Download presentation
Presentation is loading. Please wait.
Published byJasper Wells Modified over 8 years ago
1
Adaptable and Reactive Security for Wireless Sensor Networks John A. Stankovic Department of Computer Science University of Virginia
2
Outline Brief Motivation Adaptable Self-Healing Architecture –Components –AOP –Robust Decentralized Control –Lightweight Security Components Systems of Systems Summary
3
1. An unmanned plane (UAV) deploys motes 2. Motes establish an sensor network with power management 3.Sensor network detects vehicles and wakes up the sensor nodes Zzz... VigilNet: Surveillance System Sentry
4
VigilNet Architecture
5
Security Issues Every one of the 30 services can be attacked Too expensive to make each service attack proof Attacks will evolve anyway
6
Security Approach Operate in the presence security attacks –Robust decentralized control Self-Heal –AOP Evolve to new, unanticipated attacks –AOP and Wireless Downloads Lightweight solutions required due to severe constraints
7
Components
8
Aspect Oriented Programming (AOP) Functional Modules Aspects Logging Encrypt Power Control
9
Unanticipated Attacks What if advice was not available on the nodes –Typical for an unanticipated attack –Report event to base station –Find/Write new aspects –Disseminate to nodes
10
Decentralized Control Large Numbers of Nodes –Aggregate Behavior Emerges –Control/Guarantee Behavior Redundancy Mask faults/ attacks Uniformity a problem/diversity
11
Lightweight Components Secure (reactive/adaptive) routing Localization
12
SIGF The SIGF family provides incremental steps between stateless and shared-state protocols. SIGF allows efficient operation when no attacks are present, and good enough security when they are.
13
Adaptive, Configurable Security level can be adaptive based on the resource constraints and security requirements. Each level can be configured based on parameters.
14
Localization - Spotlight Run time-sync protocol Generate (invisible) light events Sensor nodes detect the events and report the timestamps The Spotlight device computes the location of the sensor nodes
15
Localization Robustness Execute combination of protocols
16
Zzz... System of Systems Sentry
17
Systems of Systems Inter-system security How to program and debug to ensure –Behavior –Robustness
18
System Architecture Internet Local Transport Protocol Local Transport Protocol Programming Station Server Nodes
19
System Architecture Internet Local Transport Protocol Local Transport Protocol Programming Station Server Nodes Information about Services, Interfaces Location
20
System Architecture Internet Programming Station Server Nodes Local Transport Protocol Local Transport Protocol High level Programming Language EXE High Level Virtual Machine High Level Virtual Machine Low Level Virtual Machine Low Level Virtual Machine
21
System Architecture Internet Local Transport Protocol Local Transport Protocol Programming Station Server Nodes Responsible for Resource management User access rights Security Attacks
22
Summary Security in WSN –Lightweight –Attack resilience –Evolve for unexpected attacks Security in Systems of Systems Self-Healing Architecture –AOP extensions –Adaptive and lightweight protocols
23
Acknowledgements Anthony Wood Hua Cao Radu Stoleru
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.