欢迎来到天天文库
浏览记录
ID:41187041
大小:1.65 MB
页数:90页
时间:2019-08-18
《BeliefandSurveyPropagationforSAT信仰和调查传播的SAT》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、SecurityofSensorNetworksTanyaRoostaTRUSTSeminarUCBerkeley,November9,20061OverviewTaxonomyofattacksonsensornetworksConvergenceanalysisofReweighted-Treesum-productalgorithmsTimesynchronizationsecurityReputationsystemfortrackingGametheory2OverviewTaxonomyofattacksonsensornetworksC
2、onvergenceanalysisofReweighted-Treesum-productalgorithmsTimesynchronizationsecurityReputationsystemfortrackingGametheory3BackgroundonSensorNetworkWirelessnetworksconsistofalargenumberofmotesself-organizing,highlyintegratedwithchangingenvironmentandnetworkHighlyConstrainedresour
3、cesprocessing,storage,bandwidth,powerFacilitatelargescaledeploymentHealthcareSurveillanceCriticalinfrastructure4MotivationSometimesdeployedinhostileenvironment,andhaverandomtopologyVisionistointegratesensorsintocriticalinfrastructure,suchaswirelessSupervisoryControlAndDataAcqui
4、sitionsystems(SCADA)Traditionalsecuritytechniquescannotbeappliedbecause…5ChallengesUniquetoSensorNetworksRandomTopologySecureaggregationContextprivacy[PMRSSW06]Scalabilityoftrust/keymanagementschemesPowerandcomputationefficiency[PMRBSSW06]“SameerPai,MarciMeingast,TanyaRoosta,Se
5、rgioBermudez,ShankarSastry,StephenWicker.“PrivacyinSensorNetworks:AFocusOnTransactionalInformation”.UndersubmissiontoIEEESecurityandPrivacyMagazine6SecurityAttacksonSensorNetworksNeedtohaveacomprehensivetaxonomyofsecurityandconfidentialityattacksonsensornetworkstodescribe[RSS06
6、]:Attacker’sgoalTrustmodelSecurityrequirementsVarioustypesofattacks[RSS06]TanyaRoosta,ShiuhpyngShieh,ShankarSastry."TaxonomyofSecurityAttacksonSensorNetworks".IEEEInternationalConferenceonSystemIntegrationandReliabilityImprovements20067Attacker’sGoalEavesdropping(outsiderattack
7、er)Disruptionofapplications(insiderattacker)Subvertingasubsetofsensornodes(insiderattacker)8ThereisusuallyacentralbasestationthatgathersallthedatareportedbythesensornodesOnlytrustassumption:thebasestationistrustworthyNoothertrustrequirementisplacedTrustModel9SecurityRequirement
8、sConfidentialityAuthenticationIntegrityFreshnessSecure
此文档下载收益归作者所有