1 / 15

Enhancing Privacy Protection in Wireless Sensor Networks Through Trusted Computing Solutions

This project addresses the pressing need for improved privacy protection in Wireless Sensor Networks (WSNs) by utilizing trusted computing technologies. By implementing a heterogeneous WSN architecture with cluster heads equipped with trusted computing capabilities, we can ensure effective security enforcement and user query privacy. Our approach includes techniques such as remote attestation and encrypted data transmission that obscure the source of user queries, effectively protecting sensitive information from adversaries. The findings demonstrate that this method enhances scalability and privacy in WSNs.

bayard
Télécharger la présentation

Enhancing Privacy Protection in Wireless Sensor Networks Through Trusted Computing Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG , Robert DENG, Jianying ZHOU, Ying QIU

  2. Content Project Summary - why should it be done? • Introduction • Heterogeneous WSN Architecture • Example: Achieving User Query Privacy • Conclusion

  3. Introduction Project Summary - why should it be done? • Wireless Sensor Networks (WSNs)

  4. Introduction Project Summary - why should it be done? • Homogeneous WSNs • All sensor nodes have the same capability • Homegeneous WSNs have scalability problem. Theoretical and empirical studies have corroborate this • P. Gupta and P.Kumar. The Capacity of Wireless Networks, IEEE Transactions on Information Theory, Vol 46(2), pp. 388-404, 2000. • S. Das, C. Perkins and E. Royer. Performance Comparison of Two On-demand Routing Procotols for Ad Hoc Networks, Proceedings of Infocom 2000, Vol 1, pp. 3-12, IEEE Press, 2000

  5. Introduction Project Summary - why should it be done? • Heterogeneous WSNs Are A Better Alternative • The network is partitioned into clusters, and each cluster is placed a cluster head • Cluster heads have better capability than sensor nodes • A cluster head acts an intermediary between sensor nodes and the base station

  6. HeterogeneousWSNArchitecture Project Summary - why should it be done?

  7. HeterogeneousWSNArchitecture Project Summary - why should it be done? • Equip Each Cluster Head with Trusted Computing Technology • TPM is tamper resistant, acting as hardware based root of trust • Remote attestation enables detection of software compromises. • TC-equipped cluster heads are online trusted party, facilitating security enforcement in WSNs

  8. Achieving User Query Privacy Project Summary - why should it be done? • Security Issues in WSNs • Content-related Security • Key management • Access control • Authentication • Encryption • Context-related Security • Protection of contextual information, such as where, when

  9. Example: Achieving User Query Privacy Project Summary - why should it be done? • Problem Statement: Users Query a WSN to Get Data from Particular Areas • Users may want to protect “areas of interest” • User Query Privacy ensures that the user gets the desired data, but the adversary watching the network does not know where the data are from

  10. Example: Achieving User Query Privacy forwarding node accesspoint

  11. Achieving User Query Privacy • Our Solution • Cluster heads establish transmission path to the access point • Use fake data transmission to hide the real one • Every cluster head asks its nodes to retrieve data • Along the transmission path, each cluster head sends encrypted data to its forwarding node

  12. Achieving User Query Privacy • Our Solution --- continued • A forwarding node either decrypts and then encrypts the data from the target cluster, or encrypts dummy data • Transmission pattern of every cluster head is SAME!!!

  13. Achieving User Query Privacy • Comparisons: we assume a global eavesdropper watching the whole network, while other work assumed a local eavesdropper • Source Location Privacy • Use a similar approach

  14. Conclusion Project Summary - why should it be done? • Heterogeneous WSNs Are More Scalable • TC-equipped Cluster Heads Facilitate Security Enforcement • We Showed How to Achieve Better User Query Privacy and Source Location Privacy

  15. Q & A Project Summary - why should it be done? Thank you for your kind attention.

More Related