首页> 外文学位 >Attacks and defenses of ubiquitous sensor networks.
【24h】

Attacks and defenses of ubiquitous sensor networks.

机译:无处不在的传感器网络的攻击和防御。

获取原文
获取原文并翻译 | 示例

摘要

Based on recent technological advances, the manufacturing of a large number of low cost wireless sensors became technically and economically feasible. Thousands of these sensors can potentially be networked as a wireless sensor network for many applications that require unattended, long-term operations. One of the critical challenges to making sensor networks more pervasive and secure is the severe resource constraints, in terms of energy and memory, on the sensor nodes.;This dissertation explores specific security issues associated with sensor networks. In particular, we explore four related themes: (1) we begin by developing a taxonomy of security attacks and existing countermeasures for sensor networks. Although this taxonomy serves as a reference for security attacks, it points out a lack of a holistic view of the overall security requirements and threat models in sensor networks. Without these notions we cannot evaluate the tradeoffs between resource constraints and security. Then, we explore the development of methodologies for evaluation and design of secure sensor network security by defining: (a) security properties and security metrics to help us understand the value of each security solution, (b) a realistic threat model to understand the practical nature of the adversary model in sensor networks, (c) a security design space to identify best practices for the design and configuration of secure sensor networks. This framework can be used to formally define and analyze security attacks and the effectiveness of solutions for each attack and to identify the path of least resistance for an attacker. (2) Our second theme explores the issue of insider attacks on fundamental services and applications in sensor networks. This type of attack has a more serious impact on the network since the attacker is in possession of the cryptographic keys and can participate in communication. We specifically look at the time synchronization service and the object tracking algorithm. Time synchronization protocols provide a mechanism for synchronizing the local clocks of the nodes in a sensor network. Many applications, such as networking protocols, rely heavily on accurate timing to perform their tasks. We analyze attacks on different categories of time synchronization protocols, show how these attacks affect different classes of protocols, and propose solutions for each attack. We also implement our attacks and countermeasure for one class of time synchronization protocols. Next, we analyze the effect of insider attack on multiple object tracking by focusing on a hierarchical target tracking algorithm specifically designed for sensor networks. We develop a hierarchical reputation system framework that helps detect node misbehavior and isolate malicious entities. We evaluate our reputation system experimentally and demonstrate how it improves object tracking in the presence of malicious nodes. (3) The third theme in this dissertation deals with the security issues facing the applications that use sensor networks. We look at two important applications that use sensor networks: health care systems, and the process control systems. We develop an integrity monitoring system for the health care application. We develop two security solutions for process control systems: (1) a model-based intrusion detection system, and (2) secure key management and software update. (4) In the last part of the dissertation, we use a game theoretic framework to analyze and build a distributed reputation mechanism for sensor networks. Game theory provides a way of mathematically formalizing the decision-making process. However, there has been very limited research in the area of sensor network security. Therefore, the object of our research is to analyze the available game theoretic approaches for reputation systems and apply those to field of sensor networks.
机译:基于最近的技术进步,大量低成本无线传感器的制造在技术上和经济上变得可行。对于需要无人值守的长期运行的许多应用,成千上万个此类传感器可能会作为无线传感器网络联网。使传感器网络更加普及和安全的关键挑战之一是在传感器节点上的能源和内存方面的严格资源约束。;本文探讨了与传感器网络相关的特定安全问题。特别是,我们探讨了四个相关主题:(1)首先,我们开发了一种安全攻击分类法和传感器网络的现有对策。尽管此分类法可作为安全攻击的参考,但它指出缺乏对传感器网络中总体安全要求和威胁模型的整体了解。没有这些概念,我们将无法评估资源约束与安全性之间的权衡。然后,我们通过定义以下内容来探索用于评估和设计安全传感器网络安全性的方法:(a)安全属性和安全指标,以帮助我们了解每种安全解决方案的价值;(b)现实的威胁模型,以了解实际的(c)安全设计空间,以识别安全传感器网络设计和配置的最佳实践。此框架可用于正式定义和分析安全攻击以及每种攻击的解决方案的有效性,并为攻击者确定阻力最小的路径。 (2)我们的第二个主题探讨对传感器网络中的基本服务和应用程序进行内部攻击的问题。由于攻击者拥有加密密钥并可以参与通信,因此这种类型的攻击会对网络产生更严重的影响。我们专门研究时间同步服务和对象跟踪算法。时间同步协议提供了一种用于同步传感器网络中节点本地时钟的机制。许多应用程序,例如网络协议,都严重依赖准确的时间来执行其任务。我们分析了针对不同类别的时间同步协议的攻击,展示了这些攻击如何影响不同类别的协议,并针对每种攻击提出了解决方案。我们还针对一类时间同步协议实施攻击和对策。接下来,我们通过专门针对传感器网络设计的分层目标跟踪算法,分析内部攻击对多目标跟踪的影响。我们开发了一种分级信誉系统框架,可帮助检测节点行为不当并隔离恶意实体。我们通过实验评估信誉系统,并演示在存在恶意节点的情况下它如何改善对象跟踪。 (3)本文的第三个主题是处理使用传感器网络的应用程序所面临的安全问题。我们看一下使用传感器网络的两个重要应用程序:医疗保健系统和过程控制系统。我们为医疗保健应用开发了一个完整性监控系统。我们为过程控制系统开发了两种安全解决方案:(1)基于模型的入侵检测系统,以及(2)安全密钥管理和软件更新。 (4)在本文的最后,我们使用博弈论的框架来分析和建立传感器网络的分布式信誉机制。博弈论提供了一种数学上形式化决策过程的方式。但是,在传感器网络安全领域的研究非常有限。因此,我们的研究目标是分析信誉系统可用的博弈论方法,并将其应用于传感器网络领域。

著录项

  • 作者

    Roosta, Tanya Gazelle.;

  • 作者单位

    University of California, Berkeley.;

  • 授予单位 University of California, Berkeley.;
  • 学科 Engineering Electronics and Electrical.
  • 学位 Ph.D.
  • 年度 2008
  • 页码 241 p.
  • 总页数 241
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 无线电电子学、电信技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号