routing protocol for wireless sensor network in hostile environments

22
Routing Protocol for Wireless Sensor Network in Hostile Environments PhD Student : Kashif Saghar Supervisors: William Henderson David Kendall

Upload: illana-christensen

Post on 01-Jan-2016

52 views

Category:

Documents


4 download

DESCRIPTION

Routing Protocol for Wireless Sensor Network in Hostile Environments. PhD Student : Kashif Saghar Supervisors: William Henderson David Kendall. Outline. Wireless Sensor Networks (WSN) and Routing Formal Modelling Challenges & Security Issues in WSN Research Aim Research Method - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Routing Protocol for Wireless Sensor Network in Hostile Environments

Routing Protocol for Wireless Sensor Network in Hostile

Environments

PhD Student : Kashif SagharSupervisors:

William HendersonDavid Kendall

Page 2: Routing Protocol for Wireless Sensor Network in Hostile Environments

Outline

• Wireless Sensor Networks (WSN) and Routing

• Formal Modelling

• Challenges & Security Issues in WSN

• Research Aim

• Research Method

• Progress

Page 3: Routing Protocol for Wireless Sensor Network in Hostile Environments

WIRELESS SENSOR NETWORK (WSN)

Page 4: Routing Protocol for Wireless Sensor Network in Hostile Environments

WSN COMMUNICATION ARCHITECTURE

Physical Layer

Data Link (MAC) Layer

Network Layer

Transport Layer

Application Layer

Routing

Page 5: Routing Protocol for Wireless Sensor Network in Hostile Environments

WHY WSN ARE DIFFERENT?

• Fault Tolerance• Scalability• Density• Hardware Constraints• Cost• Power Consumption• WSN Topology

Page 6: Routing Protocol for Wireless Sensor Network in Hostile Environments

ROUTING IN WSN

• Cost• Energy-efficiency• Latency• Mobility• Distribution density• Scalability• Quality of Service (QoS)

Page 7: Routing Protocol for Wireless Sensor Network in Hostile Environments

SECURITY ISSUES IN WSN

• Broadcast Nature

• Limited Resources

• Unattended

• Hostile Environment

Page 8: Routing Protocol for Wireless Sensor Network in Hostile Environments

AIM AND OBJECTIVES

• AIM/Purpose– "Attacks on Wireless Sensor Networks, having limited resources,

can be successfully resisted at the Network Layer."

• Primary Assumptions– Confidentiality and Authentication Scheme is present at Link

Layer– Sink is a highly resourced node– Nodes do not have any special hardware– The approximate time to compromise a node is known in

advance– Nodes can be placed by any means (Random, Regular)– Attacker is very Powerful

Page 9: Routing Protocol for Wireless Sensor Network in Hostile Environments

WSN ATTACKS CONSIDERED

• Wormhole– Two colluding nodes– A node at one end of the wormhole advertises high quality link to the

base station– Another node at the other end receives the attracted packets– Two Laptops or Normal Nodes

• Black hole – Selective Forwarding– Fail Encryption or via Wormhole

• Sink hole– Node attract all traffic around by making itself attractive to all nodes with

in range e.g. Laptop– Fail Encryption or via Wormhole

• Insider Attack– Get into network by node compromise or false node

Page 10: Routing Protocol for Wireless Sensor Network in Hostile Environments

LIST OF SOME WSN ATTACKS

• Spoofing• False Injection or Path-base Denial of Service• Black hole or Selective forwarding• Sinkhole attacks• Sybil attacks• Wormholes• Jamming• Eavesdropping• Traffic Analysis Attack• Insider Attack (Compromised Node)• False Node and malicious data• Rushing Attack• Stealthy Attack• Hello Flood Attack

Page 11: Routing Protocol for Wireless Sensor Network in Hostile Environments

LITERATURE REVIEW ANALYSIS

69.3%

14.9%

5.9%

4.0%

2.5%

3.5%

0% 10% 20% 30% 40% 50% 60% 70%

CryptographicTechniques

M ultiple-pathProtocols

Overhear Neighbour

Topology M apping

Specialized Hardware

Reward Protocols

Sche

me Us

ed

Percentage

6.1%4.0%3.2%

4.9%

5.3%

0.8%1.6%0.4%

2.4%

5.3%

20.6%

45.3%

Spoofing

False Injection

Black hole

Sinkhole attacks

Sybil attacks

Wormhole attack

Jamming

Traffic analysis Attack

Rushing Attack

Stealthy Attack

Hello Flood Attack

Insider Attack

88.5%

2.7%1.8%

1.8% 1.8% 2.7%

1 Attack

2 Attacks

3 Attacks

4 Attacks

5 Attacks

6 or M ore Attacks

Page 12: Routing Protocol for Wireless Sensor Network in Hostile Environments

DESIGN PHASES

SETUP PHASE

OPERATIONAL PHASE

ATTACK PREVENTION

Page 13: Routing Protocol for Wireless Sensor Network in Hostile Environments

TECHNIQUES AVAILABLE

• Formal Modelling• WSN Simulation• Empirical Testing

Page 14: Routing Protocol for Wireless Sensor Network in Hostile Environments

FORMAL MODELLING

• Assumptions become clear• Can check Best cases and Worst Cases easily• Inform about boundaries of protocol behaviour• Liveliness and Safety properties• Rarely used in analysis of previous protocols• Main Advantages over Simulation and Empirical Testing:

