Computer Science CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless Sensor Networks Dr. Peng Ning CSC 774 Adv. Net. Security 1 Background -- Localization • Data usually combined with locations – Fire alarm, target tracking • Traditional GPS – Expensive; does not work indoors • GPS-less localization techniques – AHLoS, APS-AoA, DV-Hop, Centroid, APIT, etc. Regular node Beacon node Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 2 Attacks against Localization Compromise beacon Impersonate beacon nodes: Wrong measurement nodes: Wrong measurement or wrong location or wrong location Replay beacon signals: Wrong measurement • Challenges in defending these attacks – – – – Resource constraints on sensor nodes Lack of physical protection Local collaboration v.s. global threat Difficulty of authenticating beacon signals Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 3 Range-Based Localization • A few beacon nodes with known locations. • Two phases: ( x1, y1 ) – Phase 1: Estimating distance (RSSI, TDoA, or ToA) – Phase 2: Solving equations by using MMSE A ( x, y ) f d ( x x )2 ( y y )2 1 1 1 1 2 2 f 2 d 2 ( x x2 ) ( y y 2 ) 2 2 f 3 d 3 ( x x3 ) ( y y3 ) min F f12 f 22 f 32 Computer Science ( x2 , y2 ) B C ( x3 , y3 ) A, B, C: beacon nodes Dr. Peng Ning CSC 774 Adv. Net. Security 4 Location estimation error Impact of Malicious Attacks 14 e_max=0 e_max=2 e_max=4 12 10 8 6 4 2 0 0 5 10 15 20 25 30 Location error introduced by a malicious beacon • Obtained through simulation • MMSE with 1 malicious beacon signal + 9 benign beacon signals • A single malicious signal arbitrarily large location error Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 5 Attack-Resistant Location Discovery • Goal – Resilient location estimation when there are malicious location references • Our approaches – Attack-resistant MMSE: identify “inconsistency” among malicious and benign beacon signals – Voting-based scheme: have each location reference vote on the location of the non-beacon node. Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 6 Assumptions • Use a key management protocol that provides a unique pair-wise key between any two nodes. – E.g., TinyKeyMan • This implies – Each sensor node is uniquely identified – Beacon packets can be authenticated • The content, not the signal Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 7 Assumptions (Cont’d) • Each sensor node uses at most one beacon signal from each beacon node – Represented as a location reference xi, yi, i – Location of the beacon node and the measured distance. • Attacker model – A malicious beacon node can provide arbitrary location references Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 8 Attack-Resistant MMSE • Observation: there is “inconsistency” between benign and malicious location references • Intuition: identify the most inconsistent location references before final estimation • Consistency metric (2): mean square error of distance measurement m 2 i (x˜ x i ) (y˜ y i ) i1 Computer Science 2 m Dr. Peng Ning 2 2 2 CSC 774 Adv. Net. Security 9 Attack-Resistant MMSE (Cont’d) • Ideally, get the largest consistent set of location references – MMSE can achieve more accurate result with more benign location references • What we have: check consistency, given a set of location references and a pre-defined threshold τ – If 2 > 2 inconsistent; otherwise, consistent • Two remaining questions – How to determine the largest consistent set – How to set an appropriate threshold Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 10 Determining the Largest Consistent Set • A simple solution – Try every combination of location references – Expensive: 10 location references, and 5 of them in the largest consistent setat least 387 MMSE operations • Greedy algorithm – Multiple rounds – Remove the most inconsistent location reference in each round – Not guaranteed to find the largest consistent set Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 11 Greedy Algorithm A set of m location references and a predefined threshold τ Consistency Test i=m Yes Consistent? Find consistent set and output result No No Fail to find consistent set i>3? Yes subsets with i-1 items Consistency Test The one with the smallest MSE 10 location references, and 5 of them in the largest consistent set50 MMSE operations on average i=i-1 Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 12 Threshold τ • Investigate the distribution of MSE 2 when there is no malicious attack • If the measurement errors are independent, we have 2 m 2 2 0 lim F[ 0 ] ( ) m where μi and σi are the mean and variance of ei2 , and m i , i 1 Computer Science Dr. Peng Ning m 2 i i 0 CSC 774 Adv. Net. Security 13 Theoretical Results v.s. Simulation Results Cumulative distriubtion 1 0.9 0.8 0.7 0.6 m=4 theoretical m=5 theoretical m=9 theoretical m=4 simulated m=5 simulated m=9 simulated 0.5 0.4 0.3 0.2 0.1 0 0 0.2 0.4 0.6 0.8 1 c 1.2 1.4 1.6 1.8 2 The threshold should not be too small or too large. Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 14 Voting-Based Scheme • Partition the target field into grid with M small squares (cells) • Each location reference votes on the possible locations of node • Identify the cell (or cells) with the largest vote Computer Science 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 1 1 1 2 2 1 1 2 2 2 2 1 1 B 2 3 3 2 2 1 2 3 3 2 2 1 2 1 1 1 C 1 1 1 1 1 1 1 A 1 1 1 2 2 1 1 1 1 2 2 1 1 2 2 1 1 1 1 1 2 1 1 2 2 1 1 1 1 1 1 1 1 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 D max(0, ) Dr. Peng Ning CSC 774 Adv. Net. Security 15 Overlap Test • No overlap between the cell and the ring iif – The maximum distance from A to a point in the cell dmax(A) < max(0,δ-ε), or – The minimum distance from A to a point in the cell dmin(A) > δ+ε Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 16 Granularity M • Fine granularity (large M) results in high accuracy but high computation and storage cost, • Coarse granularity (small M) results in low accuracy but low computation and storage cost Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 17 Iterative Refinement • Idea – Repeat the basic voting algorithm on the result of the last voting round • Stop conditions – Achieve the required accuracy (size of cells) – Size of the cell cannot be reduced anymore • We use the second stop condition in our experiments Computer Science 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 1 1 1 2 2 1 1 2 2 2 2 1 1 B 2 3 3 2 2 1 2 3 3 2 2 1 2 1 1 1 C 1 1 1 1 1 1 1 A 1 1 1 2 2 1 1 1 1 2 2 1 1 2 2 1 1 1 1 1 2 1 1 2 2 1 1 1 1 1 1 1 1 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Dr. Peng Ning D CSC 774 Adv. Net. Security 18 Simulation Evaluation • Evaluate the ability of the proposed methods to tolerate malicious attacks • Three attack scenarios – One malicious location reference (9 + 1) – Multiple non-colluding malicious location references (9 + 3) – Multiple colluding malicious location references (9 + 3) • Configuration: – 30m X 30m target field – Radio signal range 22m – Distance error evenly distributed in (4, 4) Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 19 Evaluation of Attack-Resistant MMSE Location estimation error 100 MMSE without malcious MMSE with 1 malicious MMSE with 3 non-colluding MMSE with 3 colluding AR-MMSE with 1 malicious AR-MMSE with 3 non-colluding AR-MMSE with 3 colluding 10 1 0 10 20 30 40 50 60 70 80 90 100 Location error introduced by malicious beacons Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 20 Location estimation error Evaluation of Voting-Based Scheme 100 MMSE-1 Malicious MMSE-3 Malicious MMSE-3 Collusion Voting-1 Malicious Voting-3 Malicious Voting-3 Collusion 10 1 0 10 20 30 40 50 60 70 80 90 100 Location error introduced by malicious beacons Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 21 100 AR-MMSE-1 Malicious AR-MMSE-3 Malicious AR-MMSE-3 Collusion Voting-1 Malicious Voting-3 Malicious Voting-3 Collusion Due to the non-optimal solution given by greedy algorithm. 10 1 Location estimation error Comparison 0 10 20 30 40 50 60 70 80 90 100 Location error created by malicious beacon Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 22 Implementation • Target at MICA2 motes running TinyOS Code Size (byte) ROM RAM MMSE 2,034 286 AR-MMSE 3,226 396 Voting-Based 4,488 174 Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 23 Execution Time 10 MMSE AR-MMSE Voting Time (sec) 1 0.1 0.01 0.001 4 6 8 10 12 14 16 18 20 22 24 26 Number of location references 1 malicious location reference 4, e 10 Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 24 Field Experiment 0 Use RSSI to measure distance 4feet 1 2 3 4 5 6 7 8 9 10 0 1 Beacon ID=1 (1,3) 2 Beacon ID=2 (2,6) 3 4 Beacon ID=3 (4,4) 4feet 5 Beacon ID=4 (4,9) Sensor ID=0 6 7 8 Beacon ID=6 (7,1) Beacon ID=7 (8,8) 9 Beacon ID=5 (9,5) 10 Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 25 100 10 1 MMSE AR-MMSE Voting 0.1 Location estimation error 1 Malicious Beacon 0 20 40 60 80 100 120 Location error created by malicious beacon Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 26 3 Non-Colluding Malicious Beacons 10 1 0.1 Location estimation error 100 MMSE AR-MMSE Voting 0 20 40 60 80 100 120 Location error created by malicious beacon Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 27 3 Colluding Malicious Beacons 10 1 0.1 Location estimation error 100 MMSE AR-MMSE Voting 0 20 40 60 80 100 120 Location error created by malicious beacon Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 28 Conclusion • We have been investigating various techniques to secure localization in sensor networks – Prevention – Toleration – Detection and response • Future work – Light-weighted secure and resilient solutions – Secure and resilient localization for dynamic sensor networks Computer Science Dr. Peng Ning CSC 774 Adv. Net. Security 29
© Copyright 2026 Paperzz