470 likes | 609 Views
Robust Range-Independent Localization for Wireless Sensor Networks. Radha Poovendran Joint work with Loukas Lazos Network Security Lab University of Washington http://www.ee.washington.edu/research/nsl/faculty/radha. Talk Outline. Motivation Problem Assumptions Approach
E N D
Robust Range-Independent Localization for Wireless Sensor Networks Radha Poovendran Joint work with Loukas Lazos Network Security Lab University of Washington http://www.ee.washington.edu/research/nsl/faculty/radha
Talk Outline • Motivation • Problem • Assumptions • Approach • Solution: SeRLoc • Threats and defense • Performance • High resolution localization: HiRLoc • Conclusions
Motivation • Location information is used for • Applications-Search & rescue etc. • Network Functions-Routing etc. • Location estimation Techniques • Range-based • Absolute p2p distance/angle estimate. • Requires hardware/sync. clocks. • Range-free • No distance or angle measurements • Used by Dv-hop, APIT etc.
Secure Localization Problem • Localization Problem:Estimate sensor’s location. • Threat: An adversary can provide false info displace the sensor. • Secure Localization:Ensurerobust location estimationevenin the presence ofadversaries. • Related work: Capkun [Technical Report—SecPos]
Network Model Assumptions (1) Two-tier network architecture Omnidirectional antennas, unknown location, randomly deployed, density ρs. Directional antennas, known location, randomly deployed, density ρL. r R ρL << ρs Locator Sensor
Network Model Assumptions (2) • Locator deployment: Homogeneous Poisson point process of rate ρL Random spatial distribution. • Sensor deployment: Random sampling with rate ρs. LHs: Locators heard at a sensor s
Our Approach • Develop range-free location estimation technique that • Detects attacks on localization. • Allows robust location estimation even in the presence of attacks. • We do not attempt to eliminate attacks on other network protocols.
Our Approach: SeRLoc Locator Sensor ROI L4 • Each locator Li transmits information that defines the sector Si, covered by each transmission. • Sensor s defines the region of intersection (ROI), from all locators it hears. L3 L1 s L2
SeRLoc – Step 1: Beacon reception Locator Sensor The sensor collects information from all the locators that it can hear. L4 L3 L1 θ1,2 θ2,2 L2: (X2, Y2) (0, 0) Computing the ROI analytically by intersection of conics is EXPENSIVE! Approximate method.
SeRLoc – Step 2: Search area Locator Sensor Search Area R: Locator’s Range L4 (Xmax-R, Ymin+R) (Xmin+R, Ymin+R) Xmin = min { Xii L } Ymin = min { Yii L } Xmax = max { Yii L } Ymax = max { Yii L } R R L3 L1 Define: R L2 (Xmin+R, Ymax-R) (Xmax-R, Ymax-R) • Sensor knows the rectangular coordinates and places a grid. • Every grid point coordinates are known. 2R+Xmin - Xmax
SeRLoc – Step 3: Grid-sector test Locator Sensor R: Locator’s Range • Sensor holds a Grid Score Table (GST) • GST is initialized to zero. • Perform Grid sector test for every point in the grid: • If C1=True and C2=True, increase GST score value by one. θ1,2 θ1,1 R L1 g: (xg,yg)
SeRLoc – Step 4: ROI computation Sensor Search Area 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 … 1 1 1 2 3 3 3 34 4 43 3 3 3 3 3 1 1 2 2 2 34 4 4 4 4 4 43 3 2 2 1 1 2 24 4 4 4 4 4 4 4 44 3 3 2 2 2 2 2 34 4 4 4 4 4 4 43 2 2 2 2 2 3 3 3 34 4 4 4 4 43 3 2 2 2 2 2 2 3 3 3 34 4 4 43 3 2 2 2 2 1 2 2 2 3 3 3 34 43 2 2 2 3 4 3 2 2 2 3 3 3 3 3 2 2 2 2 1 1 1 1 1 … 0 0 0 0 1 1 1 1 0 0 0 0 0 0 0 0 0 ROI • Majority vote: Points with highest score define the ROI. • Error is introduced due to discrete computation. • We trade Accuracy vs. Complexity.
