30 likes | 185 Views
Attack detection vs. p rivacy in wireless sensor networks. Wireless sensor network (WSN) Constrained in energy & computational power Usually process sensitive information Often deployed in physically unprotected area High risk of being attacked Active attacker disturbs network operation
E N D
IHCONFERENCE 2011 Attack detection vs. privacy in wireless sensor networks • Wireless sensor network (WSN) • Constrained in energy & computational power • Usually process sensitive information • Often deployed in physically unprotected area • High risk of being attacked • Active attacker disturbs network operation • Passive attacker deduces sensitive information • How to protect WSN against both types of attacks? • Privacy mechanism • Intrusion detection system (IDS)
IHCONFERENCE 2011 Somewhat contradictory aims • Privacy mechanism hides the links between various events • Packets are re-encrypted hop-by-hop • Identities in packets are replaced with per-packet changing pseudonyms • Dummy traffic is added • IDS detects attack by linking events together • Problems • IDS cannot deduce that packets were sent by X & addressed to Y • Cannot determine that X sends too many packets • Cannot decide whether packets were forwarded by Y or not • … A X Y
IHCONFERENCE 2011 Research questions • What problems do occur when both techniques are used? • How to employ both techniques together? • Jiří Kůr, Vashek Matyáš, Andriy Stetsko, Petr Švenda. Attack detection vs. privacy – How to find the link or how to hide it?To appear in the proceedings of the 19th Security Protocols Workshop, Cambridge, 2011. LNCS.Springer Verlag, 2011. • Pre-proceedings version available at: • http://spw.stca.herts.ac.uk/papers.shtml • xkur@fi.muni.cz