Upload
jam
View
37
Download
0
Embed Size (px)
DESCRIPTION
Research Overview. Sencun Zhu Asst. Prof. CSE/IST, PSU [email protected]. Ongoing Work. Sensor Network Security Security and privacy support for data centric sensor networks Self-healing sensor networks (supported by ARO) Secure sensor data aggregation Ad Hoc Network Security - PowerPoint PPT Presentation
Citation preview
Research Overview
Sencun ZhuAsst. Prof. CSE/IST, [email protected]
Ongoing Work Sensor Network Security
Security and privacy support for data centric sensor networks Self-healing sensor networks (supported by ARO) Secure sensor data aggregation
Ad Hoc Network Security Network access control Traceback of compromised nodes
Overlay (P2P) Network Security Detection and identification of attackers Secure routing
Malicious Code Prevent virus and worm self-propagation Detecting buffer overflow attacks
Distributed Sensor Networks
Berkeley Mica2 Mote (2002):
•4 MHZ processor, 4 KB RAM
•19.2K bit rate
•OS: TinyOS
•cost: about $150 Berkeley Spec (2003):
•size: 2 mm * 2.5 mm
•cost: <$1 Eventual goal: smart dust
• size: 1 mm3
Types of sensors
• temperature
• humidity
• vehicular movement
• pressure
• acoustic
• light
• magnetic
•Mica2 •Mica2dot •Spec
Self-organize into multi-hop
wireless sensor networks
Sensor Network Applications Military applications
battlefield surveillance, battle damage assessment, biological and chemical attack detection
Environmental applications fire, flood, air pollution detection
Health applications patient monitoring, diagnostics, drug
administration Home applications
home automation, smart environment Other commercial applications
transportation, vehicle tracking, interactive toys
Security Threats Physical destruction of sensor nodes Radio jamming (physical layer attack) Higher layer attacks by both outsiders and
insiders (compromised nodes) eavesdropping on communications injecting false data
deceiving the base station resource consumption attacks
dropping, altering, or replaying packetsAttacks can target both the application and the
underlying networking protocols
Security and Privacy Solution for Data-centric Sensor Networks
The Framework and The Security Building Blocks
Attack-ResilientCell Head Election
Sensor Data Location Privacy
Secure Data Forwarding
Dependable Data Storage
Mobile SinkCompromise-Tolerance
Key Management
Query Optimization