440 likes | 452 Views
SOME TRADE-OFFS IN SENSOR NETWORKS. Anthony Ephremides University of Maryland. Yale University October 8, 2003. PART I. Motivation. Layer Interaction in Wireless Networks Exploitation of Coupling for Enhancing Security Focus on Sensor Networks
E N D
SOME TRADE-OFFS • IN • SENSOR NETWORKS Anthony Ephremides University of Maryland Yale University October 8, 2003
Motivation Layer Interaction in Wireless Networks Exploitation of Coupling for Enhancing Security Focus on Sensor Networks - Special Mission Objectives (not “just” a network) Focus on Interplay between Energy Expenditure, “Mission” Performance and Resistance to Threats
Sensor Network for Detection • Ignore Routing Component control node
1 2 K Model • Simplified Model control center Each Node Collects Independently T independent Binary Measurements
Model (cont.) • Binary Hypothesis: • Each node makes T observations • - Observations are independent for each node and across nodes • Each Observation: • Let be the number of “1’s” out of the T observations at node i • then ; hence form a sufficient • statistic • Final Decision at Control Center (CC) • Objective: Minimize
Model (cont.) • Three Operating Options • - Centralized : • All data transmitted to CC • - Distributed : • Each node decides & transmits its decision to CC • - Quantized : • Each node sends a quantized M-bit quantity to CC • where
Analysis • - Centralized Option • optimal rule is LR test
Analysis (cont.) • - Distributed Option • - at each sensor node • - let represent the decision at node i • - is forwarded to CC • - at Control Center • where
Analysis (cont.) • - Quantized Option • - at sensor nodes, a network-wide optimal M-bit quantization • rule would require a set of threshold • depending on • where is mapped into , which is • sent to CC • - Note if then • - at Control Center
Analysis (cont.) • - Suboptimal solution for Quantized Option • - for • - if then • - if then • - else • - • - Thresholds are determined at each node based on • without exhaustive search
Numerical Results • - Performance Comparison of Three Operating Options • Fix ; vary ; • and fix for quantized option,we compare • Centralized: blue • Distributed: green • Quantized: red
Numerical Results (cont.) • - Explanation for the fluctuations • for distributed option
Numerical Results (cont.) • - Suboptimal Solution for Quantized Option • Performance comparison between optimal solution and • suboptimal solution: • Fix , vary • optimal solution: blue • suboptimal solution: red
Numerical Results (cont.) • - Suboptimal solution avoids complex computation for thresholds • - Suboptimal solution performs well enough compared to the optimal results
Resistance to Attacks • - Attack 1: nodes are partially destroyed • Example: vary ,fix
Resistance to Attacks (cont.) • - Attack 2: observations are partially deleted • fix , before attack: • Example 1: after attack • Example 2: after attack • Example 3: after attack
Energy Consumption Analysis • - Energy for Data Processing • - based on # of comparisons • - represents the energy consumed for one comparison • - is the # of comparisons • - Energy for Transmission • - based on the distance from sensor nodes to control center and # of bits • transmitted • - represents the energy consumed for transmitting one bit data • over a unit distance, for a fixed communication system • - represents the distance from sensor nodes to control center • - is the # of bits transmitted • - Total Energy
Energy ConsumptionAnalysis (cont.) • - Energy Consumption per Node for Three Options • - Centralized Option • - option 1: transmit all observations to CC • - option 2: transmit # of 1 out of T observations to CC • - Distributed Option • - Quantized Option (suboptimal solution) • where represents the expected # of comparisons needed for the suboptimal solution, which is a function of
Energy ConsumptionAnalysis (cont.) • - Energy consumption comparison for fixed as a • function of • fix • and • vary , and for Quantized Option
Energy ConsumptionAnalysis (cont.) • - Energy consumption comparison for fixed as a function • of • example 1: fix • vary
