Download - IDS in WSN - Related Work
![Page 1: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/1.jpg)
Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!
using Code Generation [email protected]
![Page 2: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/2.jpg)
Related Work
![Page 3: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/3.jpg)
![Page 4: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/4.jpg)
What is Related Work to this Thesis ?
Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!
using Code Generation Techniques
Problem Context
Solution
![Page 5: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/5.jpg)
Intrusion Detection in Wireless Sensor Networks
![Page 6: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/6.jpg)
Intrusion Detection in Wireless Sensor Networks
50 SHADES OF GREY
![Page 7: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/7.jpg)
Intrusion Detection in Wireless Sensor Networks
Cooperation
Reputation
![Page 8: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/8.jpg)
![Page 9: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/9.jpg)
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
![Page 10: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/10.jpg)
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
cooperative non-cooperative
Beta(1,1) = uni(0,1)
trust
![Page 11: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/11.jpg)
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
cooperative
non-cooperative
simple addition
aging
2nd hand appreciation weight
indirect /2nd hand reputation
![Page 12: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/12.jpg)
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 10 20 30 40 50
Trust between i and j
Number of packets
initial trustcooperative
uncooperative2nd hand
threshold trust
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
trust threshold
![Page 13: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/13.jpg)
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 10 20 30 40 50
Trust between i and j
Number of packets
0% failure5% failure10% failure30% failure0% with 2nd5% with 2nd10% with 2nd30% with 2nd
threshold trust
5% failure is accepted
10% almost
![Page 14: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/14.jpg)
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 10 20 30 40 50
Trust between i and j
Number of packets
0% failure5% failure10% failure30% failure0% with 2nd5% with 2nd10% with 2nd30% with 2nd
threshold trust
Reputation
Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks.
ACM Transactions on Sensor Networks (TOSN), 4(3):15.!
10%
delayed failure/misuse
![Page 15: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/15.jpg)
![Page 16: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/16.jpg)
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Intrusion Detection Problem
![Page 17: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/17.jpg)
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase
Intrusion Detection Problem+
![Page 18: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/18.jpg)
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!!! keychain construction!!! neighbourhood discovery
Intrusion Detection Problem+
KlKl-1Kl-2K2K1K0 …
SHA-1
![Page 19: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/19.jpg)
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase
Intrusion Detection Problem+
list of suspected nodes Message Authentication Code
![Page 20: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/20.jpg)
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!!! Key Validation!!! Message Authentication
Intrusion Detection Problem+
Ki-1 = SHA-1(Ki)
![Page 21: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/21.jpg)
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker
Intrusion Detection Problem+
![Page 22: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/22.jpg)
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase
Intrusion Detection Problem+
![Page 23: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/23.jpg)
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Algorithm to solve the Intrusion Detection Problem!!
1. Initialisation Phase!2. Voting Phase!3. Publish Key Phase!4. Exposing the Attacker!5. External Ring Reinforcement Phase
Intrusion Detection Problem+
Guy Fawkes Protocol}
![Page 24: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/24.jpg)
Cooperation
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. C., and Dimitriou, T. (2009). Cooperative intrusion detection in wireless sensor net- works.
In Wireless Sensor Networks, pages 263–278. Springer.!
Guy Fawkes
![Page 25: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/25.jpg)
![Page 26: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/26.jpg)
• Research on WSN IDS!
• Drops on a Hot Plate!
• No Holistic Solutions!
• Almost no Algorithm can be Proven Secure!
• Passes by on Actual Problems!
• Securing WSNs!
• Impossible to Really Fully Secure!
• Resources are Scarce!
• Security = Non-Functional Additional Cost
![Page 27: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/27.jpg)
![Page 28: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/28.jpg)
• Not Another Drop on a Hot Plate!
• Address Actual Problems!
• Support and Nurture Future Research!
• Leverage Prior Experience in New Context
![Page 29: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/29.jpg)
![Page 30: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/30.jpg)
• Offer a Solution that Encompasses!
• Research! ! ! ! ! simple & formal ! ! ! ! ! ! ! ! specification!
• Development! ! ! automated &! ! ! ! ! ! ! ! platform independent!
• Integration! ! ! ! automated &! ! ! ! ! ! ! ! platform specific!
• Cost! ! ! ! ! ! optimisation of ! ! ! ! ! ! ! ! resource usage!
• Security! ! ! ! ! augment the barriers &! ! ! ! ! ! ! ! unify implementation
![Page 31: IDS in WSN - Related Work](https://reader033.vdocuments.us/reader033/viewer/2022052600/5575c2add8b42a312a8b4ae9/html5/thumbnails/31.jpg)
Christophe Van [email protected]
Lowering the Impact of Intrusion Detection!on Resources in Wireless Sensor Networks!using Code Generation Techniques
Co-Promotor: Prof. Dr. Ir. Christophe [email protected]
Promotor: Prof. Dr. Ir.Wouter [email protected]
Coach: Drs. Ir. Jef Maerien [email protected]
QA