70 likes | 245 Views
Research Overview. Sencun Zhu Asst. Prof. CSE/IST, PSU szhu@cse.psu.edu. Ongoing Work. Sensor Network Security Security and privacy support for data centric sensor networks Self-healing sensor networks (supported by ARO) Secure sensor data aggregation Ad Hoc Network Security
E N D
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU szhu@cse.psu.edu
Ongoing Work • Sensor Network Security • Security and privacy support for data centric sensor networks • Self-healing sensor networks (supported by ARO) • Secure sensor data aggregation • Ad Hoc Network Security • Network access control • Traceback of compromised nodes • Overlay (P2P) Network Security • Detection and identification of attackers • Secure routing • Malicious Code • Prevent virus and worm self-propagation • Detecting buffer overflow attacks
Distributed Sensor Networks Types of sensors • temperature • humidity • vehicular movement • pressure • acoustic • light • magnetic • Mica2 • Mica2dot • Spec • Berkeley Mica2 Mote (2002): • 4 MHZ processor, 4 KB RAM • 19.2K bit rate • OS: TinyOS • cost: about $150 • Berkeley Spec (2003): • size: 2 mm * 2.5 mm • cost: <$1 • Eventual goal: smart dust • size: 1 mm3 • Self-organize into multi-hop • wireless sensor networks
Sensor Network Applications • Military applications • battlefield surveillance, battle damage assessment, biological and chemical attack detection • Environmental applications • fire, flood, air pollution detection • Health applications • patient monitoring, diagnostics, drug administration • Home applications • home automation, smart environment • Other commercial applications • transportation, vehicle tracking, interactive toys
Security Threats • Physical destruction of sensor nodes • Radio jamming (physical layer attack) • Higher layer attacks by both outsiders and insiders (compromised nodes) • eavesdropping on communications • injecting false data • deceiving the base station • resource consumption attacks • dropping, altering, or replaying packets Attacks can target both the application and the underlying networking protocols
Security and Privacy Solution for Data-centric Sensor Networks