SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Security in Infrastructure Wireless
Sensor Networks
Emil	
  Lupu	
  
Imperial	
  College	
  London	
  
Security	
  in	
  WSN	
  is	
  difficult	
  because…	
  
•  Nodes	
  are	
  physically	
  
accessible	
  
•  Scale	
  is	
  unprecedended	
  
•  Resources	
  are	
  limited	
  
•  Opera?on	
  is	
  una@ended	
  
There	
  is	
  a	
  large	
  disconnect	
  between	
  
research	
  and	
  applica?on	
  
•  A	
  large	
  body	
  of	
  work	
  on	
  security	
  in	
  sensor	
  
networks.	
  	
  
–  …	
  a	
  cursory	
  search	
  on	
  Google	
  scholar	
  gives	
  34,400	
  
hits	
  since	
  2009	
  

•  Yet	
  security	
  remains	
  largely	
  ignored	
  in	
  
reported	
  deployments	
  	
  
Research	
  is	
  oPen	
  based	
  on	
  	
  
assump?ons	
  such	
  as	
  …	
  	
  
•  Random	
  choice	
  of	
  a@ack	
  targets	
  	
  
•  Nodes	
  are	
  placed…:	
  in	
  a	
  grid,	
  uniformly	
  and	
  
densely,	
  in	
  a	
  tree	
  with	
  a	
  single	
  sink,	
  in	
  pre-­‐
decided	
  groups.	
  	
  
•  Sensors	
  can	
  do…:	
  RSA	
  crypto,	
  puzzles,	
  Java,	
  
homomorphic	
  crypto,	
  game	
  theory….	
  as	
  well	
  
as	
  their	
  tasks.	
  	
  
•  All	
  nodes	
  are	
  coopera?ve	
  and	
  trustworthy,	
  
faults	
  always	
  occur	
  randomly.	
  	
  
Three	
  Guiding	
  Principles	
  
•  Link	
  studies	
  to	
  context	
  of	
  use	
  
•  Leverage	
  rela?onship	
  with	
  physical	
  
phenomena.	
  	
  
•  Security	
  as	
  part	
  of	
  resilient	
  design	
  
Link	
  studies	
  to	
  context	
  of	
  use	
  
• 
• 
• 
• 
• 
• 

Threat	
  Model	
  
Physical	
  Security	
  
Sensed	
  informa?on	
  
Topology	
  
Node	
  capabili?es	
  
Security	
  objec?ves	
  
Leverage	
  rela?onship	
  to	
  physical	
  
phenomena	
  
•  Key	
  genera?on	
  and	
  
distribu?on.	
  
•  Distance	
  bounding.	
  
•  Observability	
  of	
  
associa?on.	
  
•  A@esta?on.	
  
•  Verifica?on	
  of	
  correct	
  
behaviour	
  
Security	
  as	
  part	
  of	
  resilient	
  design	
  
•  Is	
  it	
  a	
  fault	
  or	
  a	
  
compromise?	
  
•  Redundancy	
  drives	
  
anomaly	
  detec?on,	
  
trust,	
  recovery	
  
•  Adapta?on	
  vs	
  security	
  
•  Resource	
  limita?ons	
  
Research	
  Themes	
  
•  Designing	
  solu?ons	
  in	
  concrete	
  se^ngs.	
  	
  
•  Establishing	
  confidence	
  in	
  the	
  correct	
  and	
  
secure	
  opera?on	
  of	
  devices.	
  	
  
•  Measuring	
  the	
  “health”	
  of	
  the	
  network	
  from	
  
within	
  itself.	
  	
  
•  Data	
  quality	
  and	
  trustworthiness	
  assurance.	
  
	
  
Designing	
  solu?ons	
  in	
  concrete	
  
se^ngs	
  
•  Key	
  management	
  for	
  the	
  
context	
  of	
  use	
  
•  Evaluate	
  and	
  improve	
  
exis?ng	
  algorithms	
  e.g.,	
  
applicability,	
  scaleability	
  
•  Mi?ga?on	
  and	
  recovery	
  
through	
  reconfigura?on	
  
Establishing	
  confidence	
  in	
  the	
  correct	
  
and	
  secure	
  opera?on	
  of	
  devices	
  	
  
	
  
•  Measuring	
  device	
  integrity.	
  
•  A@esta?on	
  techniques	
  
–  SoPware,	
  hardware,	
  physical	
  

•  Behavioural	
  fingerprin?ng	
  and	
  
valida?on.	
  
