Computer Science and Engineering

Download Report

Transcript Computer Science and Engineering

Research in Networking
Dong Xuan
Dept. of Computer Science and Engineering
The Ohio State University
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
1
Outline
 Group Research Overview
 Performance - Optimal Deployment in
Wireless Sensor Networks
 Security - Flow Marking in the Internet
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
2
Group Members
 Student members: Xiaole Bai, Adam
Champion, Sriram Chellappan (to be
assistant professor in Univ. of Missouri at
Rolla), Boxuan Gu, Wenjun Gu, Thang Le,
Zhimin Yang
 Former members: Sandeep Reddy (M.S.,
2004, Microsoft), Lamonte Glove (M.S.,
2004, Avaya) and Kurt Schosek (M.S.,
2005), Xun Wang (Ph.D, 2007, CISCO)
 Faculty member: Dong Xuan
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
3
Research Interests
 Real-time computing and communications
 Deterministic and statistic QoS guarantees [ICDCS00,
INFOCOM01, RTSS01, ToN04]
 Voice over IP [RTAS02, TPDS05]
 Performance
 Topology control [MOBIHOC06, INFOCOM08]
 Mobility control [TPDS06, TMC07]
 Security
 Internet security
• Overlay security [ICDCS04, TPDS06]
• Anonymous communications [IPDPS05, SP07,
INFOCOM08_mini]
• Worm/Malware defense[SECURECOM06, 07, ACSAC06]

Wireless network security [IWQoS06, TPDS06]
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
4
Research Grants
 ARO: “Defending against Physical Attacks in
Wireless Sensor Networks”, (PI, 2007-2010)
 NSF: “Efficient Resource Over-Provisioning for
Network Systems and Services”, (PI, CAREER
award, 2005-2010)
 NSF: “Overlay Network Support to Remote
Visualization on Time-Varying Data”, (PI, 20032006)
 SBC/Ameritech: “Providing Statistic Real-time
Guarantees to Multimedia Teleconferences”, (PI,
2002-2003)
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
5
Performance: Optimal Deployment Patterns in
WSNs
 Xiaole Bai, Santosh Kumar, Dong Xuan, Ziqiu Yun and
Ten H. Lai, Deploying Wireless Sensors to Achieve Both
Coverage and Connectivity, in ACM International
Symposium on Mobile Ad Hoc Networking and
Computing (MobiHoc), 2006
 Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten H. Lai and Weijia
Jia, Deploying Four-Connectivity And Full-Coverage
Wireless Sensor Networks, in IEEE International
Conference on Computer Communications (INFOCOM),
2008
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
6
Problem Definition
 What is the optimal number of sensors needed to
achieve p-coverage and q-connectivity in WSNs?
 An important problem in WSNs:




Connectivity is for information transmission and coverage is for
information collection
Avoid ad hoc deployment to save cost
To help design topology control algorithms and protocols
other practical benefits
Ohio
State
University
TheThe
Ohio
State
University
Dong Xuan: CSE885 on 11/07/07
7
p-Coverage and q-Connectivity
 p-coverage: every point in the plane is
covered by at least p different sensors
 q-connectivity: there are at least q
disjoint paths between any two sensors
Node C
rc
rs
Node A
The Ohio State University
Node D
For example, nodes A, B, C and
D are two connected
Node B
Dong Xuan: CSE885 on 11/07/07
8
Relationship between rs and rc
rc  3rs
In reality, there are various values of rc / rs
 Most existing work is focused on



The communication range of the Extreme Scale Mote
(XSM) platform is 30 m and the sensing range of the
acoustics sensor is 55 m
Sometimes even when it is claimed for a sensor to
have rc  3rs , it may not hold in practice because
the reliable communication range is often 60-80% of
the claimed value
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
9
A Big Picture
Research on Asymptotically Optimal Number of Nodes
MobiHoc06
INFOCOM
08
[1] R. Kershner. The number of circles covering a set. American Journal
of Mathematics, 61:665–671, 1939, reproved by Zhang and Hou recently.
[2] R. Iyengar, K. Kar, and S. Banerjee. Low-coordination topologies for
redundancy in sensor networks. MobiHoc2005.
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
10
Known Results: Triangle Pattern [1]
rc  3rs
d2
d1
d1  3rs
d2 
3
rs
2
Notice it actually achieves 1-coverage and 6-connectivity
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
11
Our Optimal Pattern for 1-Connectivity
 Place enough disks
between the strips to
connect them


See the paper for a
precise expression
The number is disks
needed is negligible
asymptotically
Note : it may be not the
only possible deployment
pattern
A
d2
d1

d1  min rc , 3rs
The Ohio State University

d 2  rs  r 
2
s
2
4
Dong Xuan: CSE885 on 11/07/07
12
Our Optimal Pattern for 2-Connectivity
 Connect the neighboring
horizontal strips at its
two ends
A
Note : it may be not the
only possible deployment
pattern
d2
d1

d1  min rc , 3rs
The Ohio State University

d 2  rs  r 
2
s
2
4
Dong Xuan: CSE885 on 11/07/07
13
Our Optimal Pattern for 4-Connectivity
rc / rs  2
A
Square pattern
Note : it may be not the
only possible deployment
pattern
d2
d1
The Ohio State University
d1  d 2  rc
Dong Xuan: CSE885 on 11/07/07
14
Our Optimal Pattern for 4-Connectivity
2  rc / rs
A
Diamond pattern
Note : it may be not the
only possible deployment
pattern
d2
d1

d1  min rc , 3rs
The Ohio State University

d 2  d1sin( 2 arcsin rc / 2rs )
Dong Xuan: CSE885 on 11/07/07
15
Workflow of optimality proof (1)
 Step 1

