150 likes | 268 Vues
This project addresses the pressing need for improved privacy protection in Wireless Sensor Networks (WSNs) by utilizing trusted computing technologies. By implementing a heterogeneous WSN architecture with cluster heads equipped with trusted computing capabilities, we can ensure effective security enforcement and user query privacy. Our approach includes techniques such as remote attestation and encrypted data transmission that obscure the source of user queries, effectively protecting sensitive information from adversaries. The findings demonstrate that this method enhances scalability and privacy in WSNs.
E N D
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG , Robert DENG, Jianying ZHOU, Ying QIU
Content Project Summary - why should it be done? • Introduction • Heterogeneous WSN Architecture • Example: Achieving User Query Privacy • Conclusion
Introduction Project Summary - why should it be done? • Wireless Sensor Networks (WSNs)
Introduction Project Summary - why should it be done? • Homogeneous WSNs • All sensor nodes have the same capability • Homegeneous WSNs have scalability problem. Theoretical and empirical studies have corroborate this • P. Gupta and P.Kumar. The Capacity of Wireless Networks, IEEE Transactions on Information Theory, Vol 46(2), pp. 388-404, 2000. • S. Das, C. Perkins and E. Royer. Performance Comparison of Two On-demand Routing Procotols for Ad Hoc Networks, Proceedings of Infocom 2000, Vol 1, pp. 3-12, IEEE Press, 2000
Introduction Project Summary - why should it be done? • Heterogeneous WSNs Are A Better Alternative • The network is partitioned into clusters, and each cluster is placed a cluster head • Cluster heads have better capability than sensor nodes • A cluster head acts an intermediary between sensor nodes and the base station
HeterogeneousWSNArchitecture Project Summary - why should it be done?
HeterogeneousWSNArchitecture Project Summary - why should it be done? • Equip Each Cluster Head with Trusted Computing Technology • TPM is tamper resistant, acting as hardware based root of trust • Remote attestation enables detection of software compromises. • TC-equipped cluster heads are online trusted party, facilitating security enforcement in WSNs
Achieving User Query Privacy Project Summary - why should it be done? • Security Issues in WSNs • Content-related Security • Key management • Access control • Authentication • Encryption • Context-related Security • Protection of contextual information, such as where, when
Example: Achieving User Query Privacy Project Summary - why should it be done? • Problem Statement: Users Query a WSN to Get Data from Particular Areas • Users may want to protect “areas of interest” • User Query Privacy ensures that the user gets the desired data, but the adversary watching the network does not know where the data are from
Example: Achieving User Query Privacy forwarding node accesspoint
Achieving User Query Privacy • Our Solution • Cluster heads establish transmission path to the access point • Use fake data transmission to hide the real one • Every cluster head asks its nodes to retrieve data • Along the transmission path, each cluster head sends encrypted data to its forwarding node
Achieving User Query Privacy • Our Solution --- continued • A forwarding node either decrypts and then encrypts the data from the target cluster, or encrypts dummy data • Transmission pattern of every cluster head is SAME!!!
Achieving User Query Privacy • Comparisons: we assume a global eavesdropper watching the whole network, while other work assumed a local eavesdropper • Source Location Privacy • Use a similar approach
Conclusion Project Summary - why should it be done? • Heterogeneous WSNs Are More Scalable • TC-equipped Cluster Heads Facilitate Security Enforcement • We Showed How to Achieve Better User Query Privacy and Source Location Privacy
Q & A Project Summary - why should it be done? Thank you for your kind attention.