•  Reputa?on.	
  
Measuring	
  the	
  health	
  of	
  the	
  network	
  
from	
  within	
  itself	
  
•  For	
  a	
  sensor,	
  a	
  network,	
  a	
  city.	
  	
  
•  Assurances	
  and	
  Mechanisms	
  
•  Capability	
  of	
  restart/recovery/
response/degraded	
  opera?on	
  
•  Coordina?on/Topology/
Redundancy	
  
•  Effect	
  of	
  adapta?on	
  on	
  
security	
  and	
  resilience	
  
•  Learning	
  to	
  dis?nguish	
  
between	
  normal	
  behaviour,	
  
failures	
  and	
  security.	
  
•  Recognising	
  security	
  events	
  
in	
  constantly	
  evolving	
  
networks.	
  
•  A@ack	
  characterisa?on	
  
•  Compromise	
  epidemiology	
  
Data	
  Quality	
  and	
  Trustworthiness	
  
Assurance	
  

•  Data	
  protec?on	
  and	
  provenance	
  
•  In-­‐network	
  Data	
  Aggrega?on	
  
•  How	
  to	
  accept	
  data	
  degrada?on	
  to	
  maintain	
  
overall	
  system	
  goals.	
  	
  
•  Understand	
  and	
  mi?gate	
  against	
  data	
  
deteriora?on	
  effects	
  e.g.	
  node	
  compromise	
  
failures,	
  fouling	
  
•  Data	
  usage	
  control	
  
Polygonia	
  Interroga?onis	
  

Weitere ähnliche Inhalte

Was ist angesagt?

The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...DETER-Project
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectDETER-Project
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...DETER-Project
 
Interface interoperability
Interface interoperabilityInterface interoperability
Interface interoperabilitymsdanij
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosStenio Fernandes
 
06 styles and_greenfield_design
06 styles and_greenfield_design06 styles and_greenfield_design
06 styles and_greenfield_designMajong DevJfu
 
Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...Pvrtechnologies Nellore
 
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsInspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsJulie Greensmith
 
Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)Kim Herzig
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...IJNSA Journal
 
EdgarDB -- the simple, powerful database for scientific research
EdgarDB -- the simple, powerful database for scientific researchEdgarDB -- the simple, powerful database for scientific research
EdgarDB -- the simple, powerful database for scientific researchMark Khoury
 

Was ist angesagt? (14)

The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER Project
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
 
Interface interoperability
Interface interoperabilityInterface interoperability
Interface interoperability
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 
06 styles and_greenfield_design
06 styles and_greenfield_design06 styles and_greenfield_design
06 styles and_greenfield_design
 
Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...
 
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsInspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune Systems
 
Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 
EdgarDB -- the simple, powerful database for scientific research
EdgarDB -- the simple, powerful database for scientific researchEdgarDB -- the simple, powerful database for scientific research
EdgarDB -- the simple, powerful database for scientific research
 
How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?
 
Cybersecurity Safety
Cybersecurity SafetyCybersecurity Safety
Cybersecurity Safety
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 

Ähnlich wie WSN Security Research Directions

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Finding the needle in the haystack: how Nestle is leveraging big data to defe...Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Finding the needle in the haystack: how Nestle is leveraging big data to defe...Big Data Spain
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Greenbone vulnerability assessment - Networkshop44
Greenbone vulnerability assessment  - Networkshop44Greenbone vulnerability assessment  - Networkshop44
Greenbone vulnerability assessment - Networkshop44Jisc
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ securityJisc
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptxdotco
 
Incident response in Cloud
Incident response in CloudIncident response in Cloud
Incident response in CloudVandana Verma
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...Submit Your Articles- International Journal of Advanced Smart Sensor Network ...
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...ijassn
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)Stephen Abram
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijassn
 
Auditing Distributed Preservation Networks
Auditing Distributed Preservation Networks Auditing Distributed Preservation Networks
Auditing Distributed Preservation Networks Micah Altman
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijassn
 
Protecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetProtecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetPerforce
 

Ähnlich wie WSN Security Research Directions (20)

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Finding the needle in the haystack: how Nestle is leveraging big data to defe...Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Greenbone vulnerability assessment - Networkshop44
Greenbone vulnerability assessment  - Networkshop44Greenbone vulnerability assessment  - Networkshop44
Greenbone vulnerability assessment - Networkshop44
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ security
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
 
