Attack Detection in Wireless Localization Yingying (Jennifer) Chen - - PowerPoint PPT Presentation

attack detection in wireless localization
SMART_READER_LITE
LIVE PREVIEW

Attack Detection in Wireless Localization Yingying (Jennifer) Chen - - PowerPoint PPT Presentation

Attack Detection in Wireless Localization Yingying (Jennifer) Chen (Jennifer) Chen Yingying Dept. of Computer Science, Rutgers University Dept. of Computer Science, Rutgers University Wireless Information Network Laboratory (WINLAB) Wireless


slide-1
SLIDE 1

Attack Detection in Wireless Localization

Yingying Yingying (Jennifer) Chen (Jennifer) Chen

  • Dept. of Computer Science, Rutgers University
  • Dept. of Computer Science, Rutgers University

Wireless Information Network Laboratory (WINLAB) Wireless Information Network Laboratory (WINLAB) Alcatel Alcatel-

  • Lucent Technologies

Lucent Technologies

Joint work with Prof. Wade Trappe and Prof. Richard P. Martin Joint work with Prof. Wade Trappe and Prof. Richard P. Martin WOCC 2007 WOCC 2007

slide-2
SLIDE 2

I ntroduction

What is localization? What is localization?

Simply to find the position of a wireless device or a sensor Simply to find the position of a wireless device or a sensor node. node.

Why wireless localization? Why wireless localization?

Public Public Healthcare monitoring Healthcare monitoring Wildlife animal habitat tracking Wildlife animal habitat tracking Emergency rescue/recovery Emergency rescue/recovery Enterprise Enterprise Location Location-

  • based access control

based access control Location Location-

  • aware content delivery

aware content delivery Asset tracking Asset tracking

slide-3
SLIDE 3

Motivation: Secure Localization

Attention is on Received Signal Strength (RSS) Attention is on Received Signal Strength (RSS)-

  • based

based localization techniques localization techniques

Reuse Reuse the existing communication infrastructure the existing communication infrastructure Tremendous cost saving Tremendous cost saving 802.11, 802.15.4, and Bluetooth support the technology 802.11, 802.15.4, and Bluetooth support the technology Reasonable accuracy Reasonable accuracy (median error 1 ~ 5 m) (median error 1 ~ 5 m)

The localization infrastructure can become the target of The localization infrastructure can become the target of malicious attacks malicious attacks

Location Location-

  • based services becoming more prevalent

based services becoming more prevalent Non Non-

  • conventional security threats

conventional security threats (non (non-

  • cryptographic attacks)

cryptographic attacks)

slide-4
SLIDE 4

Outline

Introduction and motivation Introduction and motivation Background Background A generalized attack detection model A generalized attack detection model Common features in RSS Common features in RSS-

  • based methods

based methods Test statistic in Test statistic in multilateration multilateration methods methods Experimental evaluation Experimental evaluation Conclusion Conclusion Related work Related work

slide-5
SLIDE 5

[-35,-68,-56]

RSS Reading (x?,y?)

[(x,y),s1,s2,s3] [(x,y),s1,s2,s3]

(x2,y2) (x1,y1) (x3,y3) time t

Background

Transmit packets at Transmit packets at unknown unknown location location Landmarks Landmarks Receive packets Receive packets Or the other way around Or the other way around Modality Modality

Received Signal Strength (RSS) Received Signal Strength (RSS) Time Time-

  • Of

Of-

  • Arrival (TOA)

Arrival (TOA) Angle Angle-

  • Of

Of-

  • Arrival (AOA)

Arrival (AOA)

Principle Principle to compute position to compute position

Lateration Lateration Angulation Angulation Scene (fingerprint) matching Scene (fingerprint) matching Training data/radio map Training data/radio map Probabilistic Probabilistic

Return location estimation Return location estimation

angle θ θ

slide-6
SLIDE 6

Generalized Attack Detection Model

Formulate as statistical significance testing Formulate as statistical significance testing

Null hypothesis: Null hypothesis:

H H0

0: normal (no attack)

: normal (no attack)

Test statistic Test statistic T T

Acceptance region Acceptance region

If , no attack If , no attack If , declare an attack is present If , declare an attack is present

Significance testing with Significance testing with significance level significance level α

α

slide-7
SLIDE 7

Effectiveness of Attack Detection

Cumulative Distribution Function (CDF) of the Cumulative Distribution Function (CDF) of the test statistic test statistic T T Detection Rate (DR) Detection Rate (DR)

Under attack, Under attack, DR = P DR = Pd

d

Under normal, Under normal, DR = DR = P Pfa

fa

Receiving Operating Characteristic (ROC) curve Receiving Operating Characteristic (ROC) curve

Plot of attack detection accuracy against the false Plot of attack detection accuracy against the false positive rate positive rate Measure the Measure the tradeoff tradeoff between the false between the false-

  • positive and

positive and correct detections correct detections

slide-8
SLIDE 8

Choosing a Test Statistic

Signal Signal-

  • strength based algorithms

strength based algorithms – – range range-

  • based and

based and scene matching scene matching

Common feature: Common feature: distance in signal space distance in signal space Area based Probability (ABP) Area based Probability (ABP)

Bayes Bayes’ ’ rule to compute the likelihood of an RSS matching a rule to compute the likelihood of an RSS matching a fingerprint for each area fingerprint for each area

Bayesian Networks (BN) Bayesian Networks (BN)

Use Bayesian Graphical Model to predict the sampling distributio Use Bayesian Graphical Model to predict the sampling distribution n