Energy ConsumptionAnalysis (cont.) • example 2: fix • vary
Energy ConsumptionAnalysis (cont.) • - Energy Consumption vs. Accuracy • fix ; vary • example 1: • example 2:
Conclusions • - Robustness to Threats • - Robustness to nodes destruction: • Loss of Performance (in terms of ratio) is least for Distributed Option • and highest for Centralized Option • - Robustness to observations deletion: • Loss of Performance (in terms of ratio) is least for Distributed Option • and highest for Centralized Option • - Trade-off in Energy / Accuracy • - Regarding Accuracy: Centralized > Quantized > Distributed • - Regarding Energy: • - low & high : Distributed Option is best • - high & low : Centralized Option is best for relatively small distances • Distributed Option is best for large distances • - for d increasing: Centralized is affected most
Future Work • - Spatial Correlation • - the independence assumption does not hold for sensor nodes • or observations • - spatial correlations are stronger for neighboring sensor nodes • - Routing in Multi-hop Environment • - single-hop is not feasible • - routing is needed for multi-hop transmission • - link metrics that capture cost function are needed • - Less Restrictive Model • - non-binary data • - general parameter values • - Other Attacks • - corruption of data • - compromised nodes
Ad-Hoc Networks • Ad-hoc wireless networks • Infrastructureless • Multi-hop transmissions • Mobile • New vulnerabilities to various forms of attack • Focus on the covert transmission threat • Established protocols offer possibility of covert transmission • Focus on AODV • Evaluation of covert channel
Destination Destination RREQ RREP Source Source AODV • Ad-hoc On-demand Distance Vector Routing • Idea: initiate a path discovery process only when a node needs to communicate with another node for which it doesn’t have an active route.
AODV • Each node i maintains a sequence number Ni, which is incremented in two circumstances: • Immediately before the node originates a route discovery; • Immediately before the node originates a RREP as the destination node in response to a RREQ for itself • RREQ: <ID(Destination), NDestination , ID(Source), NSource , Hop Count, …> • RREP: < ID(Destination), NDestination, ID(Source), Hop Count, Lifetime, …> • RERR: <ID(Unreachable Destination), NUnreachable Destination , …> • RERR is disseminated when an active link breaks • Route table entry: <ID(Destination), NDestination, Next Hop, Lifetime, …> • The Lifetime field is the expiration time for an active route, determined from the route control packets. • Each time a route is used to forward a data packet, its Lifetime field is updated to the current time plus a fixed value T1.
AODV • Expanding ring search technique: • The originating node initially uses a number X in the RREQ packet IP header and sets the timeout for receiving a RREP to T2,where • X specifies the number of hops that the RREQ can traverse and is usually equal to 3 or to a value based on prior hop count information. • If the RREQ times out without receiving a RREP, the RREQ is broadcast again with X incremented by Y (usually 2) • This continues until X reaches a threshold. Later attempts have X set to the network diameter so that they can traverse the entire network.
Covert Operation • Denote covert transmitter and receiver as CT and CR • The on-demand property of AODV allows manipulating the routing control packets to convey information covertly: • 1) Timing of the RREQs from CT • 2) Increment CT’s sequence number within a fixed period of time • 3) Lifetime entry in the RREP from CR • 4) Destination ID entry in the RREQ from CT
Covert Operation • 1) Requires synchronization between the CT and CR, which is not easily guaranteed in an ad-hoc wireless network. • 2) Either requires synchronization between the CT and CR or is easily detectible by the arbitrary size of increase in the sequence number. • 3) Has the covert information carried in the RREP, which is unicast to the originator. Probability of loss is high. • 4) Has the covert information carried in every RREQ broadcast by CT. We will focus on this covert operation.
