Literature review of Security and Privacy in Visual Sensor Network: A survey.
Winkler, T., & Rinner, B. (2014). Security and Privacy Protection in Visual Sensor Networks: A Survey. ACM Computing Surveys (CSUR), 47(1), 2.
8. Classification of Attack (Cont’d…)
• Illegitimate Data Access:
• Disrupting Service:
• Illegitimate Control:
8
Attacker collects data for his/her own
use by eavesdropping
Takes (partial) control of a node by forge
or injecting control messages.
Takes (partial) control of a node by forge
or injecting control messages.
Takes (partial) control of a node by forge
or injecting control messages.
9. “Who will guard the guards?”
*Roman poet: Juvenal
Prevention from outsiders attack:
- Data Encryption
- Authentication
- Digital Signature etc.
• Applying Four Eye principle
• Only minimal amount of information is disclosed
9
10. • Modification of Softwares
• Installation of new software (i.e: Malware, Rootkits)
• Changes of routing and MAC protocol.
Software vs Hardware Attack
10
Hardware based security:
- Smartcards
- CPU instruction set extensions
- Trusted Platform Module (TPM)
More sophisticated methods:
- Reverse engineering of IC
- Via side channel exploitation.