SecurityChallenges - Opportunistic Sensing: Security...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Opportunistic Sensing: Security Challenges for the New Paradigm Michael Betancourt UCF - EEL 6788 Dr. Turgut Apu Kapadia MIT Lincoln Laboratory David Kotz Dartmouth College Nikos Triandopoulos Boston University
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Overview 1. Introduction 2. Urban Sensing Examples 3. Applications Examples 4. Security Challenges a. Confidentiality and Privacy Issues b. Integrity Issues c. Availability Issues d. Challenges in Participatory Sensing 5. Conclusion
Background image of page 2
Introduction Opportunistic people centric sensing o Small devices carried by people that sense information o Direct or indirect relation to human activity o Environmental conditions Advantages o Leverage millions of devices o No need to manually deploy o Highly mobile and accessible Disadvantages o High risks in security o Data integrity
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Urban Sensing Examples CarTel Maps traffic patterns BikeNet Bicycle network infrastructure CenceMe User activity social networking CarTel Interface BikeNet Interface CenceMe Interface
Background image of page 4
Application Examples Urban data collection and processing o Large scale online data collection o Being able to locate lost objects o Measuring the flow of bicycles in an urban center Environmental monitoring at the human level o Optimize energy usage for heating and cooling o Personal Environmental Impact Report
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Challenges Overview Challenges 1. Context privacy Anonymous tasking Anonymous data reporting Reliable data readings Data authenticity System integrity Preventing data suppression Participation Fairness
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/25/2011 for the course EEL 6788 taught by Professor Boloni,l during the Spring '08 term at University of Central Florida.

Page1 / 17

SecurityChallenges - Opportunistic Sensing: Security...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online