1 Covert Transmitter 0 RREQ(1) … RREQ(0) RREQ(0) Covert Receiver (1, 0, 0, …) Covert Operation • Encode information into the destination ID entry of the route requests • CT and CR share an alphabet {ID1,ID2,…IDN-1}, ID of CT itself is not included in that alphabet • Symbol i is sent if CT sends a RREQ for destination IDi • Order of reception is assured through the NCT in the RREQs
Covert Operation • Limited bandwidth: • Transmission depends on “availability” of the route to the intended node (i.e., the next covert symbol is the destination ID) • When that route does exist, transmission is “stuck” • Lossy Communication: • The RREQs may not reach the covert receiver • Intermediate nodes may reply • Expanding ring search technique will stop the spread of RREQ • The covert transmitter and receiver are not connected • Covert channel performance • Covert transmission rate • Covert channel throughput • Probability of loss • Delectability
Simulation Environment • Area: 500m x 500m • Independent movement, random waypoint model • Channel Bandwidth: 2Mbits/sec • Packet length: 64 Bytes • Packets are generated independently at each node ~Poisson; • for each new packet, the destination is randomly chosen from the remaining (N-1) nodes in the network • Simplified assumption of collision free MAC layer • AODV parameters are set as in draft-ietf-manet-aodv-12.txt • 900 sec of simulation time • Varying parameters: • (on average, there is one neighbor • within a node’s transmission range)
Default Values for Some Important AODV Parameters • Parameter Name Value • ---------------------- -------- • ACTIVE_ROUTE_TIMEOUT (i.e., T1): 3,000 Milliseconds • MY_ROUTE_TIMEOUT : 2 * ACTIVE_ROUTE_TIMEOUT • ALLOWED_HELLO_LOSS : 2 • HELLO_INTERVAL : 1,000 Milliseconds • RREQ_RETRIES : 2 • RREQ_RATELIMIT : 10 • RERR_RATELIMIT : 10 • NET_DIAMETER : 35 • NET_TRAVERSAL_TIME : • 2*NODE_TRAVERSAL_TIME * NET_DIAMETER • NODE_TRAVERSAL_TIME : 40 • PATH_DISCOVERY_TIME : 2 * NET_TRAVERSAL_TIME • RING_TRAVERSAL_TIME (i.e., T2) : • 2*NODE_TRAVERSAL_TIME*(TTL_VALUE+TIMEOUT_BUFFER) • TTL_START (i.e., X) : 1 • TTL_INCREMENT (i.e., Y) : 2 • TTL_THRESHOLD : 7
Covert Channel Performance vs. Mobility • Smaller physical pause time: • More movement • More link breakages • & encounters • More “excuses” for covert transmission T = (1-P)R
Covert Channel Performance vs. Mobility • Higher speed: • Causes link breakage • Facilitates encounter
Covert Channel Performance vs. Network Size • Larger N: • Larger “vocabulary” • Greater distance between CT and CR • More congestion
Covert Channel Performance vs. Transmission Range • Small transmission range: • Covert transmission may be stuck for a long time. • Large transmission range: • Less loss • Less “excuses” for covert transmission • Hence a critical maximizing point of transmission range exists
Covert Channel Performance vs. Traffic Rate • Traffic generates the need for route discovery • Heavy traffic: • Tends to maintain the route • Has less “excuses” for covert transmission • Causes congestion
Covert Channel Performance vs. Expanding Ring Search Technique Transmission rate is suppressed because RREQ to CT may not reach CT Larger probability of loss because RREQ from CT does not reach beyond the ring Hence, the covert channel throughput almost halved
Conclusions • Clearly demonstrated that AODV can be used for covert transmission. • Quality of the covert channel is poor. • ( probability of loss : covers the interval (0,1), • but is usually high 0.4~0.9 • transmission rate : 0.5 ~ 7 bits per second • throughput : 0 ~ 3.5 bits per second) • Yet difficult to detect. • Hence, measures are needed for protection against covert transmission threat.
Future Work • Comparison of network performance and covert channel performance in different environment regimes • Guidelines for secure protocol design • Eliminate the basis for covert channels • e.g., design proactive protocols • Diminish the covert channel throughput • e.g., break the order of reception, use no sequence number • Detect the covert communication • Exploration of other ad-hoc network protocols with respect to potential for covertness • Abstraction to high-level properties • (e.g., distributed, adaptive, etc)