Comments on Networking and Security - Challenges for Environmental Observatories Arthur C. Sanderson Rensselaer Polytechnic Institute NSF Workshop on Cyberinfrastructure.

Slides:



Advertisements
Similar presentations
Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Advertisements

Randomized Failover Intrusion Tolerant Systems (RFITS) Ranga Ramanujan Noel Schmidt Architecture Technology Corporation Odyssey Research Associates DARPA.
1 Cyberinfrastructure Framework for 21st Century Science & Engineering (CF21) IRNC Kick-Off Workshop July 13,
Fundamentals of Computer Security Geetika Sharma Fall 2008.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
Inteco and NIST Cooperation Peter Mell National Vulnerability Database Project Lead Senior Computer Scientist NIST Computer Security Division Tim Grance.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
Remarks: Roadmapping and Hard Problems Sally E. Howe, Ph.D. Associate Director National Coordination Office for Networking and Information Technology Research.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
12/28/2003CNSF Workshop Localized Algorithms and Their Applications in Ad Hoc Wireless Networks Jie Wu Dept. of Computer Science & Engineering Florida.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
Trust and Reputation Based mechanisms for CIP Uniparthenope, UniRC, Polito (Fai della Paganella, Febbraio 2014)
1 ID-03 Science and Technology in GEOSS C1 Engaging the Science and Technology (S&T) Community in GEOSS Implementation Hans-Peter Plag IEEE.
High Performance Embedded Computing © 2007 Elsevier Chapter 1, part 4: Embedded Computing High Performance Embedded Computing Wayne Wolf.
Distributed Intelligent Sensing and Control (DISC) for Automotive Factory Automation. Dr. Robert Brennan Dr. Ningxu Cai Mohammad Gholami.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Lecture 0 Anish Arora CSE 6333 Introduction to Distributed Computing.
Threats, Risk Assessment, and Policy Management in UbiComp Workshop on Security in UbiComp UBICOMP 2002, 29th Sept. Göteborg, Sweden Philip Robinson, SAP.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
2 nd Annual review Florence 15 th November 2013 Railway security demonstrator.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Investigating Survivability Strategies for Ultra-Large Scale (ULS) Systems Vanderbilt University Nashville, Tennessee Institute for Software Integrated.
Ulrich Norbisrath, Ibrahim Armaç, Daniel Retkowitz, Priit Salumaa RWTH Aachen University Modeling eHome Systems 4th International Workshop on.
INFSCI 2935: Introduction to Computer Security1 Project Implementation Implementation  Reasonable sophistication  Up to 3 people maximum Survey type.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
MAFTIA Expression of Interest for DEFINE and DESIRE presented by Robert Stroud, University of Newcastle upon Tyne.
ICCS WSES BOF Discussion. Possible Topics Scientific workflows and Grid infrastructure Utilization of computing resources in scientific workflows; Virtual.
High-integrity Sensor Networks Mani Srivastava UCLA.
Secure In-Network Aggregation for Wireless Sensor Networks
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Self-healing Architectures based on context DEpendent adaptive Software Agents (SADESA) – an extension of EU-IST Project SAFEGUARD DeSIRE Workshop Pisa,
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
NSF NOSS Workshop 10/18-19 School of Mines. Related Info on NOSS Workshop with links to the presentations.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Integrating Security Modeling in Embedded System Design Jan Werner, Matt Eby, Janos Mathe, Gabor Karsai, Yuan Xue, Janos Sztipanovits Institute for Software.
Securing the Grid & other Middleware Challenges Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer.
Computer Science and Engineering 1 Mobile Computing and Security.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
SMUHACNet 2005 Information Infrastructure for Border and Transportation Security Suku Nair.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Intrusion Tolerant Distributed Object Systems Joint IA&S PI Meeting Honolulu, HI July 17-21, 2000 Gregg Tally
The Internet of Things for Health Care
Presented by Edith Ngai MPhil Term 3 Presentation
COMPSCI 110 Operating Systems
Intrusion Tolerance for NEST
Wireless Sensor Network (WSN)
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Broad Emerging Themes in CPS/IoT
Integrating Security Modeling in Embedded System Design
Towards Next Generation Panel at SAINT 2002
Mobile Agents.
Presented by Bijendra Vishal
Sensor Networks in pervasive games “save the princess game”
EEL 6935 Wireless Ad Hoc Networks
SUBJECT –AWSN (ELECTIVE-III)
An Overview of Security Issues in Sensor Network
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Comments on Networking and Security - Challenges for Environmental Observatories Arthur C. Sanderson Rensselaer Polytechnic Institute NSF Workshop on Cyberinfrastructure for Environmental Observatories December 6-7, 2004

December 6, 2004A. C. Sanderson2 Environmental Observatories Networked distributed computing systems  Share many common security challenges  Data integrity, authentication, access, privacy… But – Environmental Observatory Networks differ in:  Scale  Complexity  Dynamics  Homogeneity  Embedded Systems

December 6, 2004A. C. Sanderson3 Examples of Environmental Observatories Examples of Environmental Observatories Distributed Sensor Network  1000’s of small nodes with low complexity  Ad hoc wireless network  Embedded in the physical environment CNS - UCLA Ocean Observatory  10’s-100’s of complex nodes  May have fiber-linked network  Diverse sensor types  Mobile nodes  Dynamic and diverse AOSN – MBARI

December 6, 2004A. C. Sanderson4 Vulnerabilities of the ECI Vulnerabilities of the ECI  Data Integrity  Privacy – Origin and context of data  Authentication – Classes of access and use  Attacks  Denial of service – electronic or physical  Passive listening  Data insertion and corruption  Platform for attack  Unintended Consequences  Use of data for unintended purposes  Future data mining  Privacy violations – unknowing, unwilling subjects

December 6, 2004A. C. Sanderson5 Security Needs of ECI Security Needs of ECI  Security Models  New metrics  Life-cycle systems design  Fault tolerance in ad hoc systems  e.g. reconfiguration, “light-weight” cryptography  Intrusion detection  Node exclusion, tamper resistance  Validation  Use of deployed nodes to cross-check and validate  Middleware consistency  Hierarchical approaches – multilayer design

December 6, 2004A. C. Sanderson6 Future Issues Future Issues  Management  Rationalize interpretation of security among  Scientists, public  “Reliability” of observations and models  Linking security with scientific goals in design and implementation  Modularity of systems to enhance implementation  Future Steps  Basic research on security in ad hoc networks  Build testbeds for security and reliability issues  Advance educational programs on security topics