1
Reputation Based Tracking in Sensor Networks Tanya Roosta, Marci Meingast, Shankar Sastry TRUST,W ashington,D .C .M eeting January 9–10,2006 M otivation forR eputation B ased Tracking •R eputation system s have proven usefulas a self- policing m echanism to address the threatof com prom ised entities •R eputation System s have been used in online transaction system s,such as Ebay rating system •CO R E and C O N FID AN T are tw o protocols in w ireless ad hoc netw orks thatuse reputation system s fordata transm ission •R eputation system fram ew ork can be applied to sensornetw ork applications,such as m ulti-object tracking TRUST,W ashington,D .C .M eeting January 9–10,2006 D ata Fusion (cont.) •The node w ith the highestsignalstrength reading declares itselfthe leaderin its neighborhood •The leaderlocally fuses its neighbors’observations using the follow ing equation: •Each leaderthen sends the fused observation from its neighborhood back to the super-node closestto itself TRUST,W ashington,D .C .M eeting January 9–10,2006 H ierarchicalM ulti-objectTracking •Assum ptions: •There are regularsensornodes scattered throughoutthe deploym entarea •There are a few super-nodes thatare com putationally m ore pow erfulthan regular nodes •Both types ofnodes are static •The num berofobjects m oving in the netw ork is notknow n apriory TRUST,W ashington,D .C .M eeting January 9–10,2006 H ierarchicalM ulti-objectTracking •The algorithm has tw o phases: •D ata Fusion (Local) •D ata Association (global) •D ata Fusion com ponent: •Takes care ofaggregating the sensor observations •The sensorobservation is m odeled as: TRUST,W ashington,D .C .M eeting January 9–10,2006 D ata A ssociation Phase •O nce the super-node has received the fused observations from each localarea in the region it governs,data association needs to be perform ed •This is accom plished by applying M arkov C hain M onte C arlo to the fused observations and linking the data points togetherto form tracks •Black circles are the fused observations •Figure (b)show s the data and track association TRUST,W ashington,D .C .M eeting January 9–10,2006 A ttack M odel •Sensornodes are usually deployed in hostile environm ents and are unattended •They can be physically captured and com promised •The adversary can use the com prom ised nodes to injectfaulty data into the netw ork to throw offthe tracking algorithm •The faulty readings can affectboth the num berof form ed tracks and the accuracy ofeach track •W e propose using a reputation system atthe data fusion portion ofthe tracking to take care of m alicious nodes w ho do notclaim to be the leader TRUST,W ashington,D .C .M eeting January 9–10,2006 R eputation S ystem (cont.) •Each node has instantaneous positive and negative reputations thatgets updated w hen itsends in an observation: •These values are used to update to overall positive and negative ratings: TRUST,W ashington,D .C .M eeting January 9–10,2006 R eputation S ystem •The reputation ofeach node is a continuous value in the interval[0,1] •Every node has a reputation table forits neighbors w hich is initialized to 0.5 •Every tim e a node becom es the leaderit updates the reputations ofits neighbors that send him an observation •The leaderupdates the reputations by running a R AN SAC -like procedure on the observations and finding the m edian ofthe calculated values TRUST,W ashington,D .C .M eeting January 9–10,2006 Sim ulation R esults •Estim ated objecttrack com pared to ground truth w ithoutthe reputation system •Estim ated objecttrack com pared to ground truth w ith the reputation system

Reputation Based Tracking in Sensor Networks Tanya Roosta, Marci Meingast, Shankar Sastry

  • Upload
    ronny

  • View
    39

  • Download
    1

Embed Size (px)

DESCRIPTION

Reputation Based Tracking in Sensor Networks Tanya Roosta, Marci Meingast, Shankar Sastry. - PowerPoint PPT Presentation

Citation preview

Page 1: Reputation Based Tracking in Sensor Networks Tanya Roosta, Marci Meingast, Shankar Sastry

Reputation Based Tracking in Sensor Networks

Tanya Roosta, Marci Meingast, Shankar Sastry

TRUST, Washington, D.C. Meeting January 9–10, 2006

Motivation for Reputation Based Tracking

•Reputation systems have proven useful as a self-policing mechanism to address the threat of compromised entities

•Reputation Systems have been used in online transaction systems, such as Ebay rating system

•CORE and CONFIDANT are two protocols in wireless ad hoc networks that use reputation systems for data transmission

•Reputation system framework can be applied to sensor network applications, such as multi-object tracking

TRUST, Washington, D.C. Meeting January 9–10, 2006

Data Fusion (cont.)

•The node with the highest signal strength reading declares itself the leader in its neighborhood

•The leader locally fuses its neighbors’ observations using the following equation:

•Each leader then sends the fused observation from its neighborhood back to the super-node closest to itself

TRUST, Washington, D.C. Meeting January 9–10, 2006

Hierarchical Multi-object Tracking

•Assumptions:

•There are regular sensor nodes scattered throughout the deployment area

•There are a few super-nodes that are computationally more powerful than regular nodes

•Both types of nodes are static

•The number of objects moving in the network is not known apriory

TRUST, Washington, D.C. Meeting January 9–10, 2006

Hierarchical Multi-object Tracking

•The algorithm has two phases:

•Data Fusion (Local)

•Data Association (global)

•Data Fusion component:

•Takes care of aggregating the sensor observations

•The sensor observation is modeled as:

TRUST, Washington, D.C. Meeting January 9–10, 2006

Data Association Phase

•Once the super-node has received the fused observations from each local area in the region it governs, data association needs to be performed

•This is accomplished by applying Markov Chain Monte Carlo to the fused observations and linking the data points together to form tracks

•Black circles are the fused observations

•Figure (b) shows the data and track association

TRUST, Washington, D.C. Meeting January 9–10, 2006

Attack Model

•Sensor nodes are usually deployed in hostile environments and are unattended

•They can be physically captured and compromised

•The adversary can use the compromised nodes to inject faulty data into the network to throw off the tracking algorithm

•The faulty readings can affect both the number of formed tracks and the accuracy of each track

•We propose using a reputation system at the data fusion portion of the tracking to take care of malicious nodes who do not claim to be the leader

TRUST, Washington, D.C. Meeting January 9–10, 2006

Reputation System (cont.)

•Each node has instantaneous positive and negative reputations that gets updated when it sends in an observation:

•These values are used to update to overall positive and negative ratings:

TRUST, Washington, D.C. Meeting January 9–10, 2006

Reputation System

•The reputation of each node is a continuous value in the interval [0,1]

•Every node has a reputation table for its neighbors which is initialized to 0.5

•Every time a node becomes the leader it updates the reputations of its neighbors that send him an observation

•The leader updates the reputations by running a RANSAC-like procedure on the observations and finding the median of the calculated values

TRUST, Washington, D.C. Meeting January 9–10, 2006

Simulation Results

•Estimated object track compared to ground truth without the reputation system

•Estimated object track compared to ground truth with the reputation system