Literature review of Security and Privacy in Visual Sensor Network: A survey.
Winkler, T., & Rinner, B. (2014). Security and Privacy Protection in Visual Sensor Networks: A Survey. ACM Computing Surveys (CSUR), 47(1), 2.
8. Classification of Attack (ContâdâŚ)
⢠Illegitimate Data Access:
⢠Disrupting Service:
⢠Illegitimate Control:
8
Attacker collects data for his/her own
use by eavesdropping
Takes (partial) control of a node by forge
or injecting control messages.
Takes (partial) control of a node by forge
or injecting control messages.
Takes (partial) control of a node by forge
or injecting control messages.
9. âWho will guard the guards?â
*Roman poet: Juvenal
Prevention from outsiders attack:
- Data Encryption
- Authentication
- Digital Signature etc.
⢠Applying Four Eye principle
⢠Only minimal amount of information is disclosed
9
10. ⢠ModiďŹcation of Softwares
⢠Installation of new software (i.e: Malware, Rootkits)
⢠Changes of routing and MAC protocol.
Software vs Hardware Attack
10
Hardware based security:
- Smartcards
- CPU instruction set extensions
- Trusted Platform Module (TPM)
More sophisticated methods:
- Reverse engineering of IC
- Via side channel exploitation.