1 / 3

Attack detection vs. p rivacy in wireless sensor networks

Attack detection vs. p rivacy in wireless sensor networks. Wireless sensor network (WSN) Constrained in energy & computational power Usually process sensitive information Often deployed in physically unprotected area High risk of being attacked Active attacker disturbs network operation

zena
Télécharger la présentation

Attack detection vs. p rivacy in wireless sensor networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IHCONFERENCE 2011 Attack detection vs. privacy in wireless sensor networks • Wireless sensor network (WSN) • Constrained in energy & computational power • Usually process sensitive information • Often deployed in physically unprotected area • High risk of being attacked • Active attacker disturbs network operation • Passive attacker deduces sensitive information • How to protect WSN against both types of attacks? • Privacy mechanism • Intrusion detection system (IDS)

  2. IHCONFERENCE 2011 Somewhat contradictory aims • Privacy mechanism hides the links between various events • Packets are re-encrypted hop-by-hop • Identities in packets are replaced with per-packet changing pseudonyms • Dummy traffic is added • IDS detects attack by linking events together • Problems • IDS cannot deduce that packets were sent by X & addressed to Y • Cannot determine that X sends too many packets • Cannot decide whether packets were forwarded by Y or not • … A X Y

  3. IHCONFERENCE 2011 Research questions • What problems do occur when both techniques are used? • How to employ both techniques together? • Jiří Kůr, Vashek Matyáš, Andriy Stetsko, Petr Švenda. Attack detection vs. privacy – How to find the link or how to hide it?To appear in the proceedings of the 19th Security Protocols Workshop, Cambridge, 2011. LNCS.Springer Verlag, 2011. • Pre-proceedings version available at: • http://spw.stca.herts.ac.uk/papers.shtml • xkur@fi.muni.cz

More Related