Belief and Survey Propagation for SAT信仰和调查传播的SAT.ppt
Security of Sensor Networks Tanya Roosta TRUST Seminar UC Berkeley, November 9, 2006 1 Overview Taxonomy of attacks on sensor networks Convergence analysis of Reweighted-Tree sum-product algorithms Time synchronization security Reputation system for tracking Game theory 2 Overview Taxonomy of attacks on sensor networks Convergence analysis of Reweighted-Tree sum-product algorithms Time synchronization security Reputation system for tracking Game theory 3 Background on Sensor Network Wireless networks consist of a large number of motes self-organizing, highly integrated with changing environment and network Highly Constrained resources processing, storage, bandwidth, power Facilitate large scale deployment Health care Surveillance Critical infrastructure 4 Motivation Sometimes deployed in hostile environment, and have random topology Vision is to integrate sensors into critical infrastructure, such as wireless Supervisory Control And Data Acquisition systems (SCADA) Traditional security techniques can not be applied because … 5 Challenges Unique to Sensor Networks Random Topology Secure aggregation Context privacy [PMRSSW06] Scalability of trust/key management schemes Power and computation efficiency [PMRBSSW06] “Sameer Pai, Marci Meingast, Tanya Roosta, Sergio Bermudez, Shankar Sastry, Stephen Wicker. “Privacy in Sensor Networks: A Focus On Transactional Information”. Under submission to IEEE Security and Privacy Magazine 6 Security Attacks on Sensor Networks Need to have a comprehensive taxonomy of security and confidentiality attacks on sensor networks to describe [RSS06]: Attacker’s goal Trust model Security requirements Various types of attacks [RSS06] Tanya Roosta, Shiuhpyng Shieh, Shankar Sastry. "Taxonomy of Security Attacks on Sensor Networks". IEEE International Conference on System Integration and Reliability Improvements 2006 7 Attacker’s Goal Eavesdropping (outsider attacker) Disruption of applications (insid
Belief and Survey Propagation for SAT信仰和调查传播的SAT 来自淘豆网www.taodocs.com转载请标明出处.