Co-PIs: Dr. I-En Liao, CSE Department, National Chung Hsing University Dr. Gwoboa Horng, CSE Department, National Chung Hsing University Dr. Chung-Ming.

Slides:



Advertisements
Similar presentations
Location Privacy Preservation in Collaborative Spectrum Sensing Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Shanghai Jiao Tong University Kai Xing.
Advertisements

CS 495 Application Development for Smart Devices Mobile Crowdsensing Current State and Future Challenges Mobile Crowdsensing. Overview of Crowdsensing.
Hitchhike: Riding Control on Preambles Xiaoyu Ji Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang and Yunhao Liu INFOCOM, 2014, Toronto Hong.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Inteco and NIST Cooperation Peter Mell National Vulnerability Database Project Lead Senior Computer Scientist NIST Computer Security Division Tim Grance.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Social Network Priyanka Agrawal. Introduction Social Network is a social structure made of nodes that are tied by one or more specific types of relations.
Cryptography1 CPSC 3730 Cryptography Chapter 7 Confidentiality Using Symmetric Encryption.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
© 2014 Protiviti Inc. An Equal Opportunity Employer. Confidential: This document is for your company’s internal use only and may not be copied nor distributed.
Learning Micro-Behaviors In Support of Cognitive Assistance AlarmNet is a wireless sensor network (WSN) system for smart health-care that opens up new.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
FINAL.La b RC-MAC : A Receiver-Centric MAC Protocol for Event-Driven Wireless Sensor Networks Pei Huang, Chen Wang, Li xiao Department of Computer Science.
Tim Ireland, Adam Nyzio, Michael Zink, Jim Kurose Department of Computer Science University of Massachusetts Amherst The Impact of Directional Antenna.
W-9 COMPUTERS AND THE LAW Contract Law Copyright Law Trademark Law Patent Law Tort Law Computer Crime Utility Law or Telecommunications Law Constitutional.
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
Information Security Lab. Dept. of Computer Engineering 182/203 PART I Symmetric Ciphers CHAPTER 7 Confidentiality Using Symmetric Encryption 7.1 Placement.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
Performance Study of Localization Techniques in Zigbee Wireless Sensor Networks Ray Holguin Electrical Engineering Major Dr. Hong Huang Advisor.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Consumable power Leakage power Trouble device notice Power manage inquiry info. transfer Power manage inquiry info. transfer Production Management Data.
Amagees Tech Corp value added services Data Management and Infrastructure.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Adaptable and Reactive Security for Wireless Sensor Networks John A. Stankovic Department of Computer Science University of Virginia.
Group #3: Mobility Models and Mobile Testbeds. The Models Motion, Traffic, Network.
SECURITY IN MOBILE NETWORKS Bharat Bhargava CERIAS and Computer Sciences Departments Purdue University, W. Lafayette, IN Supported.
Some Great Open Source Intrusion Detection Systems (IDSs)
Contact Pathways Resource Center:
Threat Modeling for Cloud Computing
Security of Digital Signatures
Information and documentation media systems.
Professor Tzong-Chen Wu
Electrical Engineering
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Sorin A. Huss - Technische Universität Darmstadt
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Effective radiation pattern
Information and documentation media systems.
Chair Professor Chin-Chen Chang Feng Chia University
The Six Parts of a GIS.
به نام خدا Big Data and a New Look at Communication Networks Babak Khalaj Sharif University of Technology Department of Electrical Engineering.
Predicting Miscellaneous Electrical Loads (MELs) in Commercial Buildings: A Time Series Analysis Presented by: Behzad Esmaeili, Ph.D. April 26th, 2018.
Internet of Things (IoT)
Reversible Information Hiding Techniques for Digital
NSF CSR PI Meeting Breakout Session: Integrated Networked Systems and Internet of Things Saurabh Bagchi Purdue University.
Digital Processing Platform
Batch Forwarding in Wireless Sensor Networks (WSNs)
Recent Developments on Multimedia and Secure Networking Technologies
Chapt. 10 – Key Management Dr. Wayne Summers
Chair Professor Chin-Chen Chang Feng Chia University
Communication and Electronic Engineering Department
Majid Alshammari and Khaled Elleithy
Chapter 28: User Security
Naman shah Harshil shah Priyank BambhrOLIA
Hardware Security – Highlevel Survey Review for Exam 4
Security and Privacy in Pervasive/Ubiquitous Computing Systems
Introduction to Operating Systems
Recent Developments on Multimedia and Secure Networking Technologies
System Software for Ubiquitous Computing
Lec 10 IP V6 3.1 Computer Networks Al-Mustansiryah University
USN Introduction Computer Engineering Sejin Oh.
Secure Diffie-Hellman Algorithm
Overview of Computer system
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Co-PIs: Dr. I-En Liao, CSE Department, National Chung Hsing University Dr. Gwoboa Horng, CSE Department, National Chung Hsing University Dr. Chung-Ming Wang, CSE Department, National Chung Hsing University Dr. Pi-chung Wang, CSE Department, National Chung Hsing University Dr. Huan Chen, CSE Department, National Chung Hsing University Dr. Yao-Chung Fan, CSE Department, National Chung Hsing University Dr. Wei-Chih Hong, Department of Information Engineering and Computer Science, Feng Chia University

Privacy is the interest that individuals have in sustaining a 'personal space', free from interference by other people and organizations. Privacy of the Person Privacy of Personal Behavior Privacy of Personal Communications Privacy of Data 2

3 The activity pattern of a user can be detected by analyzing the power meter data. Furthermore, using some statistical method, one can even deduct about what devices were in use at any given time

4 Meter 2 Meter 1 Meter m …… V 1 (t) V 2 (t) V m (t) Constraints  The network communication is not secure, and we do not wish the individual power reading V i (t) to be known by third party.  Due to device hardware limitation, the powerful secure communication protocols are prohibited.  For the power management and load monitoring needs, the administrator node needs only the aggregated value for all t. Aggregated Value

Side Channel Analysis Types of side channels

Meter 2 Meter 1 Meter m …… V 1 (t) V 2 (t) V m (t) Sink Lightweight Cryptographic and Steganographic Schemes Concealed and Disguised Data Aggregation Data Center

Efficient mapping of SCA resistance validation for smart meters Intermediate values Side-channel traces statistical significance