SeRLoc - Security mechanisms • Message Encryption : Messages are encrypted by a shared symmetric key. • Locator ID authentication : • A locator Lihas a unique passwordPWi. • PWi is blinded with a one-way hash function H : {0,1}{0,1} • A hash chain is generated by iterative application of H • h0, h1 ,…, hn, h0=PWi, h1=H(PWi) • Preload every sensor with the values Hn(PWi) of all locators. • A sensor can authenticate a locator within its range (one-hop authentication). • Locator beacon format: • Li : { (Xi, Yi) || (θi,1, θi,2) || (Hn-j(PWi)), j } Ki ID authentication Locator’s coordinates Slopes of the sector Shared symmetric key Hash index
SeRLoc – Wormhole Attack sensor Locator Attacker • THREAT MODEL • An attacker records beacons in region A • Tunnels beacons via wormhole link at region B • Replays the beacons. • Sensor “hears” locators LHs: {L1 - L8}. L4 L3 L1 Region B L2 Wormhole link Region A L7 L8 • No compromise of integrity, authenticity of the communication or crypto protocols. • Direct wormhole link allows timely replay of beacons. L5 L6
Wormhole attack detection (1) Accept only single message per locator sensor Locator Attacker obstacle • Multiple messages from the same locator are heard due to: • Multi-path effects • Imperfect sectorization • Replay attack Ac Wormhole link
Wormhole attack detection (2) Communication range constraint property. sensor Locator Attacker Locators heard by a sensor cannot be more than 2R apart. R: locator-to-sensor communication range. 2R Ai Aj Li Lj Wormhole link
Wormhole attack detection (3) Probability of wormhole detection sensor Locator Attacker The events of a locator being within any region Ai, Aj, Ac are inde-pendent (Regions do not overlap). 2R Ai Aj Ac Wormhole link
Wormhole attack detection (4) Probability of wormhole detection L
Resolution of location ambiguity A sensor needs to distinguish the valid set of locators from the replayed ones. • Attach to Closest Locator Algorithm (ACLA) • Sensor s : Broadcasts a nonce η. • Locator Li : Reply with a beacon + the nonce η, encrypted with the pair-wise key Ks,Li. • Sensor s : Identify the locator Lc with the first authentic reply. • Sensor s : A locator Li belongs to the valid set, only if it overlaps with the sector defined by the beacon of Lc. L4 L3 L1 Region B L2 L8 sensor Locator L5 Attacker Region A Wormhole link L7 L6
SeRLoc – Sybil Attack • THREAT MODEL • The attacker has compromised theglobally shared key K0. • The attacker can impersonate any locator not directly heard to the sensor under attack. L3 L2 L1 • Attacker can fabricate arbitrary number of beacons. • Attacker succeeds in displacing the sensor if more than |LHs| locators can be impersonated. L4 Impersonator
Sybil Attack detection – Defense (1) • In a successfulSybil attack, a sensor hears at least twice the number of locators. • Define a threshold Lmax as the maximum allowable number of locators heard, such that: Probability of false alarm Probability of Sybil attack detection • Design goal: Given security requirement δ, minimize false alarm probability ε.
Sybil Attack detection – Defense (2) • Random locator deployment we can derive the Lmax value: Detection Probability False Alarm Probability Lmax Lmax/2
SeRLoc – Compromised entities • THREAT MODEL • Attacker possess • Knowledge of all cryptographic quantities • Full control over the behavior of the entity. • Compromise of a sensor reveals the globally shared key K0. • Compromise of alocator reveals K0, master key KLi, and the hash chain of the locator. • The adversary can launch a Sybil attack from a location closer to the sensor under attack than any locator Compromise the ACLA algorithm Displace any sensor.
Enhanced location determination algorithm 1. The sensor transmits a nonce with his ID and set LHs 2. Locators within r from the sensor relay the nonce. L1 L7 3. Locators within R reply with a beacon + the nonce. L2 4. Sensor accepts first Lmax replies. L9 L6 L3 L5 • Attacker has to compromise more than Lmax/2 locators, AND • Replay before authentic replies arrive at s. L8 L4
Performance Evaluation • Simulation setup: • Random locator distribution with density ρL. • Random sensor distribution with density ρs. • Performance evaluation metric: • : Sensor location estimation. • si : Sensor actual location. • r : Sensor-to-sensor communication range. • |S| : Number of sensors.
Localization Error vs. LH • SeRLoc outperforms current schemes for any LH value • Satisfactory performance even for very small LH.
Localization error vs. antenna sectors • Higher number of directional antennas (narrower sectors) reduces LH. • More expensive hardware at each locator.
Localization error vs. sector error • Sector error: Fraction of sectors falsely estimated at each sensor. • SeRLoc is resilient against sector error due to the majority vote scheme. • Even when 50% of the sectors are falsely estimated, LE < r for LH 6.
Localization error vs. GPS error • GPS Error (GPSE): Error in the locators’ coordinates. • For GPSE = 1.8r and LH = 3, LE = 1.1r. • DV-hop/Amorphous: LE = 1.1r requires LH = 5 with no GPSE. • APIT: LE = 1.1r requires LH = 12 with no GPSE.
High Resolution localization - HiRLoc Yes, if we can further segment the ROI Can we increase the accuracy of the location estimate, while preserving the resilience against attacks? Is it feasible? • How do we achieve ROI segmentation ? • Expensive solution • Increase the locator density More sectors will intersect. • Decrease the sector size Smaller ROI. • Inexpensive solution • Variation of the antenna orientation. • Variation of the communication range.
