103 research outputs found
A Survey on Privacy Preserving Data Aggregation Protocols forWireless Sensor Networks
The data aggregation is a widely used mechanism in Wireless Sensor Networks (WSNs) to increase lifetime of a sensor node, send robust information by avoiding redundant data transmission to the base station. The privacy preserving data aggregation is a challenge in wireless communication medium as it could be eavesdropped; however it enhances the security without compromising energy efficiency. Thus the privacy protecting data aggregation protocols aims to prevent the disclosure of individual data though an adversary intercept a link or compromise a node’s data. We present a study of different privacy preserving data aggregation techniques used in WSNs to enhance energy and security based on the types of nodes in the network, topology and encryptions used for data aggregation.</p
A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems
Biometric research is directed increasingly towards Wearable Biometric Systems (WBS) for user authentication and identification. However, prior to engaging in WBS research, how their operational dynamics and design considerations differ from those of Traditional Biometric Systems (TBS) must be understood. While the current literature is cognizant of those differences, there is no effective work that summarizes the factors where TBS and WBS differ, namely, their modality characteristics, performance, security and privacy. To bridge the gap, this paper accordingly reviews and compares the key characteristics of modalities, contrasts the metrics used to evaluate system performance, and highlights the divergence in critical vulnerabilities, attacks and defenses for TBS and WBS. It further discusses how these factors affect the design considerations for WBS, the open challenges and future directions of research in these areas. In doing so, the paper provides a big-picture overview of the important avenues of challenges and potential solutions that researchers entering the field should be aware of. Hence, this survey aims to be a starting point for researchers in comprehending the fundamental differences between TBS and WBS before understanding the core challenges associated with WBS and its design
Secure Integrated Routing and Localization in Wireless Optical Sensor Networks
Wireless ad hoc and sensor networks are envisioned to be self-organizing and
autonomous networks, that may be randomly deployed where no fixed infrastructure
is either feasible or cost-effective. The successful commercialization of such networks
depends on the feasible implementation of network services to support security-aware
applications.
Recently, free space optical (FSO) communication has emerged as a viable technology
for broadband distributed wireless optical sensor network (WOSN) applications.
The challenge of employing FSO include its susceptibility to adverse weather
conditions and the line of sight requirement between two communicating nodes. In
addition, it is necessary to consider security at the initial design phase of any network
and routing protocol. This dissertation addresses the feasibility of randomly deployed
WOSNs employing broad beam FSO with regard to the network layer, in which two
important problems are specifically investigated.
First, we address the parameter assignment problem which considers the relationship
amongst the physical layer parameters of node density, transmission radius
and beam divergence of the FSO signal in order to yield probabilistic guarantees on
network connectivity. We analyze the node isolation property of WOSNs, and its
relation to the connectivity of the network. Theoretical analysis and experimental
investigation were conducted to assess the effects of hierarchical clustering as well as fading due to atmospheric turbulence on connectivity, thereby demonstrating the
design choices necessary to make the random deployment of the WOSN feasible.
Second, we propose a novel light-weight circuit-based, secure and integrated routing
and localization paradigm within the WOSN, that leverages the resources of the
base station. Our scheme exploits the hierarchical cluster-based organization of the
network, and the directionality of links to deliver enhanced security performance including
per hop and broadcast authentication, confidentiality, integrity and freshness
of routing signals. We perform security and attack analysis and synthesis to characterize
the protocol’s performance, compared to existing schemes, and demonstrate its
superior performance for WOSNs.
Through the investigation of this dissertation, we demonstrate the fundamental
tradeoff between security and connectivity in WOSNs, and illustrate how the transmission
radius may be used as a high sensitivity tuning parameter to balance there
two metrics of network performance. We also present WOSNs as a field of study that
opens up several directions for novel research, and encompasses problems such as
connectivity analysis, secure routing and localization, intrusion detection, topology
control, secure data aggregation and novel attack scenarios
Multimedia
The nowadays ubiquitous and effortless digital data capture and processing capabilities offered by the majority of devices, lead to an unprecedented penetration of multimedia content in our everyday life. To make the most of this phenomenon, the rapidly increasing volume and usage of digitised content requires constant re-evaluation and adaptation of multimedia methodologies, in order to meet the relentless change of requirements from both the user and system perspectives. Advances in Multimedia provides readers with an overview of the ever-growing field of multimedia by bringing together various research studies and surveys from different subfields that point out such important aspects. Some of the main topics that this book deals with include: multimedia management in peer-to-peer structures & wireless networks, security characteristics in multimedia, semantic gap bridging for multimedia content and novel multimedia applications
Health Participatory Sensing Networks for Mobile Device Public Health Data Collection and Intervention
The pervasive availability and increasingly sophisticated functionalities of smartphones and their connected external sensors or wearable devices can provide new data collection capabilities relevant to public health. Current research and commercial efforts have concentrated on sensor-based collection of health data for personal fitness and personal healthcare feedback purposes. However, to date there has not been a detailed investigation of how such smartphones and sensors can be utilized for public health data collection. Unlike most sensing applications, in the case of public health, capturing comprehensive and detailed data is not a necessity, as aggregate data alone is in many cases sufficient for public health purposes. As such, public health data has the characteristic of being capturable whilst still not infringing privacy, as the detailed data of individuals that may allow re-identification is not needed, but rather only aggregate, de-identified and non-unique data for an individual. These types of public health data collection provide the challenge of the need to be flexible enough to answer a range of public health queries, while ensuring the level of detail returned preserves privacy. Additionally, the distribution of public health data collection request and other information to the participants without identifying the individual is a core requirement. An additional requirement for health participatory sensing networks is the ability to perform public health interventions. As with data collection, this needs to be completed in a non-identifying and privacy preserving manner. This thesis proposes a solution to these challenges, whereby a form of query assurance provides private and secure distribution of data collection requests and public health interventions to participants. While an additional, privacy preserving threshold approach to local processing of data prior to submission is used to provide re-identification protection for the participant. The evaluation finds that with manageable overheads, minimal reduction in the detail of collected data and strict communication privacy; privacy and anonymity can be preserved. This is significant for the field of participatory health sensing as a major concern of participants is most often real or perceived privacy risks of contribution
Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks
Sensor networks are dense wireless networks constituting of small and low-cost sensors that collect and disseminate sensory data. They have gained great attention in recent years due to their ability to offer economical and effective solutions in a variety of fields; and their profound suitability to address mission critical problems that are common in health, transportation, and military applications. “Sensor networks” is a technology that is seen to change the world, and as such their deployment is expected to see a rapid growth.
Effective security strategy is essential for any sensor network in order to maintain trustful and reliable functionality, protect sensory information, and ensure network component authenticity. Security models and protocols that are typically used in other types of networks, such as wired networks, are not suitable for sensor networks due to their specific hardware specifications.
This thesis highlights some of the research done so far in the area of security of wireless sensor networks and proposes a solution to detect Byzantine behaviour - a challenging security threat that many sensor networks face. The proposed solution’s use of cryptography is kept at a minimum to ensure maximum secure bandwidth.
Under this solution, a sensor network continues to work normally until an attack is suspected. Once an attack is suspected, a cryptography scheme is enabled to authenticate suspected nodes and to allow the identification of potential external attacks. If an attack seems to persist after the cryptography scheme has been enabled, the same mechanism is used to identify and isolate potentially compromised nodes. The goal is to introduce a degree of intelligence into such networks and consequently improve reliability of data collection, accuracy of aggregated data, and prolong network lifetime
- …