Incident response in Cloud
Incident response in CloudIncident response in Cloud
Incident response in Cloud
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...Submit Your Articles- International Journal of Advanced Smart Sensor Network ...
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
Auditing Distributed Preservation Networks
Auditing Distributed Preservation Networks Auditing Distributed Preservation Networks
Auditing Distributed Preservation Networks
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 
Protecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetProtecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and Interset
 

Kürzlich hochgeladen

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Kürzlich hochgeladen (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

WSN Security Research Directions

  • 1. Security in Infrastructure Wireless Sensor Networks Emil  Lupu   Imperial  College  London  
  • 2. Security  in  WSN  is  difficult  because…   •  Nodes  are  physically   accessible   •  Scale  is  unprecedended   •  Resources  are  limited   •  Opera?on  is  una@ended  
  • 3. There  is  a  large  disconnect  between   research  and  applica?on   •  A  large  body  of  work  on  security  in  sensor   networks.     –  …  a  cursory  search  on  Google  scholar  gives  34,400   hits  since  2009   •  Yet  security  remains  largely  ignored  in   reported  deployments    
  • 4. Research  is  oPen  based  on     assump?ons  such  as  …     •  Random  choice  of  a@ack  targets     •  Nodes  are  placed…:  in  a  grid,  uniformly  and   densely,  in  a  tree  with  a  single  sink,  in  pre-­‐ decided  groups.     •  Sensors  can  do…:  RSA  crypto,  puzzles,  Java,   homomorphic  crypto,  game  theory….  as  well   as  their  tasks.     •  All  nodes  are  coopera?ve  and  trustworthy,   faults  always  occur  randomly.    
  • 5. Three  Guiding  Principles   •  Link  studies  to  context  of  use   •  Leverage  rela?onship  with  physical   phenomena.     •  Security  as  part  of  resilient  design  
  • 6. Link  studies  to  context  of  use   •  •  •  •  •  •  Threat  Model   Physical  Security   Sensed  informa?on   Topology   Node  capabili?es   Security  objec?ves  
  • 7. Leverage  rela?onship  to  physical   phenomena   •  Key  genera?on  and   distribu?on.   •  Distance  bounding.   •  Observability  of   associa?on.   •  A@esta?on.   •  Verifica?on  of  correct   behaviour  
  • 8. Security  as  part  of  resilient  design   •  Is  it  a  fault  or  a   compromise?   •  Redundancy  drives   anomaly  detec?on,   trust,  recovery   •  Adapta?on  vs  security   •  Resource  limita?ons  
  • 9. Research  Themes   •  Designing  solu?ons  in  concrete  se^ngs.     •  Establishing  confidence  in  the  correct  and   secure  opera?on  of  devices.     •  Measuring  the  “health”  of  the  network  from   within  itself.     •  Data  quality  and  trustworthiness  assurance.    
  • 10. Designing  solu?ons  in  concrete   se^ngs   •  Key  management  for  the   context  of  use   •  Evaluate  and  improve   exis?ng  algorithms  e.g.,   applicability,  scaleability   •  Mi?ga?on  and  recovery   through  reconfigura?on  
  • 11. Establishing  confidence  in  the  correct   and  secure  opera?on  of  devices       •  Measuring  device  integrity.   •  A@esta?on  techniques   –  SoPware,  hardware,  physical   •  Behavioural  fingerprin?ng  and   valida?on.   •  Reputa?on.  
  • 12. Measuring  the  health  of  the  network   from  within  itself   •  For  a  sensor,  a  network,  a  city.     •  Assurances  and  Mechanisms   •  Capability  of  restart/recovery/ response/degraded  opera?on   •  Coordina?on/Topology/ Redundancy   •  Effect  of  adapta?on  on   security  and  resilience  
  • 13. •  Learning  to  dis?nguish   between  normal  behaviour,   failures  and  security.   •  Recognising  security  events   in  constantly  evolving   networks.   •  A@ack  characterisa?on   •  Compromise  epidemiology  
  • 14. Data  Quality  and  Trustworthiness   Assurance   •  Data  protec?on  and  provenance   •  In-­‐network  Data  Aggrega?on   •  How  to  accept  data  degrada?on  to  maintain   overall  system  goals.     •  Understand  and  mi?gate  against  data   deteriora?on  effects  e.g.  node  compromise   failures,  fouling   •  Data  usage  control