7
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU [email protected]

Research Overview

  • Upload
    jam

  • View
    37

  • Download
    0

Embed Size (px)

DESCRIPTION

Research Overview. Sencun Zhu Asst. Prof. CSE/IST, PSU [email protected]. Ongoing Work. Sensor Network Security Security and privacy support for data centric sensor networks Self-healing sensor networks (supported by ARO) Secure sensor data aggregation Ad Hoc Network Security - PowerPoint PPT Presentation

Citation preview

Page 1: Research Overview

Research Overview

Sencun ZhuAsst. Prof. CSE/IST, [email protected]

Page 2: Research Overview

Ongoing Work Sensor Network Security

Security and privacy support for data centric sensor networks Self-healing sensor networks (supported by ARO) Secure sensor data aggregation

Ad Hoc Network Security Network access control Traceback of compromised nodes

Overlay (P2P) Network Security Detection and identification of attackers Secure routing

Malicious Code Prevent virus and worm self-propagation Detecting buffer overflow attacks

Page 3: Research Overview

Distributed Sensor Networks

Berkeley Mica2 Mote (2002):

•4 MHZ processor, 4 KB RAM

•19.2K bit rate

•OS: TinyOS

•cost: about $150 Berkeley Spec (2003):

•size: 2 mm * 2.5 mm

•cost: <$1 Eventual goal: smart dust

• size: 1 mm3

Types of sensors

• temperature

• humidity

• vehicular movement

• pressure

• acoustic

• light

• magnetic

•Mica2 •Mica2dot •Spec

Self-organize into multi-hop

wireless sensor networks

Page 4: Research Overview

Sensor Network Applications Military applications

battlefield surveillance, battle damage assessment, biological and chemical attack detection

Environmental applications fire, flood, air pollution detection

Health applications patient monitoring, diagnostics, drug

administration Home applications

home automation, smart environment Other commercial applications

transportation, vehicle tracking, interactive toys

Page 5: Research Overview

Security Threats Physical destruction of sensor nodes Radio jamming (physical layer attack) Higher layer attacks by both outsiders and

insiders (compromised nodes) eavesdropping on communications injecting false data

deceiving the base station resource consumption attacks

dropping, altering, or replaying packetsAttacks can target both the application and the

underlying networking protocols

Page 6: Research Overview

Security and Privacy Solution for Data-centric Sensor Networks

Page 7: Research Overview

The Framework and The Security Building Blocks

Attack-ResilientCell Head Election

Sensor Data Location Privacy

Secure Data Forwarding

Dependable Data Storage

Mobile SinkCompromise-Tolerance

Key Management

Query Optimization