  • f the possible location
  • f the possible location

Multilateration Multilateration methods methods – – single and multi single and multi-

  • hop range

hop range-

  • based

based

Non Non-

  • linear Least Squares (NLS)

linear Least Squares (NLS) Linear Least Squares (LLS) Linear Least Squares (LLS)

slide-9
SLIDE 9

Test Statistic: Distance in Signal Space

Key advantage Key advantage -

  • attack detection before localization

attack detection before localization

Physical Space (D) Signal Space (R) F G

distance error perturbation distance distance error under attack

DS

Localization: true location estimation under normal estimation under attack

slide-10
SLIDE 10

Finding Thresholds

D DS

S as a test statistic

as a test statistic If If D DS

S ﹥τ

﹥τ for a given for a given α

α, RSS readings under attack

, RSS readings under attack Choosing a threshold Choosing a threshold ( (τ τ): ): empirical methodology vs. statistical modeling empirical methodology vs. statistical modeling

slide-11
SLIDE 11

Test Statistic for Multilateration Methods

  • Using Least Squares

Ranging step: Ranging step:

Distance estimation between unknown node and Distance estimation between unknown node and landmarks landmarks Various methods available: RSS, TOA, hop count Various methods available: RSS, TOA, hop count

Lateration Lateration step: step:

Traditional: Non Traditional: Non-

  • linear Least squares (NLS)

linear Least squares (NLS) Linear Least squares (LLS) Linear Least squares (LLS)

slide-12
SLIDE 12

Test Statistic: The Residuals

Localization with LLS Localization with LLS

Linear regression: Linear regression: Location estimation: Location estimation:

Define the residuals Define the residuals Follow a Gaussian distribution: ~ Follow a Gaussian distribution: ~N( N(μ μ, , Σ Σ) ) Choose the residuals as the test statistic Choose the residuals as the test statistic T T for for attack detection attack detection

slide-13
SLIDE 13

The Detection Scheme

Perform after the localization phase Perform after the localization phase An observed value: An observed value: Model the residuals as multivariate Gaussian Model the residuals as multivariate Gaussian random variables: random variables: Acceptance Region: Acceptance Region: Under attack, if Under attack, if (significance level)

(significance level)

slide-14
SLIDE 14

Experimental Setup:

(Two buildings: CoRE Building and I ndustrial Lab)

  • Floor plan:

Floor plan: 200ft x 80ft (16000 ft 200ft x 80ft (16000 ft2

2)

)

  • 802.11 (

802.11 (WiFi WiFi) Network ) Network

  • 802.15.4 (

802.15.4 (ZigBee ZigBee) Network ) Network

  • Floor plan:

Floor plan: 225ft x 144ft (32400 ft 225ft x 144ft (32400 ft2

2)

)

  • 802.11 (

802.11 (WiFi WiFi) Network ) Network

slide-15
SLIDE 15

Experimental Evaluation

  • Using Signal Strength Attacks

Attenuate or amplify RSS Attenuate or amplify RSS Materials Materials – – easy to access easy to access Attacks Attacks – – simple to simple to perform with low cost perform with low cost

Attack the wireless node Attack the wireless node Compromise the landmarks Compromise the landmarks

Linear relationship Linear relationship -

  • linear

linear attack model attack model

slide-16
SLIDE 16

Comparison

Statistical Significance Testing: generic and specific test statistics

Performance: similar detection rates!

slide-17
SLIDE 17

Receiving Operating Characteristic (ROC)

  • Using LLS Residuals

A closer look: A closer look: CoRE CoRE, , 802.11 network, 802.11 network, α = 0.01 Impact of small attacks: ~ 1.55 ft/dB

slide-18
SLIDE 18

Summary

Generic Generic approach approach

Across algorithms, networks, and buildings Across algorithms, networks, and buildings

Effectiveness Effectiveness of our attack detection schemes

  • f our attack detection schemes

High detection rates, over 95% High detection rates, over 95% (attacks > 15dB)

(attacks > 15dB)

Low false positive rates, below 5% Low false positive rates, below 5%

Different Different localization systems have localization systems have similar similar attack attack detection capabilities detection capabilities

slide-19
SLIDE 19

Related Work

Cryptographic threats Cryptographic threats

Use traditional security services Use traditional security services -

  • authentication [

authentication [Bohge Bohge WiSe WiSe 2003, Wu IPDPS 2005, Zhu MWN 2003] 2003, Wu IPDPS 2005, Zhu MWN 2003]

Non Non-

  • cryptographic threats

cryptographic threats

Distance bounding protocols [Brands 1994, Distance bounding protocols [Brands 1994, Sastry Sastry 2003] 2003] Verifiable Verifiable multilateration multilateration mechanisms [ mechanisms [Capkun Capkun Infocom Infocom 2005] 2005] Hidden and mobile base stations [ Hidden and mobile base stations [Capkun Capkun Infocom Infocom 2006] 2006] Directional antennas and distance bounding [ Directional antennas and distance bounding [Lazos Lazos IPSN 2005] IPSN 2005] Eliminate attack efforts using data redundancy or neighbor Eliminate attack efforts using data redundancy or neighbor information [Li IPSN 2005, Liu IPSN 2005, Liu ICDCS 2005, Du information [Li IPSN 2005, Liu IPSN 2005, Liu ICDCS 2005, Du IPDPS 2005] IPDPS 2005]

slide-20
SLIDE 20

Thank you Thank you & & Questions Questions