下载此文档

Belief and Survey Propagation for SAT信仰和调查传播的SAT.ppt


文档分类:医学/心理学 | 页数:约90页 举报非法文档有奖
1/90
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/90 下载此文档
文档列表 文档介绍
Security of works
Tanya Roosta
TRUST Seminar
UC Berkeley, November 9, 2006
1
Overview
Taxonomy of attacks on works
Convergence analysis of Reweighted-Tree sum-product algorithms
Time synchronization security
Reputation system for tracking
Game theory
2
Overview
Taxonomy of attacks on works
Convergence analysis of Reweighted-Tree sum-product algorithms
Time synchronization security
Reputation system for tracking
Game theory
3
Background on work
works consist of a large number of motes
anizing, highly integrated with changing environment work
Highly Constrained resources
processing, storage, bandwidth, power
Facilitate large scale deployment
Health care
Surveillance
Critical infrastructure
4
Motivation
Sometimes deployed in hostile environment, and have random topology
Vision is to integrate sensors into critical infrastructure, such as wireless Supervisory Control And Data Acquisition systems (SCADA)
Traditional security techniques can not be applied because …
5
Challenges Unique to works
Random Topology
Secure aggregation
Context privacy [PMRSSW06]
Scalability of trust/key management schemes
Power putation efficiency
[PMRBSSW06] “Sameer Pai, Marci Meingast, Tanya Roosta, Sergio Bermudez, Shankar Sastry, Stephen Wicker. “Privacy in works: A Focus On Transactional Information”. Under submission to IEEE Security and Privacy Magazine
6
Security Attacks on works
Need to have prehensive taxonomy of security and confidentiality attacks on works to describe [RSS06]:
Attacker’s goal
Trust model
Security requirements
Various types of attacks
[RSS06] Tanya Roosta, Shiuhpyng Shieh, Shankar Sastry. "Taxonomy of Security Attacks on works". IEEE International Conference on System Integration and Reliability Improvements 2006
7
Attacker’s Goal
Eavesdropping (outsider attacker)
Disruption of applications (insider attacker)
Subverting a subset of sensor nodes (insider attacker)
8
There is usually a central base station that gathers all the data reported

Belief and Survey Propagation for SAT信仰和调查传播的SAT 来自淘豆网www.taodocs.com转载请标明出处.

非法内容举报中心
文档信息
  • 页数90
  • 收藏数0 收藏
  • 顶次数0
  • 上传人wyj15108451
  • 文件大小1.65 MB
  • 时间2018-07-10
最近更新