SlideShare uma empresa Scribd logo
1 de 15
Security in Infrastructure Wireless
Sensor Networks
Emil	
  Lupu	
  
Imperial	
  College	
  London	
  
Security	
  in	
  WSN	
  is	
  difficult	
  because…	
  
•  Nodes	
  are	
  physically	
  
accessible	
  
•  Scale	
  is	
  unprecedended	
  
•  Resources	
  are	
  limited	
  
•  Opera?on	
  is	
  una@ended	
  
There	
  is	
  a	
  large	
  disconnect	
  between	
  
research	
  and	
  applica?on	
  
•  A	
  large	
  body	
  of	
  work	
  on	
  security	
  in	
  sensor	
  
networks.	
  	
  
–  …	
  a	
  cursory	
  search	
  on	
  Google	
  scholar	
  gives	
  34,400	
  
hits	
  since	
  2009	
  

•  Yet	
  security	
  remains	
  largely	
  ignored	
  in	
  
reported	
  deployments	
  	
  
Research	
  is	
  oPen	
  based	
  on	
  	
  
assump?ons	
  such	
  as	
  …	
  	
  
•  Random	
  choice	
  of	
  a@ack	
  targets	
  	
  
•  Nodes	
  are	
  placed…:	
  in	
  a	
  grid,	
  uniformly	
  and	
  
densely,	
  in	
  a	
  tree	
  with	
  a	
  single	
  sink,	
  in	
  pre-­‐
decided	
  groups.	
  	
  
•  Sensors	
  can	
  do…:	
  RSA	
  crypto,	
  puzzles,	
  Java,	
  
homomorphic	
  crypto,	
  game	
  theory….	
  as	
  well	
  
as	
  their	
  tasks.	
  	
  
•  All	
  nodes	
  are	
  coopera?ve	
  and	
  trustworthy,	
  
faults	
  always	
  occur	
  randomly.	
  	
  
Three	
  Guiding	
  Principles	
  
•  Link	
  studies	
  to	
  context	
  of	
  use	
  
•  Leverage	
  rela?onship	
  with	
  physical	
  
phenomena.	
  	
  
•  Security	
  as	
  part	
  of	
  resilient	
  design	
  
Link	
  studies	
  to	
  context	
  of	
  use	
  
• 
• 
• 
• 
• 
• 

Threat	
  Model	
  
Physical	
  Security	
  
Sensed	
  informa?on	
  
Topology	
  
Node	
  capabili?es	
  
Security	
  objec?ves	
  
Leverage	
  rela?onship	
  to	
  physical	
  
phenomena	
  
•  Key	
  genera?on	
  and	
  
distribu?on.	
  
•  Distance	
  bounding.	
  
•  Observability	
  of	
  
associa?on.	
  
•  A@esta?on.	
  
•  Verifica?on	
  of	
  correct	
  
behaviour	
  
Security	
  as	
  part	
  of	
  resilient	
  design	
  
•  Is	
  it	
  a	
  fault	
  or	
  a	
  
compromise?	
  
•  Redundancy	
  drives	
  
anomaly	
  detec?on,	
  
trust,	
  recovery	
  
•  Adapta?on	
  vs	
  security	
  
•  Resource	
  limita?ons	
  
Research	
  Themes	
  
•  Designing	
  solu?ons	
  in	
  concrete	
  se^ngs.	
  	
  
•  Establishing	
  confidence	
  in	
  the	
  correct	
  and	
  
secure	
  opera?on	
  of	
  devices.	
  	
  
•  Measuring	
  the	
  “health”	
  of	
  the	
  network	
  from	
  
within	
  itself.	
  	
  
•  Data	
  quality	
  and	
  trustworthiness	
  assurance.	
  
	
  
Designing	
  solu?ons	
  in	
  concrete	
  
se^ngs	
  
•  Key	
  management	
  for	
  the	
  
context	
  of	
  use	
  
•  Evaluate	
  and	
  improve	
  
exis?ng	
  algorithms	
  e.g.,	
  
applicability,	
  scaleability	
  
•  Mi?ga?on	
  and	
  recovery	
  
through	
  reconfigura?on	
  
Establishing	
  confidence	
  in	
  the	
  correct	
  
and	
  secure	
  opera?on	
  of	
  devices	
  	
  
	
  
•  Measuring	
  device	
  integrity.	
  
•  A@esta?on	
  techniques	
  
–  SoPware,	
  hardware,	
  physical	
  

•  Behavioural	
  fingerprin?ng	
  and	
  
valida?on.	
  
