1 / 23

Adaptable and Reactive Security for Wireless Sensor Networks

This paper discusses an adaptable self-healing architecture for wireless sensor networks, focusing on components such as AOP, robust decentralized control, lightweight security, and systems of systems. It explores security issues, approaches, and solutions, including aspect-oriented programming and lightweight components.

adiana
Download Presentation

Adaptable and Reactive Security for Wireless Sensor Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Adaptable and Reactive Security forWireless Sensor Networks John A. Stankovic Department of Computer Science University of Virginia

  2. Outline • Brief Motivation • Adaptable Self-Healing Architecture • Components • AOP • Robust Decentralized Control • Lightweight Security Components • Systems of Systems • Summary

  3. VigilNet: Surveillance System 1. An unmanned plane (UAV) deploys motes Zzz... Sentry 3. Sensor network detectsvehicles and wakes up the sensor nodes 2. Motes establish an sensor network with power management

  4. VigilNet Architecture

  5. Security Issues • Every one of the 30 services can be attacked • Too expensive to make each service attack proof • Attacks will evolve anyway

  6. Security Approach • Operate in the presence security attacks • Robust decentralized control • Self-Heal • AOP • Evolve to new, unanticipated attacks • AOP and Wireless Downloads • Lightweight solutions required due to severe constraints

  7. Components

  8. Aspect Oriented Programming (AOP) Functional Modules Aspects Logging Encrypt Power Control

  9. Unanticipated Attacks • What if advice was not available on the nodes • Typical for an unanticipated attack • Report event to base station • Find/Write new aspects • Disseminate to nodes

  10. Decentralized Control • Large Numbers of Nodes • Aggregate Behavior Emerges • Control/Guarantee Behavior • Redundancy • Mask faults/ attacks • Uniformity a problem/diversity

  11. Lightweight Components • Secure (reactive/adaptive) routing • Localization

  12. SIGF • The SIGF family provides incremental steps between stateless and shared-state protocols. • SIGF allows efficient operation when no attacks are present, and good enough security when they are.

  13. Adaptive, Configurable • Security level can be adaptive based on the resource constraints and security requirements. • Each level can be configured based on parameters.

  14. Localization - Spotlight • Run time-sync protocol • Generate (invisible) light events • Sensor nodes detect the events and report the timestamps • The Spotlight device computes the location of the sensor nodes

  15. Localization Robustness • Execute combination of protocols

  16. System of Systems Zzz... Sentry

  17. Systems of Systems • Inter-system security • How to program and debug to ensure • Behavior • Robustness

  18. System Architecture Programming Station Internet Server Server Local Transport Protocol Local Transport Protocol Nodes Nodes

  19. System Architecture Programming Station Internet Server Server Local Transport Protocol Local Transport Protocol Nodes Nodes Information about Services, Interfaces Location

  20. System Architecture High level Programming Language Programming Station EXE Internet High Level Virtual Machine High Level Virtual Machine Server Server Local Transport Protocol Local Transport Protocol Nodes Nodes Low Level Virtual Machine Low Level Virtual Machine

  21. System Architecture Security Attacks Programming Station Internet Server Server Local Transport Protocol Local Transport Protocol Responsible for Resource management User access rights Nodes Nodes

  22. Summary • Security in WSN • Lightweight • Attack resilience • Evolve for unexpected attacks • Security in Systems of Systems • Self-Healing Architecture • AOP extensions • Adaptive and lightweight protocols

  23. Acknowledgements • Anthony Wood • Hua Cao • Radu Stoleru

More Related