Download presentation
Presentation is loading. Please wait.
Published bySabina Pierce Modified over 9 years ago
1
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU szhu@cse.psu.edu
2
Ongoing Work Sensor Network Security Security and privacy support for data centric sensor networks Self-healing sensor networks (supported by ARO) Secure sensor data aggregation Ad Hoc Network Security Network access control Traceback of compromised nodes Overlay (P2P) Network Security Detection and identification of attackers Secure routing Malicious Code Prevent virus and worm self-propagation Detecting buffer overflow attacks
3
Distributed Sensor Networks Berkeley Mica2 Mote (2002): 4 MHZ processor, 4 KB RAM 19.2K bit rate OS: TinyOS cost: about $150 Berkeley Spec (2003): size: 2 mm * 2.5 mm cost: <$1 Eventual goal: smart dust size: 1 mm 3 Types of sensors temperature humidity vehicular movement pressure acoustic light magnetic Mica2Mica2dotSpec Self-organize into multi-hop wireless sensor networks
4
Sensor Network Applications Military applications battlefield surveillance, battle damage assessment, biological and chemical attack detection Environmental applications fire, flood, air pollution detection Health applications patient monitoring, diagnostics, drug administration Home applications home automation, smart environment Other commercial applications transportation, vehicle tracking, interactive toys
5
Security Threats Physical destruction of sensor nodes Radio jamming (physical layer attack) Higher layer attacks by both outsiders and insiders (compromised nodes) eavesdropping on communications injecting false data deceiving the base station resource consumption attacks dropping, altering, or replaying packets Attacks can target both the application and the underlying networking protocols
6
Security and Privacy Solution for Data-centric Sensor Networks
7
The Framework and The Security Building Blocks
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.