VigneshSaravanaperumal-Project

VigneshSaravanaperumal-Project - Survey The Urban Security...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style 8/25/11 Survey: The Urban Security and Privacy challenges Presented By Vignesh Saravanaperumal EEL 6788
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8/25/11 Introduction Urban sensing: Risk Possessed: Confidentiality and Privacy Integrity Availability Traffic pattern Observed: General Architecture observed Server Tier SAP Tier Sensor Tier
Background image of page 2
8/25/11 Introduction Difference between wireless sensor network and urban sensing Sensor Networks W/O Urban sensing Sensor Networks with Urban sensing
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8/25/11 Solutions available Virtual Wall Onion Routing Mechanism Mist Routing Hidden credentials method Hot-Potato-Privacy-Protection Algorithm Confidentiality and Privacy Integri ty
Background image of page 4
8/25/11 In depth classification Confidentiality and Privacy Context Privacy Anonymous Tasking Anonymous Data Reporting Q S S Q Virtual Wall Hot-Potato-Privacy-Protection Algorithm Task specific users without knowing their current location Trust Negotiation Mist , Onion Routing Hidden credential Method
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8/25/11 In depth classification Integrity Reliable Data reading Data authenticity Availability: Fairness and Participation Mixed-behavior models in multi-party computation Multicast Authentication Scheme Free Rider Problem
Background image of page 6
8/25/11 Context privacy Digital footprints Types of Footprints: Personal General Empty Information about users derived from sensors Transparent wall Translucent wall Opaque wall
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8/25/11 Context privacy Virtual Wall
Background image of page 8
8/25/11 Anonymous Tasking Mist Routing Objective: Location privacy Anonymous connections Confidentiality This privacy protocol prevents insiders, system administrators and even the system itself from tracking users and detecting their physical location They do this by conceal the identity and location of communicating parties by rerouting packets among themselves using hop-to-hop handle-
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8/25/11 Anonymous Tasking Mist Routing Mist: Mist Routers are Hierarchical Structure based Portal: Mist Router – leaf node Knowledge of user’s positions but not user’s ID Lighthouse: Mist Router – Portal’s ancestor Knowledge of user’s ID but not user’s physical position
Background image of page 10
8/25/11 Anonymous Tasking Mist Routing Mist Circuit establishment Locating Users Web Servers
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8/25/11 Anonymous Tasking Mist Routing Mist communication setup
Background image of page 12
8/25/11 Anonymous Tasking Onion Router mechanism Messages are constantly encrypted and then sent through several network nodes called onion routers which creates a circuit of nodes. Each onion router removes a layer of encryption with its symmetric key to reveal routing instructions, and sends the message to the next router where this is process is repeated.
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/25/2011 for the course EEL 6788 taught by Professor Boloni,l during the Spring '08 term at University of Central Florida.

Page1 / 39

VigneshSaravanaperumal-Project - Survey The Urban Security...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online