1 / 7

Research Overview

Research Overview. Sencun Zhu Asst. Prof. CSE/IST, PSU szhu@cse.psu.edu. Ongoing Work. Sensor Network Security Security and privacy support for data centric sensor networks Self-healing sensor networks (supported by ARO) Secure sensor data aggregation Ad Hoc Network Security

jam
Download Presentation

Research Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU szhu@cse.psu.edu

  2. Ongoing Work • Sensor Network Security • Security and privacy support for data centric sensor networks • Self-healing sensor networks (supported by ARO) • Secure sensor data aggregation • Ad Hoc Network Security • Network access control • Traceback of compromised nodes • Overlay (P2P) Network Security • Detection and identification of attackers • Secure routing • Malicious Code • Prevent virus and worm self-propagation • Detecting buffer overflow attacks

  3. Distributed Sensor Networks Types of sensors • temperature • humidity • vehicular movement • pressure • acoustic • light • magnetic • Mica2 • Mica2dot • Spec • Berkeley Mica2 Mote (2002): • 4 MHZ processor, 4 KB RAM • 19.2K bit rate • OS: TinyOS • cost: about $150 • Berkeley Spec (2003): • size: 2 mm * 2.5 mm • cost: <$1 • Eventual goal: smart dust • size: 1 mm3 • Self-organize into multi-hop • wireless sensor networks

  4. Sensor Network Applications • Military applications • battlefield surveillance, battle damage assessment, biological and chemical attack detection • Environmental applications • fire, flood, air pollution detection • Health applications • patient monitoring, diagnostics, drug administration • Home applications • home automation, smart environment • Other commercial applications • transportation, vehicle tracking, interactive toys

  5. Security Threats • Physical destruction of sensor nodes • Radio jamming (physical layer attack) • Higher layer attacks by both outsiders and insiders (compromised nodes) • eavesdropping on communications • injecting false data • deceiving the base station • resource consumption attacks • dropping, altering, or replaying packets Attacks can target both the application and the underlying networking protocols

  6. Security and Privacy Solution for Data-centric Sensor Networks

  7. The Framework and The Security Building Blocks

More Related