Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Ongoing Work Sensor Network Security Security and privacy support for data centric sensor networks Self-healing sensor networks (supported by ARO) Secure sensor data aggregation Ad Hoc Network Security Network access control Traceback of compromised nodes Overlay (P2P) Network Security Detection and identification of attackers Secure routing Malicious Code Prevent virus and worm self-propagation Detecting buffer overflow attacks
Distributed Sensor Networks Berkeley Mica2 Mote (2002): 4 MHZ processor, 4 KB RAM 19.2K bit rate OS: TinyOS cost: about $150 Berkeley Spec (2003): size: 2 mm * 2.5 mm cost: <$1 Eventual goal: smart dust size: 1 mm 3 Types of sensors temperature humidity vehicular movement pressure acoustic light magnetic Mica2Mica2dotSpec Self-organize into multi-hop wireless sensor networks
Sensor Network Applications Military applications battlefield surveillance, battle damage assessment, biological and chemical attack detection Environmental applications fire, flood, air pollution detection Health applications patient monitoring, diagnostics, drug administration Home applications home automation, smart environment Other commercial applications transportation, vehicle tracking, interactive toys
Security Threats Physical destruction of sensor nodes Radio jamming (physical layer attack) Higher layer attacks by both outsiders and insiders (compromised nodes) eavesdropping on communications injecting false data deceiving the base station resource consumption attacks dropping, altering, or replaying packets Attacks can target both the application and the underlying networking protocols
Security and Privacy Solution for Data-centric Sensor Networks
The Framework and The Security Building Blocks