– No need to build a prototype of the system– Able to verify the system against every single execution trace (Hidden

Errors)• Shortcomings

– High Resources Required for detailed model– Scalability, Density, Topology– Subset of Model can be checked– Expertise Required– Uncertainty

Page 15: Routing Protocol for Wireless Sensor Network in Hostile Environments

UPPAL MODEL OF DESIGN (SETUP)

Page 16: Routing Protocol for Wireless Sensor Network in Hostile Environments

VERIFICATION USING UPPAAL

• Theorem1: Model never deadlocks

• Theorem2: All nodes get the correct level

• Theorem3: The levels of nodes are not changed once all nodes get the correct

• Theorem4: A node in INIT mode means it has not yet been assigned a level

• Theorem5: A node always gets a level and gets out of INIT mode

Page 17: Routing Protocol for Wireless Sensor Network in Hostile Environments

MESSAGE SEQUENCE DIAGRAM

Node1Sink

ASK

Node2

ASK

Node3 Node4

Node alwayssends ASKbeacon whenit startsASK ASK

ASK ASK

ASSIGN

LOUDLOUD

Node 1 hasbeen assigned Level 2 by Sink

ASK ASK

ASSIGN

Node 1 onreceiving ASKsends ASSIGN

LOUDLOUD

Node 2 observesneighbours for some time and thenannounce its level

ASK ASK

ASSIGN

LOUD LOUD

ASK

ASSIGN

LOUD

Node1Sink Node2 Node3 Node4

Node 3 has detected an Event !!!

Node 3 receivedACCEPT from bothNeighbours

FORWARDFORWARD

ACCEPT ACCEPT

FORWARDFORWARD

DATA

ACCEPT

DATA

ACK

ACK

ACK

As Node 1 is atLevel next to Sinkit do not send FORWARD

Sink sends ACKwhich is propagatedback to source node

SELECT

DATA DATA

SELECT

Data is only Recby Node2 whichwas selected

Page 18: Routing Protocol for Wireless Sensor Network in Hostile Environments

SIMULATION

• Level of simulator (High, Low, Bit Level)• Usual Workability• Scalability• Effect of Topology• Effect of Density• Vary environment conditions• Shortcomings

– Ideal cases are checked only– Hidden Errors

Page 19: Routing Protocol for Wireless Sensor Network in Hostile Environments

Average Number of Beacons per Node (500 Nodes)

0.0

10.0

20.0

30.0

40.0

Range (m)

Avera

ge N

um

ber

of

Beaco

ns/N

od

e

Ask Assign Loud

Ask 11.6 6.3 4.8 4.5 4.7

Assign 2.6 7.2 16.5 26.0 26.6

Loud 2.1 3.0 3.7 4.3 3.8

100 200 300 400 500

Average Number of Beacons per Node (100 Nodes)

0.0

10.0

20.0

30.0

40.0

Range (m)

Averag

e N

um

ber o

f

Beaco

ns/N

od

e

Ask Assign Loud

Ask 5.7 3.4 2.8 2.8 3.2 3.7 4.6 5.6 8.0 9.2 10.2

Assign 2.3 4.9 11.3 13.7 16.6 18.7 23.0 29.6 34.8 43.2 46.2

Loud 2.1 2.5 3.3 3.2 3.2 3.1 3.0 2.9 2.9 3.0 3.0

100 200 300 400 500 600 700 800 900 1000 All

Page 20: Routing Protocol for Wireless Sensor Network in Hostile Environments

Effect of Density on Setup Time (100 Node Network)

0.0

10.0

20.0

30.0

40.0

Range (m)

Tim

e (

Seco

nd

s)

Average

Max

Min

Average 14.6 11.4 11.8 12.2 12.2 13.6 14.2 16.8 20.6 23.8 27.3

Max 16.0 12.0 13.0 13.0 13.0 14.0 15.0 18.0 22.0 25.0 29.0

Min 14.0 11.0 11.0 11.0 12.0 13.0 13.0 16.0 20.0 22.0 26.0

100 200 300 400 500 600 700 800 900 1000 All

Effect of Density on Setup Time (1000 Node Network)

0.0

10.0

20.0

30.0

40.0

50.0

Range (m)

Tim

e (

Seco

nd

s)

Average

Max

Min

Average 36.0 25.8 24.4 24.8 21.0

Max 36.0 32.0 26.0 26.0 22.0

Min 36.0 20.0 22.0 23.0 20.0

100 200 300 400 500

Effect of Density on Setup Time (500 Node Network)

0.0

10.0

20.0

30.0

40.0

50.0

Range (m)

Tim

e (

Se

co

nd

s)

Average

Max

Min

Average 28.2 22.2 17.6 20.4 18.6

Max 33.0 28.0 19.0 23.0 22.0

Min 26.0 16.0 17.0 18.0 17.0

100 200 300 400 500

Page 21: Routing Protocol for Wireless Sensor Network in Hostile Environments

CURRENT AND FUTURE WORK

• Current Work– Formal specifications of design

• Future Work– Formal Model and Verification– Simulation of complete protocol– Simulation of Attacks

• Additional/Optional Work– Implementation in Real Hardware

Page 22: Routing Protocol for Wireless Sensor Network in Hostile Environments

Questions