lec-13-false-data-sensor

lec-13-false-data-sensor - Shambhu Upadhyaya 1 Sensor...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Shambhu Upadhyaya 1 Sensor Networks – Hop-by- Sensor Networks – Hop-by- Hop Authentication Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13) Shambhu Upadhyaya 2 Introduction • Sensor networks are subject to false data injection attacks - Deployed in unattended environments- Goal may be to deceive base station or deplete resources on relaying nodes • Interleaved hop-by-hop authentication scheme guarantees detection of injected false data packets- If no more than t nodes are compromised Shambhu Upadhyaya 3 Application Scenario • Military application of sensor networks for reconnaissance of the opposing forces • Deploy a cluster of sensor nodes around each area of interest- Tank movements, ship arrivals, munition plant- Deploy a base station in a secure location to control the sensors and collect data • An adversary may compromise several sensor nodes- Inject false data into the network- Traditional authentication not good since adversary knows all the keying material possessed by the compromised nodes • Goal of research - address false data injection attack- Base station verifies the authenticity of report- Filter out false data packets injected by compromised nodes Shambhu Upadhyaya 4 Proposed Solution • Hop-by-hop authentication scheme in which at least t+1 nodes have to agree upon a report before sending it to the base station • All nodes in the path from the source to the base station participate in authenticating the report in an interleaved fashion • Guarantees detection subject to a security threshold - No more than t nodes are compromised Shambhu Upadhyaya 5 Assumptions • Sensor nodes are organized in clusters (at least t+1 nodes) • Cluster head role may be rotated • Network links are bidirectional • Every node shares a master key with BS • Each node establishes a pairwise key with its one-hop neighbors...
View Full Document

This note was uploaded on 02/16/2011 for the course CSE 566 taught by Professor Dr.shamboo during the Fall '10 term at SUNY Buffalo.

Page1 / 16

lec-13-false-data-sensor - Shambhu Upadhyaya 1 Sensor...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online