We lay out the theoretical foundation of the optimality proof:
for any collection of the Voronoi polygons forming a
tessellation, the average edge number of them is not larger
than six asymptotically.
• It is built on the well known Euler formula.
 Step 2

We show that any collection of Voronoi polygons generated in
any deployment can be transformed into the same number of
Voronoi polygons generated in a regular deployment while full
coverage and desired connectivity can still be achieved.
• The proof is based on the technique of pattern transformation
and the theoretical foundation obtained in Step 1.
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
16
Workflow of optimality proof (2)
 Step 3

We prove the number of Voronoi polygons from any
regular deployment has a lower bound.
 Step 4

We show that the number of Voronoi polygons used
in the patterns we proposed is exactly the lower
bound value. Hence the patterns we proposed are
the optimal in all regular deployment patterns.
• Based on the conclusion obtained in Step 2, the patterns
we proposed are also the optimal among all the
deployment patterns.
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
17
Future Work
Research on Asymptotically Optimal Number of Nodes
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
18
Security: Flow Marking Techniques in
the Internet Security
 Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan and Wei
Zhao, DSSS-Based Flow Marking Technique for
Invisible Traceback, in Proc. of IEEE Symposium on
Security and Privacy (Oakland), May 2007, pp18-32
 Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan and Wei
Zhao, iLOC: An invisible LOCalization Attack to
Internet Threat Monitoring System, accepted to
appear in the mini-conference conjunction with IEEE
International Conference on Computer Communications
(INFOCOM), April 2008.
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
19
Invisible Traceback in the Internet
 Internet has brought convenience to our
everyday lives
 However, it has also become a breeding
ground for a variety of crimes
 Network forensics has become part of
legal surveillance
 We study flow marking for a fundamental
network-based forensic technique,
traceback
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
20
Problem Definition
Sender
Network
Receiver
 Suspect Sender is sending traffic through
encrypted and anonymous channel, how can
Investigators trace who is the receiver?
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
21
Traffic Confirmation by Flow Marking
 Investigators want to know if Sender and
Receiver are communicating
Sender
Anonymous
Channel
Interferer
Investigator
HQ
Receiver
Sniffer
The investigators know that Sender communicates with Receiver
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
22
Issues in Flow Marking
 Traceback accuracy

Periodic pattern ok?
 Traceback secrecy
 Traceback without conscience of suspects
DSSS-based technique for accuracy
and secrecy in traceback!
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
23
Basic Direct Sequence Spread Spectrum (DSSS)
 A pseudo-noise code is used for spreading
a signal and despreading the spread signal
Interferer
Original
Signal
dt
Sniffer
rb
tb
ct
PN Code
Spreading
The Ohio State University
noisy
channel
dr
Recovered
Signal
cr
PN Code
Despreading
Dong Xuan: CSE885 on 11/07/07
24
Example – Spreading and Despreading
 Signal dt: 1 -1
 DSSS code ct:
1 1 1 -1 1 -1 -1
 Spread signal tb=dt.ct=1 1 1 -1 1 -1 -1 -1 -1 -1 +1 -1 1 1
 One symbol is “represented” by 7 chips
 PN code is random and not visible in time and frequency domains
 Despreading is the reverse process of spreading
+1
dt
t
-1
tb
Tc (chip)
t
+1
ct
t
-1
NcTc
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
25
Mark Generation by Interferer
1.
Choose a random signal
Original Signal dt
ct
2. Obtain the spread signal
PN
Code
tb
3. Modulate a target traffic
flow by appropriate
interference



Chip +1: without interference
Chip -1: with interference
Low interference favors
traceback secrecy
Flow
Modulator
tx
Internet
rx = spread signal + noise
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
26
Mark Recognition by Sniffer
1.
2.
3.
4.
5.
Sample received traffic to
derive traffic rate time
series
Use high-pass filter to
remove direct component by
Fast Fourier Transform (FFT)
Despreading by local DSSS
code
Use low-pass filter to remove
high-frequency noise
Make decision
 Recovered signal == Original
signal?
The Ohio State University
rx = spread signal + noise
High-pass
Filter
rx’
cr
rb
PN
Code
Low-pass
Filter
Decision
Rule
Dong Xuan: CSE885 on 11/07/07
27
Invisible Location Attack to Internet
Monitoring Systems
 Widespread attackers attempt to evade the
distributed monitoring/detection systems
 We design invisible LOCalization (iLOC) attack
which can locate the detection monitors accurately
and invisibly. Then the widespread attacks can
evade these located monitors.
 Effectiveness of iLOC attack
 We implement iLOC attack, carry out experiments
and analyze the effectiveness of iLOC attack.
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
28
Internet Threat Monitoring Systems
Global traffic monitoring based Internet Threat Monitor Systems
(ITM):
Data center
- Distributed monitors
- Data center
Attacker
MONITORS’ LOG
UPDATE
Network B
Network A
Attacker
monitors
Network C
Internet
monitors
 A vulnerability: location privacy of monitors (ITM only monitors a
small part of whole IP address space.)
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
29
invisible LOCalization Attack
Basic idea: Verify attack traffic in traffic report, verify existence of monitors.
Embed an attack mark in the attack traffic, which can be recognized by the attacker.
Two Stages:
The Ohio State University
- Attack traffic generating - Attack traffic decoding
Dong Xuan: CSE885 on 11/07/07
30
Final Remarks
 Group research: theorem and implementation
 Research on Performance
 Optimal deployment pattern in WSNs
 Limited mobility WSNs
 Research Security
 Flow marking in internet security
 Worm detection
 Wireless security
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
31
Thank you !
Questions?
The Ohio State University
Dong Xuan: CSE885 on 11/07/07
32