57 research outputs found

    Intrusion Prevention and Detection in Wireless Sensor Networks

    Full text link
    The broadcast nature of the transmission medium in wireless sensor networks makes information more vulnerable than in wired applications. In this dissertation we first propose a distributed, deterministic key management protocol designed to satisfy authentication and confidentiality, without the need of a key distribution center. Next we propose Scatter, a secure code authentication scheme for efficient reprogramming sensor networks. Scatter avoids the use of Elliptic Key Cryptography and manages to surpass all previous attempts for secure code dissemination in terms of energy consumption and time efficiency. Next we introduce the problem of intrusion detection in sensor networks. We define the problem formally based on a generic system model and we prove a necessary and sufficient condition for successful detection of the attacker. Finally we present the architecture and implementation of an intrusion detection system which is based on a distributed architecture and it is lightweight enough to run on the nodes

    Online privacy: towards informational self-determination on the internet : report from Dagstuhl Perspectives Workshop 11061

    Get PDF
    The Dagstuhl Perspectives Workshop "Online Privacy: Towards Informational Self-Determination on the Internet" (11061) has been held in February 6-11, 2011 at Schloss Dagstuhl. 30 participants from academia, public sector, and industry have identified the current status-of-the-art of and challenges for online privacy as well as derived recommendations for improving online privacy. Whereas the Dagstuhl Manifesto of this workshop concludes the results of the working groups and panel discussions, this article presents the talks of this workshop by their abstracts

    High Penetration of Power Electronic Interfaced Power Sources and the Potential Contribution of Grid Forming Converters

    Get PDF
    The traditional electrical power system and electricity markets have been designed to work with SGs, and so these have traditionally provided various 'inherent' capabilities to the system critical to ensure the stable operation of the power systems during severe faults and even basic system survival during rare system splits. Due to the potential total absence of SGs approaches during periods of high penetration (HP) of PEIPS infeed, the wider industry has engaged in a closer examination of the lack of these system capabilities [4], [17], [31], [32]. Traditionally, the focus in the context of PEIPS has been on steady state and a limited number of dynamic (faster) aspects recently expanded to include PEIPS contributing fast fault current during system faults and extended contribution to frequency management (although this latter capability has been required from RES for more than 10 years in some countries). Demand side contributions in these contexts are emerging and have significant potential

    Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype

    Get PDF
    The proliferation of wireless networks has been remarkable during the last decade. The license-free nature of the ISM band along with the rapid proliferation of the Wi-Fi-enabled devices, especially the smart phones, has substantially increased the demand for broadband wireless access. However, due to their open nature, wireless networks are susceptible to a number of attacks. In this work, we present anomaly-based intrusion detection algorithms for the detection of three types of attacks: (i) attacks performed on the same channel legitimate clients use for communication, (ii) attacks on neighbouring channels, and (iii) severe attacks that completely block network's operation. Our detection algorithms are based on the cumulative sum change-point technique and they execute on a real lightweight prototype based on a limited resource mini-ITX node. The performance evaluation shows that even with limited hardware resources, the prototype can detect attacks with high detection rates and a few false alarms. © 2012 Fragkiadakis et al

    Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing

    No full text
    Part 1: Security and Privacy ServicesInternational audienceIn many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However, to further encourage participants to use the system, one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide, but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders’ anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable, can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users
    corecore