Locationcentric Isolation of Misbehavior and Trust Routing in Energyconstrained Sensor Networks - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Locationcentric Isolation of Misbehavior and Trust Routing in Energyconstrained Sensor Networks

Description:

Black List Processor. Installed in the sink and all sensor node ... Investigating the secure/trusted routing protocol. Efficient node isolation using black list ... – PowerPoint PPT presentation

Number of Views:50
Avg rating:3.0/5.0
Slides: 12
Provided by: camarsK
Category:

less

Transcript and Presenter's Notes

Title: Locationcentric Isolation of Misbehavior and Trust Routing in Energyconstrained Sensor Networks


1
Location-centric Isolation of Misbehavior and
Trust Routing in Energy-constrained Sensor
Networks
  • Sapon Tanachaiwiwat, Pinalkumar Dave,
  • Rohan Bhindwale, Ahmed Helmy
  • IEEE EWCN, 2004
  • Presented By Jung, JinKyu

2
Contents
  • Motivation
  • TRANS
  • TRANS Components
  • Trust Routing Protocol
  • Isolating Insecure Location
  • Evaluation
  • Summary

3
Motivation
  • Misbehaving Node
  • Harmful in networks ? Infect networks
  • (Specially in military operations)
  • Route Infection Effect

Misbehaving Node
B
C
M
A
D
Infested Route
4
TRANS Components
  • Trust Routing Isolating Insecure Location
  • Trust Routing Module
  • Cryptography Verification
  • Packet Forwarding Observation
  • Availability Observation
  • Trust Table Processor
  • Black List Processor
  • ? Installed in the sink and all sensor node
  • Insecure Location Avoidance Module
  • Insecure Location Searching (Probing)
  • Black List Propagation
  • Insecure Location Aggregation
  • ? Installed in the sink

5
TRANS Senario
6
Trust Routing Protocol
  • Sensor Location
  • Total Area Trusted Area Insecure Locations
  • Trust Routing method
  • Send Packets Only Toward Their Trusted Neighbors
  • Trust Table based Security Mechanism
  • Cryptography
  • Ci 1 if cryptography use, else Ci 0
  • Availability
  • Ai Beacon replies / Beacon sent
  • Packet forwarding
  • Pi Successful packet Forwarding / Total packet
    Forwarding
  • Trust value
  • Ti Ci Ai ß Pi
  • ß ? Encouraging Factor

Metric for neighbor being trustable or not
7
Isolating Insecure Location(1/2)
  • Finding Malicious Node (Probing)
  • E-TTL
  • Send probe packet with increasing hop-count
  • Binary
  • Send probe packet in a binary search fashion
  • One-Shot
  • Send probe packet along the path and each node
    replies its location

8
Isolating Insecure Location(2/2)
  • Isolating Method
  • Sink finds misbehaving node and generate Black
    List
  • Black List Geocast
  • Broadcast black list
  • Remove isolated node from neighbor list
  • Broadcasting overhead
  • Embedded Black List
  • Embedded black list in packet header
  • Detour point using geographic routing
  • Less packet overhead

9
Evaluation Result(1/2)
  • Ring Topology
  • Added overhead
  • Transmitted packets for isolating
  • Goodput
  • of acked packet / of sent packet
  • TRANS on
  • TRANS off

Percent
Percent
Ring nodes
Ring nodes
10
Evaluation Result(2/2)
  • Random Topology
  • 30 nodes
  • TRANS on
  • TRANS off

11
Summary
  • Conclusion
  • Trust routing protocol design
  • Isolating Misbehavior node using black list
  • Alleviating route infection effect
  • Significant improvement in goodput (energy
    efficient metric)
  • Contribution
  • Illustrating the route infection problem in
    geographic routing
  • Investigating the secure/trusted routing protocol
  • Efficient node isolation using black list
Write a Comment
User Comments (0)
About PowerShow.com