1 / 15

Achieving Better Privacy Protection in WSNs Using Trusted Computing

Achieving Better Privacy Protection in WSNs Using Trusted Computing. Yanjiang YANG , Robert DENG, Jianying ZHOU, Ying QIU. Content. Project Summary - why should it be done?. Introduction Heterogeneous WSN Architecture Example: Achieving User Query Privacy Conclusion. Introduction.

bayard
Download Presentation

Achieving Better Privacy Protection in WSNs Using Trusted Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG , Robert DENG, Jianying ZHOU, Ying QIU

  2. Content Project Summary - why should it be done? • Introduction • Heterogeneous WSN Architecture • Example: Achieving User Query Privacy • Conclusion

  3. Introduction Project Summary - why should it be done? • Wireless Sensor Networks (WSNs)

  4. Introduction Project Summary - why should it be done? • Homogeneous WSNs • All sensor nodes have the same capability • Homegeneous WSNs have scalability problem. Theoretical and empirical studies have corroborate this • P. Gupta and P.Kumar. The Capacity of Wireless Networks, IEEE Transactions on Information Theory, Vol 46(2), pp. 388-404, 2000. • S. Das, C. Perkins and E. Royer. Performance Comparison of Two On-demand Routing Procotols for Ad Hoc Networks, Proceedings of Infocom 2000, Vol 1, pp. 3-12, IEEE Press, 2000

  5. Introduction Project Summary - why should it be done? • Heterogeneous WSNs Are A Better Alternative • The network is partitioned into clusters, and each cluster is placed a cluster head • Cluster heads have better capability than sensor nodes • A cluster head acts an intermediary between sensor nodes and the base station

  6. HeterogeneousWSNArchitecture Project Summary - why should it be done?

  7. HeterogeneousWSNArchitecture Project Summary - why should it be done? • Equip Each Cluster Head with Trusted Computing Technology • TPM is tamper resistant, acting as hardware based root of trust • Remote attestation enables detection of software compromises. • TC-equipped cluster heads are online trusted party, facilitating security enforcement in WSNs

  8. Achieving User Query Privacy Project Summary - why should it be done? • Security Issues in WSNs • Content-related Security • Key management • Access control • Authentication • Encryption • Context-related Security • Protection of contextual information, such as where, when

  9. Example: Achieving User Query Privacy Project Summary - why should it be done? • Problem Statement: Users Query a WSN to Get Data from Particular Areas • Users may want to protect “areas of interest” • User Query Privacy ensures that the user gets the desired data, but the adversary watching the network does not know where the data are from

  10. Example: Achieving User Query Privacy forwarding node accesspoint

  11. Achieving User Query Privacy • Our Solution • Cluster heads establish transmission path to the access point • Use fake data transmission to hide the real one • Every cluster head asks its nodes to retrieve data • Along the transmission path, each cluster head sends encrypted data to its forwarding node

  12. Achieving User Query Privacy • Our Solution --- continued • A forwarding node either decrypts and then encrypts the data from the target cluster, or encrypts dummy data • Transmission pattern of every cluster head is SAME!!!

  13. Achieving User Query Privacy • Comparisons: we assume a global eavesdropper watching the whole network, while other work assumed a local eavesdropper • Source Location Privacy • Use a similar approach

  14. Conclusion Project Summary - why should it be done? • Heterogeneous WSNs Are More Scalable • TC-equipped Cluster Heads Facilitate Security Enforcement • We Showed How to Achieve Better User Query Privacy and Source Location Privacy

  15. Q & A Project Summary - why should it be done? Thank you for your kind attention.

More Related