下载此文档

Belief and Survey Propagation for SAT信仰和调查传播的SAT.ppt


文档分类:医学/心理学 | 页数:约90页 举报非法文档有奖
1/90
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/90 下载此文档
文档列表 文档介绍
Security of Sensor Networks
Tanya Roosta
TRUST Seminar
UC Berkeley, November 9, 2006
1
Overview
Taxonomy of attacks on sensor networks
Convergence analysis of Reweighted-Tree sum-product algorithms
Time synchronization security
Reputation system for tracking
Game theory
2
Overview
Taxonomy of attacks on sensor networks
Convergence analysis of Reweighted-Tree sum-product algorithms
Time synchronization security
Reputation system for tracking
Game theory
3
Background on Sensor Network
Wireless networks consist of a large number of motes
self-organizing, highly integrated with changing environment and network
Highly Constrained resources
processing, storage, bandwidth, power
Facilitate large scale deployment
Health care
Surveillance
Critical infrastructure
4
Motivation
Sometimes deployed in hostile environment, and have random topology
Vision is to integrate sensors into critical infrastructure, such as wireless Supervisory Control And Data Acquisition systems (SCADA)
Traditional security techniques can not be applied because …
5
Challenges Unique to Sensor Networks
Random Topology
Secure aggregation
Context privacy [PMRSSW06]
Scalability of trust/key management schemes
Power and computation efficiency
[PMRBSSW06] “Sameer Pai, Marci Meingast, Tanya Roosta, Sergio Bermudez, Shankar Sastry, Stephen Wicker. “Privacy in Sensor Networks: A Focus On Transactional Information”. Under submission to IEEE Security and Privacy Magazine
6
Security Attacks on Sensor Networks
Need to have a comprehensive taxonomy of security and confidentiality attacks on sensor networks to describe [RSS06]:
Attacker’s goal
Trust model
Security requirements
Various types of attacks
[RSS06] Tanya Roosta, Shiuhpyng Shieh, Shankar Sastry. "Taxonomy of Security Attacks on Sensor Networks". IEEE International Conference on System Integration and Reliability Improvements 2006
7
Attacker’s Goal
Eavesdropping (outsider attacker)
Disruption of applications (insid

Belief and Survey Propagation for SAT信仰和调查传播的SAT 来自淘豆网www.taodocs.com转载请标明出处.

非法内容举报中心
文档信息
  • 页数90
  • 收藏数0 收藏
  • 顶次数0
  • 上传人aena45
  • 文件大小1.65 MB
  • 时间2021-02-08