•  Reputa?on.	
  
Measuring	
  the	
  health	
  of	
  the	
  network	
  
from	
  within	
  itself	
  
•  For	
  a	
  sensor,	
  a	
  network,	
  a	
  city.	
  	
  
•  Assurances	
  and	
  Mechanisms	
  
•  Capability	
  of	
  restart/recovery/
response/degraded	
  opera?on	
  
•  Coordina?on/Topology/
Redundancy	
  
•  Effect	
  of	
  adapta?on	
  on	
  
security	
  and	
  resilience	
  
•  Learning	
  to	
  dis?nguish	
  
between	
  normal	
  behaviour,	
  
failures	
  and	
  security.	
  
•  Recognising	
  security	
  events	
  
in	
  constantly	
  evolving	
  
networks.	
  
•  A@ack	
  characterisa?on	
  
•  Compromise	
  epidemiology	
  
Data	
  Quality	
  and	
  Trustworthiness	
  
Assurance	
  

•  Data	
  protec?on	
  and	
  provenance	
  
•  In-­‐network	
  Data	
  Aggrega?on	
  
•  How	
  to	
  accept	
  data	
  degrada?on	
  to	
  maintain	
  
overall	
  system	
  goals.	
  	
  
•  Understand	
  and	
  mi?gate	
  against	
  data	
  
deteriora?on	
  effects	
  e.g.	
  node	
  compromise	
  
failures,	
  fouling	
  
•  Data	
  usage	
  control	
  
Polygonia	
  Interroga?onis	
  

Mais conteúdo relacionado

Mais procurados

The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...DETER-Project
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectDETER-Project
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...DETER-Project
 
Interface interoperability
Interface interoperabilityInterface interoperability
Interface interoperabilitymsdanij
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosStenio Fernandes
 
06 styles and_greenfield_design
06 styles and_greenfield_design06 styles and_greenfield_design
06 styles and_greenfield_designMajong DevJfu
 
Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...Pvrtechnologies Nellore
 
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsInspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsJulie Greensmith
 
Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)Kim Herzig
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...IJNSA Journal
 
EdgarDB -- the simple, powerful database for scientific research
EdgarDB -- the simple, powerful database for scientific researchEdgarDB -- the simple, powerful database for scientific research
EdgarDB -- the simple, powerful database for scientific researchMark Khoury
 

Mais procurados (14)

The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER Project
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
 
Interface interoperability
Interface interoperabilityInterface interoperability
Interface interoperability
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 
06 styles and_greenfield_design
06 styles and_greenfield_design06 styles and_greenfield_design
06 styles and_greenfield_design
 
Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...
 
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune SystemsInspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune Systems
 
Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)Predicting Defects Using Change Genealogies (ISSE 2013)
Predicting Defects Using Change Genealogies (ISSE 2013)
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 
EdgarDB -- the simple, powerful database for scientific research
EdgarDB -- the simple, powerful database for scientific researchEdgarDB -- the simple, powerful database for scientific research
EdgarDB -- the simple, powerful database for scientific research
 
How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?
 
Cybersecurity Safety
Cybersecurity SafetyCybersecurity Safety
Cybersecurity Safety
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 

Semelhante a WSN Security Research Directions

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Finding the needle in the haystack: how Nestle is leveraging big data to defe...Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Finding the needle in the haystack: how Nestle is leveraging big data to defe...Big Data Spain
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Greenbone vulnerability assessment - Networkshop44
Greenbone vulnerability assessment  - Networkshop44Greenbone vulnerability assessment  - Networkshop44
Greenbone vulnerability assessment - Networkshop44Jisc
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ securityJisc
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptxdotco
 
Incident response in Cloud
Incident response in CloudIncident response in Cloud
Incident response in CloudVandana Verma
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...Submit Your Articles- International Journal of Advanced Smart Sensor Network ...
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...ijassn
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)Stephen Abram
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijassn
 
Auditing Distributed Preservation Networks
Auditing Distributed Preservation Networks Auditing Distributed Preservation Networks
Auditing Distributed Preservation Networks Micah Altman
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijassn
 
Protecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetProtecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetPerforce
 

Semelhante a WSN Security Research Directions (20)

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Finding the needle in the haystack: how Nestle is leveraging big data to defe...Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Greenbone vulnerability assessment - Networkshop44
Greenbone vulnerability assessment  - Networkshop44Greenbone vulnerability assessment  - Networkshop44
Greenbone vulnerability assessment - Networkshop44
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ security
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
 
