4,513 research outputs found

    A Survey of Access Control Models in Wireless Sensor Networks

    Get PDF
    Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.Peer reviewe

    Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks

    Get PDF
    Embedded sensing systems are pervasively used in life- and security-critical systems such as those found in airplanes, automobiles, and healthcare. Traditional security mechanisms for these sensors focus on data encryption and other post-processing techniques, but the sensors themselves often remain vulnerable to attacks in the physical/analog domain. If an adversary manipulates a physical/analog signal prior to digitization, no amount of digital security mechanisms after the fact can help. Fortunately, nature imposes fundamental constraints on how these analog signals can behave. This work presents PyCRA, a physical challenge-response authentication scheme designed to protect active sensing systems against physical attacks occurring in the analog domain. PyCRA provides security for active sensors by continually challenging the surrounding environment via random but deliberate physical probes. By analyzing the responses to these probes, and by using the fact that the adversary cannot change the underlying laws of physics, we provide an authentication mechanism that not only detects malicious attacks but provides resilience against them. We demonstrate the effectiveness of PyCRA through several case studies using two sensing systems: (1) magnetic sensors like those found wheel speed sensors in robotics and automotive, and (2) commercial RFID tags used in many security-critical applications. Finally, we outline methods and theoretical proofs for further enhancing the resilience of PyCRA to active attacks by means of a confusion phase---a period of low signal to noise ratio that makes it more difficult for an attacker to correctly identify and respond to PyCRA's physical challenges. In doing so, we evaluate both the robustness and the limitations of PyCRA, concluding by outlining practical considerations as well as further applications for the proposed authentication mechanism.Comment: Shorter version appeared in ACM ACM Conference on Computer and Communications (CCS) 201

    Performance analysis with network-enhanced complexities: On fading measurements, event-triggered mechanisms, and cyber attacks

    Get PDF
    Copyright © 2014 Derui Ding et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.Nowadays, the real-world systems are usually subject to various complexities such as parameter uncertainties, time-delays, and nonlinear disturbances. For networked systems, especially large-scale systems such as multiagent systems and systems over sensor networks, the complexities are inevitably enhanced in terms of their degrees or intensities because of the usage of the communication networks. Therefore, it would be interesting to (1) examine how this kind of network-enhanced complexities affects the control or filtering performance; and (2) develop some suitable approaches for controller/filter design problems. In this paper, we aim to survey some recent advances on the performance analysis and synthesis with three sorts of fashionable network-enhanced complexities, namely, fading measurements, event-triggered mechanisms, and attack behaviors of adversaries. First, these three kinds of complexities are introduced in detail according to their engineering backgrounds, dynamical characteristic, and modelling techniques. Then, the developments of the performance analysis and synthesis issues for various networked systems are systematically reviewed. Furthermore, some challenges are illustrated by using a thorough literature review and some possible future research directions are highlighted.This work was supported in part by the National Natural Science Foundation of China under Grants 61134009, 61329301, 61203139, 61374127, and 61374010, the Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany

    IETF standardization in the field of the Internet of Things (IoT): a survey

    Get PDF
    Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities

    Limited Bandwidth Wireless Communication Strategies for Structural Control of Seismically Excited Shear Structures

    Get PDF
    Structural control is used to mitigate unwanted vibrations in structures when large excitations occur, such as high winds and earthquakes. To increase reliability and controllability in structural control applications, engineers are making use of semi-active control devices. Semi-active control gives engineers greater control authority over structural response versus passive controllers, but are less expensive and more reliable than active devices. However, the large numbers of actuators required for semi-active structural control networks introduce more cabling within control systems leading to increased cost. Researchers are exploring the use of wireless technology for structural control to cut down on the installation cost associated with cabling. However wireless communication latency (time delays in data transmissions) can be a barrier to full acceptance of wireless technology for structural control. As the number of sensors in a control network grows, it becomes increasingly difficult to transmit all sensor data during a single control step over the fixed wireless bandwidth. Because control force calculations rely on accurate state measurements or estimates, the use of strategic bandwidth allocation becomes more necessary to provide good control performance. The traditional method for speeding up the control step in larger wireless networks is to spatially decentralize the network into multiple subnetworks, sacrificing communication for speed. This dissertation seeks to provide an additional approach to address the issue of communication latency that may be an alternative, or even a supplement, to spatial decentralization of the control network. The proposed approach is to use temporal decentralization, or the decentralization of the control network over time, as opposed to space/location. Temporal decentralization is first presented with a means of selecting and evaluating different communication group sizes and wireless unit combinations for staggered temporal group communication that still provide highly accurate state estimates. It is found that, in staggered communication schemes, state estimation and control performance are affected by the network topology used at each time step with some sensor combinations providing more useful information than others. Sensor placement theory is used to form sensor groups that provide consistently high-quality output information to the network during each time step, but still utilize all sensors. If the demand for sensors to communicate data outweighs the available bandwidth, traditional temporal and spatial approaches are no longer feasible. This dissertation examines and validates a dynamic approach for bandwidth allocation relying on an extended, autonomous and controller-aware, carrier sense multiple access with collision detection (CSMA/CD) protocol. Stochastic parameters are derived to strategically alter back-off times in the CSMA/CD algorithm based on nodal observability and output estimation error. Inspired by data fusion approaches, this second study presents two different methods for neighborhood state estimation using a dynamic form of measurement-only fusion. To validate these wireless structural control approaches, a small-scale experimental semi-active structural control testbed is developed that captures the important attributes of a full-scale structure
    • …
    corecore