasons dumps the received packets. • Pp is used to detect modification attacks carried out

by the forwarding nodes.

Page 17: Trust Based  Routing In wireless sensor Network

Trust Propagation

To propagate trust information beyond a single hop, piggyback the direct trust value of nodes along with the ROUTE REQUEST packets.

Before forwarding a ROUTE REQUEST packet, appends the direct trust value of the preceding node from which it had received the ROUTE REQUEST packet.

When the ROUTE REQUEST packet is propagated, it also spreads the trust information of other nodes in the network.

Page 18: Trust Based  Routing In wireless sensor Network

Trust Propagation

X

E

C

A

F

D

B

Y

Tax

Tcx

Tex

Tba, Tax

Tex,Tfe

Tcx,Tdc

Page 19: Trust Based  Routing In wireless sensor Network

References

1.TRUST-BASED ROUTING FOR AD-HOC WIRELESS NETWORKS , Asad Amir Pirzada., Amitava Datta, Chris McDonald School of Computer Science & Software Engineering, The University of Western Australia Crawley, WA 6009, Australia

2. An Intrusion Detection System for Wireless Sensor NetworksIlker Onat Ali Miri School of Information Technology and Engineering University of Ottawa, Canadae-mail: [email protected], [email protected]

3. Intrusion Detection Techniques for Mobile Wireless Networks ,Yongguang Zhang ,HRL Laboratories LLC, Malibu, California Wenke Lee,College of Computing, Georgia Institute of TechnologyE-mail: [email protected] Huang,College of Computing, Georgia Institute of TechnologyE-mail: [email protected]

Page 20: Trust Based  Routing In wireless sensor Network

Thank you