TRUST NSF Site Visit, Berkeley, March, 2007 Sensor Networks: Technology Transfer Stephen Wicker – Cornell University.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security Issues in Wireless Sensor Networks -Ninad Naik.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
Building Security into Embedded Systems: Validating Theoretical Designs using Experimental Platforms Yuan Xue Institute for Software Integrated Systems.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Smart Buildings and Smart Energy CITRIS Kickoff meeting – Sept J. Rabaey College of Engineering, University of California at Berkeley.
Adrian Lauf, Jonathan Wiley, William H. Robinson, Gabor Karsai (Vanderbilt ISIS) Tanya Roosta (Berkeley) 1.
Session 131 Hazard Mapping and Modeling Supporting Emergency Response Operations using GIS and Modeling.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Applied Cryptography for Network Security
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
ORBIT NSF site visit - July 14, Location-based Services & data propagation in ORBIT Henning Schulzrinne Dept. of Computer Science.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Annarita Giani, UC Berkeley Bruno Sinopoli & Aakash Shah, Carnegie Mellon University Gabor Karsai & Jon Wiley, Vanderbilt University TRUST 2008 Autumn.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Zac Chupka Jeff Signore.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Security in Wireless Sensor Networks. Wireless Sensor Networks  Wireless networks consisting of a large number motes  self-organizing  highly integrated.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
What is FORENSICS? Why do we need Network Forensics?
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Description of the monitoring system experimentation on the freight car pSHIELD Demonstrator Testbed Architecture pSHIELD Final Review Meeting, Bruxelles.
TRUST NSF Site Visit, Berkeley, April 27 th - 28 th, 2006 Trust Patient Portal Project – Real Time Patient Monitoring Josh Denny Mike Elkund Philip Kuryloski.
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Responding to the Unexpected Yigal Arens Paul Rosenbloom Information Sciences Institute University of Southern California.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Wireless and Mobile Security
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
TRUST 2 nd Year Site Visit, March 19 th, 2007 TRUST Knowledge Transfer EMR Project Vanderbilt (Sztipanovits, Karsai, Ledeczi, Xue) Stanford (Mitchell,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Embedded, Real-Time and Wireless Systems Professor Jack Stankovic Department of Computer Science University of Virginia June 2, 2005.
Role Of Network IDS in Network Perimeter Defense.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Toward Resilient Security in Wireless Sensor Networks Rob Polak Feb CSE 535.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Security of the Internet of Things: perspectives and challenges
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks Tanya Roosta (EECS, Berkeley) In Collaboration With: Sameer Pai (ECE, Cornell)
Denial-of-Service Jammer Detector Training Course Worldsensing
Applying Policy-Based Intrusion Detection to SCADA Networks
Presentation transcript:

TRUST NSF Site Visit, Berkeley, March, 2007 Sensor Networks: Technology Transfer Stephen Wicker – Cornell University

TRUST NSF Site Visit, Berkeley, March 2007 TRUST SN Technologies Self-Configuring, Wireless Systems Camera Network Technologies – Mote Design – Localization – Privacy Policy Real-Time Data Transfer Tools Security Models and Design Tools Medical Networking Transport Tools

TRUST NSF Site Visit, Berkeley, March 2007 Control Applications

TRUST NSF Site Visit, Berkeley, March 2007 Wireless Networked Embedded Systems: Next Generation SCADA/DCS Systems DCS: Digital Control Systems – The overall collection of control systems that measure and change the infrastructure state to facilitate delivery of the commodity (electricity, water, gas, & oil) Opportunity for a new generation of secure critical physical SCADA and DCS depend on the gathering, monitoring, and control of information from distributed sensing devices. Powerful platform for privacy policy development.

TRUST NSF Site Visit, Berkeley, March 2007 Water Supply Protection

TRUST NSF Site Visit, Berkeley, March 2007 A Typical Industrial Facility: 40+ years old, $10B infrastructure ~2 Square Miles 1400 Employees Operating Budget: $200M+/year Primary products: Chlorine, Silica, Caustics Highly profitable facility DHS, OSHA, EPA compliance

TRUST NSF Site Visit, Berkeley, March 2007 The Plant: A Complex Environment  sec msec 1 sec secs min hours

TRUST NSF Site Visit, Berkeley, March 2007

Comments from Marty Geering, BP Wireless Engineer, Cherry Hill, New Jersey

TRUST NSF Site Visit, Berkeley, March 2007

Camera Mote Daughter Board Source: ITRI

TRUST NSF Site Visit, Berkeley, March 2007 Sharing of sensor readings in real time EVENTS Mobile display of locally obtained and globally shared sensor readings: Local Sensors are Queried: EVENTS SHARED Sensor readings are shared opportunistically: SENSTRACMobOS

TRUST NSF Site Visit, Berkeley, March 2007 Security: Threat Model Mote-class Attacker – Controls a few ordinary sensor nodes – The attacker has the same capabilities as the network Laptop-class Attacker – Greater battery & processing power, memory, high-power radio transmitter, low-latency communication – The attacker can cause more serious damage Outsider Attacks – Passive eavesdropping: listening to the ongoing communication – Denial of service attacks: any type of attack that can cause a degradation in the performance of the network – Replay attacks: the adversary captures some of the messages, and plays them back at a later time which cause the network to operate on stale information Insider Attacks: compromised node – Node runs malicious code – The node has access to the secret keys and can participate in the authenticated communication.

TRUST NSF Site Visit, Berkeley, March 2007 Basic Security Requirements  Confidentiality  Authentication  Integrity  Freshness  Secure Group Management  Availability  Graceful degradation  Design time security

TRUST NSF Site Visit, Berkeley, March 2007 Taxonomy of Security Attacks in Sensor Networks Tanya Roosta, Alvaro Cardenas, Shiuhpyng Shieh, Shankar Sastry, UC Berkeley 10/11/2015

TRUST NSF Site Visit, Berkeley, March 2007 Embedded System Design (with security extensions) “ESSC”17 Embedded System Security Design Modeling and Analysis- Toolchain SMoLES_SEC Partitions and Dataflows SMoLES_SEC Deployment Diagram SMoLES_SEC Adversary Model Model Transformation Security/Architecture Models Integrity Requirement Violated -- /SimpleSystem/PartitionB/Assembly_B1 has an integrity requirement which is violated by the information flow connecting /SimpleSystem/PartitionB/Port_B2 to /SimpleSystem/PartitionC/Port_C1. Analysis

TRUST NSF Site Visit, Berkeley, March 2007“ESSC”18 MedSN Progress Examining various models for users involved and their method of access/integration in system – Physician and support staff – Patient – Patient family – Non-family – Insurance/Payer Collaborative effort with Vanderbilt, Berkeley Agreement for testing at Nashville assisted living facility Joint Publications

TRUST NSF Site Visit, Berkeley, March 2007“ESSC”19 Testbed Progress Testbed Deployment at Cornell (supports medical effort with Vanderbilt and privacy effort with Berkeley) – Implementation of TinySec for MicaZ – Implementation of MAC layer power saving for MicaZ – Implementation of power aware routing in network – Implementation of HP Jornada based sound actuation overlay network – Deployment of PIR overlay network using Crossbow security motes Joint Publications