An IoT Data Communication Framework for Authenticity and Integrity

Slides:



Advertisements
Similar presentations
1 The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel Xiaojun Hei Keith W. Ross Nitesh Saxena Polytechnic.
Advertisements

anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
CITY LOGISTICS “Is the process of totally optimising the logistics and transport activities by private companies in urban areas while considering the traffic.
Counting Distinct Objects over Sliding Windows Presented by: Muhammad Aamir Cheema Joint work with Wenjie Zhang, Ying Zhang and Xuemin Lin University of.
Advanced Security Constructions and Key Management Class 16.
Access control for IP multicast T Petri Jokela
Online Distributed Sensor Selection Daniel Golovin, Matthew Faulkner, Andreas Krause theory and practice collide 1.
Gaurav Lahoti University of Illinois at Urbana-Champaign, IL, USA Daisuke Mashima Wei-Peng Chen Fujitsu Laboratories of America Inc., USA Customer-centric.
The Internet of Things is Open for Business. Chad Jones Vice President, Product
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
DELOS Network of Excellence on Digital Libraries WP1 Digital Library Architectures - From JPA1 to JPA2 to JPA3 - Hans-Jörg Schek UMIT
Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Authenticating streamed data in the presence of random packet loss March 17th, Philippe Golle, Stanford University.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
Scalable Authentication of MPEG-4 Streams Yongdong Wu & Robert H. Deng present: Yu-Song Syu.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
Last Words COSC Big Data (frameworks and environments to analyze big datasets) has become a hot topic; it is a mixture of data analysis, data mining,
Kutscher / Ott / Bartsch Supporting Network Access and Service Location in Dynamic Environments Dirk Kutscher Jörg Ott Steffen Bartsch TNC.
A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Last Words DM 1. Mining Data Steams / Incremental Data Mining / Mining sensor data (e.g. modify a decision tree assuming that new examples arrive continuously,
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Data dissemination in wireless computing environments
1 Requirement Specification for IoT API layer Company:Tata Consultancy Services Author(s):Avik Ghose Contact
By Miguel A. Erazo Advisor: Jason Liu March 2009.
Internet of Things. Creating Our Future Together.
Security of the Internet of Things: perspectives and challenges
Gazillions of Gizmos: What are the (location) challenges? An SAIC Company Ravi Jain Director, Middleware and Mobile Applications Research April 5, 2001.
The Network Aware IoT Service at Edge Guoxi Wang.
Artificial Intelligence in IoT Market to Global Analysis and Forecasts by Technology, Hardware and Application No of Pages: 150 Publishing Date:
Artificial Intelligence in IoT Market to Global Analysis and Forecasts by Technology, Hardware and Application No of Pages: 150 Publishing Date:
INDUSTRY 4.0: FROM THINGS TO OUTCOMES
© 2016 Global Market Insights, Inc. USA. All Rights Reserved IoT Infrastructure Market Price, Trends, Industry Outlook & Forecast
Presented by Edith Ngai MPhil Term 3 Presentation
Internet of Things Approach to Cloud-Based Smart Car Parking
Secure Connected Cars – SONG LI
Xin Li, Chen Qian University of Kentucky
IoT Security Part 2, The Malware
Kai Li, Allen D. Malony, Sameer Shende, Robert Bell
Smart Building Solution
Center of Excellence in Cyber Security
Aqua scale Exploring Resilience of Community Water Networks through CPHS-Enabled Platform Qing Han Supervisor: Professor Nalini Venkatasubramanian.
Smart Building Solution
Introduction Used for communication to verify
Internet of Things: State of the Art
Algorithms for Big Data Delivery over the Internet of Things
Lectures 1 and 2 Network Centric Computing Administrative Issues.
Challenges and Opportunities in a Data-Driven World
Mobile edge computing Report by Weiqing huang.
The Internet of Things Exploring Big Data’s Missing Soulmate
Guomei Zhang, Man Chu, Jie Li Personal Ubiquitous Computing 2016
Project Coordinator; Create-Net
Linear sketching with parities
Cryptography Lecture 14.
Degree-aware Hybrid Graph Traversal on FPGA-HMC Platform
Development of a Real-Time Decision Support System for Proactive Response, including Recourse Planning, under Uncertain Active Cascading Emergencies PI:
Speaker: Jin-Wei Lin Advisor: Dr. Ho-Ting Wu
.NET Micro Framework Salvador Ramirez Program Manager.
Linear sketching with parities
Transporte Internacional
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Cryptography Lecture 14.
OS Simulator Develop and test embedded applications on Windows or Linux host environments Eliminates the need for the original OS and expensive.
Developing Vehicular Data Cloud Services in the IoT Environment
Cryptography Lecture 15.
Evoluon Congress Center Helmond Automotive Campus
Blockchains Lecture 4.
INTERNET OF THINGS PRESENTED BY Mittal Institute of technology.
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

An IoT Data Communication Framework for Authenticity and Integrity Presenter: Xin Li

IoT is ubiquitous

By 2020 IoT trends Billion Trillion Billion Trillion 4 4 25+ 50 Connected People Revenue Device Traffic

Problem: Resource constrained IoT hardware platforms Problem: Resource constrained

IoT Communication Framework

Security threat

Scope: Authentication and integrity. Security threat Scope: Authentication and integrity. Privacy is orthogonal.

Digital signature preliminary

Problem: slow and power-hungry Digital signature scheme: sign-each Problem: slow and power-hungry

Problem: partial data retrieval Digital signature scheme: concatenate Problem: partial data retrieval not supported

Digital signature scheme: Merkle tree Space complexity: O(n) D12 = H(D1||D2) Any optimization opportunities?

Dynamic Merkle tree

Dynamic Merkle tree

Dynamic Merkle tree

Dynamic Merkle tree

Space complexity: O(log n) Dynamic Merkle tree Space complexity: O(log n) Can we do better?

5/8 = (0.101)2 Geometric star chaining Intuition: any fraction number can be represented or approximated by a few bits 5/8 = (0.101)2

Geometric star chaining 5/8 = (0.101)2

Geometric star chaining D1 = H(H(e)||D1) Constant!

Budget limit Limited storage quota Limited bandwidth

Distributed stream sampling Coordinator

Distributed stream sampling

Min-wise sampling Communication cost is high! 0.391 0.908 0.291 0.555 0.619 0.273 Communication cost is high! Broadcast when B-th smallest changes

Evaluation Simulation and prototype emulation Prototype emulation Real dataset:5 event-based sensing data Methodology: simulation result feeds prototype emulation Prototype emulation DSA MD5

Simulation Micro-scale experiment

Simulation Uniformity

Prototype emulation

Prototype emulation

Prototype emulation

Prototype emulation

Thank you!