Incident response in Cloud
Incident response in CloudIncident response in Cloud
Incident response in Cloud
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...Submit Your Articles- International Journal of Advanced Smart Sensor Network ...
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
Auditing Distributed Preservation Networks
Auditing Distributed Preservation Networks Auditing Distributed Preservation Networks
Auditing Distributed Preservation Networks
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 
Protecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetProtecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and Interset
 

Último

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Último (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

WSN Security Research Directions

  • 1. Security in Infrastructure Wireless Sensor Networks Emil  Lupu   Imperial  College  London  
  • 2. Security  in  WSN  is  difficult  because…   •  Nodes  are  physically   accessible   •  Scale  is  unprecedended   •  Resources  are  limited   •  Opera?on  is  una@ended  
  • 3. There  is  a  large  disconnect  between   research  and  applica?on   •  A  large  body  of  work  on  security  in  sensor   networks.     –  …  a  cursory  search  on  Google  scholar  gives  34,400   hits  since  2009   •  Yet  security  remains  largely  ignored  in   reported  deployments    
  • 4. Research  is  oPen  based  on     assump?ons  such  as  …     •  Random  choice  of  a@ack  targets     •  Nodes  are  placed…:  in  a  grid,  uniformly  and   densely,  in  a  tree  with  a  single  sink,  in  pre-­‐ decided  groups.     •  Sensors  can  do…:  RSA  crypto,  puzzles,  Java,   homomorphic  crypto,  game  theory….  as  well   as  their  tasks.     •  All  nodes  are  coopera?ve  and  trustworthy,   faults  always  occur  randomly.    
  • 5. Three  Guiding  Principles   •  Link  studies  to  context  of  use   •  Leverage  rela?onship  with  physical   phenomena.     •  Security  as  part  of  resilient  design  
  • 6. Link  studies  to  context  of  use   •  •  •  •  •  •  Threat  Model   Physical  Security   Sensed  informa?on   Topology   Node  capabili?es   Security  objec?ves  
  • 7. Leverage  rela?onship  to  physical   phenomena   •  Key  genera?on  and   distribu?on.   •  Distance  bounding.   •  Observability  of   associa?on.   •  A@esta?on.   •  Verifica?on  of  correct   behaviour  
  • 8. Security  as  part  of  resilient  design   •  Is  it  a  fault  or  a   compromise?   •  Redundancy  drives   anomaly  detec?on,   trust,  recovery   •  Adapta?on  vs  security   •  Resource  limita?ons  
  • 9. Research  Themes   •  Designing  solu?ons  in  concrete  se^ngs.     •  Establishing  confidence  in  the  correct  and   secure  opera?on  of  devices.     •  Measuring  the  “health”  of  the  network  from   within  itself.     •  Data  quality  and  trustworthiness  assurance.    
  • 10. Designing  solu?ons  in  concrete   se^ngs   •  Key  management  for  the   context  of  use   •  Evaluate  and  improve   exis?ng  algorithms  e.g.,   applicability,  scaleability   •  Mi?ga?on  and  recovery   through  reconfigura?on  
  • 11. Establishing  confidence  in  the  correct   and  secure  opera?on  of  devices       •  Measuring  device  integrity.   •  A@esta?on  techniques   –  SoPware,  hardware,  physical   •  Behavioural  fingerprin?ng  and   valida?on.   •  Reputa?on.  
  • 12. Measuring  the  health  of  the  network   from  within  itself   •  For  a  sensor,  a  network,  a  city.     •  Assurances  and  Mechanisms   •  Capability  of  restart/recovery/ response/degraded  opera?on   •  Coordina?on/Topology/ Redundancy   •  Effect  of  adapta?on  on   security  and  resilience  
  • 13. •  Learning  to  dis?nguish   between  normal  behaviour,   failures  and  security.   •  Recognising  security  events   in  constantly  evolving   networks.   •  A@ack  characterisa?on   •  Compromise  epidemiology  
  • 14. Data  Quality  and  Trustworthiness   Assurance   •  Data  protec?on  and  provenance   •  In-­‐network  Data  Aggrega?on   •  How  to  accept  data  degrada?on  to  maintain   overall  system  goals.     •  Understand  and  mi?gate  against  data   deteriora?on  effects  e.g.  node  compromise   failures,  fouling   •  Data  usage  control