Variation of the antenna orientation Improved ROI α α • Rotate the antenna system by some angle α. • Broadcast beacons with the new coordinates. • Compute ROI by intersection of all sectors Si(j) over time, j : transmission round • Sector dependence: • Si(j) = S(θi(j), j) s L1 L2 Initial ROI estimate
Antenna rotation equivalence Rotation L1 6-sector antenna • Antenna rotation emulates an antenna system with more directional antennas (narrower sectors). L1 3-sector antenna
Variation of the communication range Reduction in communication range Improved ROI • Reduce the communication range Ri(j) via power control. • Broadcast beacons with the new Ri(j). • Compute the intersection of all sectors Si(j). • Sector dependence: • Si(j) = S(Ri(j), j) s L1 L2 Initial ROI estimate
Intersecting multiple sectors L1 S1(k) • For same angle transmissions θi(j), j=1..k, but different range Ri(j), pick sector with smaller range Rmin=minRi(j). Rmax Rmin S1(2) L1 S1(k) S1(1)
Computation of the ROI • Option 1: • Collect Si(j) info j =1..m . • Intersect all Si(j) j =1..m to determine the ROI. • Option 2: • Collect Si(j) for all Li in LHs. • At each round j, compute ROIt ROI(j) = ROI(j-1) ROIt.
Conclusions • Presented a robust range-free localization: SeRLoc • SeRLoc • Robustly computes the location in the presence of attacks • No neighboring sensor information required. • Uses light-weight securitymechanisms (hashing, symmetric crypto). • HiRLoc: Achieves high resolution localization with no additional hardware resources, will preserving robustness against threats in WSN. • This work is only the first step. • More research is needed!
HiRLoc – Wormhole attack (1) Case 1: Antenna Orientation Variation • Transmissions in every round are done with Rmax. • Sensor hear LHs={L1...L8} at every antenna rotation. • Sensor can determine valid LHs={L1..L4} as in SeRLoc. • Use only valid LHs, in ROI computation. L4 L3 L1 Region B L2 Region A L7 L8 Wormhole link L5 • Wormhole attack for case 1 • HiRLoc security SeRLoc security L6
HiRLoc – Wormhole attack (2) ROI(1) ROI(j) Case 2: Communication Range Variation L4 • THREAT MODEL • Locators in valid LHs can get out of range, once Ri(j) reduced. • Attacker can replay transmissions from valid LHs not heard at the sensor. L3 L1 L2 Wormhole link • DEFENSE • Sensor determines valid LHs based on transmissions with Rmax. • Determine • Intersect any future ROI(j), j = 2..m with ROI(1).
HiRLoc – Sybil attack (1) Case 1: Antenna Orientation Variation • Locators transmit with Rmax at every antenna rotation. • Attacker cannot impersonate locators directly heard to the sensor. • Sybil detection as in SeRLoc |LHs| Lmax. • If under attack, execute ACLA. L3 L2 L1 • Sybil attack for case 1 • HiRLoc security SeRLoc security L4 Impersonator
HiRLoc – Sybil attack (2) Case 2: Communication Range Variation • THREAT • Locators in LHs when Rmax, that get out of range due to reduced Ri(j), can be impersonated. • Limiting |LHs| Lmax. does not defend against the Sybil attack. • DEFENSE • Compute the ROI(1) based on Rmax beacons. • Intersect future ROI(1) estimation with ROI(1). L4 L3 The sensor cannot be displaced outside ROI(1) HiRLoc ROI SeRLoc ROI L1 L2 Impersonator
Performance Evaluation (1) SeRLoc vs. HiRLoc – Antenna orientation variation • 3-sector antennas used, beamwidth 120o. • Each antenna rotation is by 40o. • LH % of ROI improvement . • After 3 antenna rotations. • ROI(3)<0.46 ROI(1)
Performance Evaluation (2) SeRLoc vs. HiRLoc – Antenna orientation variation • LH = 15. • Each antenna rotation is by 2π/3M, M = # of sectors • Sectors % of ROI improvement . • After 3 antenna rotations. • ROI(3)<0.46 ROI(1)
Performance Evaluation (3) SeRLoc vs. HiRLoc – Communication range variation • 3-sector antennas used, beamwidth 120o. • Each antenna rotation is by 40o. • LH % of ROI improvement . • For small LH, sectors get out of range with range reduction. • After 3 antenna rotations • ROI(3) < 0.58ROI(1)
Performance Evaluation (4) SeRLoc vs. HiRLoc – Communication range variation • LH = 15. • Each antenna rotation is by 2π/3M, M = # of sectors • Sectors % of ROI improvement . • After 3 antenna rotations. • ROI(3)<0.58 ROI(1)
Performance Summary • HiRLoc leads to significant improvement over SerLoc even with a small number of antenna rotations and/or communication range variations. • HiRLoc is more effective for small LH and wide antenna sectors, when SeRLoc does not give a high resolution location estimation. • HiRLoc achieves high resolution localization with no additional resources.