tailieunhanh - Sensor Network Security: More Interesting Than You Think ∗
The threat is real and immediate. Essentially, every week there are news reports of some company or organization that has had data stolen – from the Department of Defense to, increasingly, small businesses. Most incidents, of course, are never made public. The potential damage, as we will discuss, involves far more than stolen or damaged data. Cyber is connected to our economy and job creation. It is not just national security information that is being stolen from databases in the . All kinds of intellectual property are targeted. Information stolen from. | Sensor Network Security More Interesting Than You Think Madhukar Anand Eric Cronin Micah Sherr Matt Blaze Zachary Ives and Insup Lee Department of Computer and Information Science University of Pennsylvania anandm ecronin msherr blaze zives lee @ Abstract With the advent of low-power wireless sensor networks a wealth of new applications at the interface of the real and digital worlds is emerging. A distributed computing platform that can measure properties of the real world formulate intelligent inferences and instrument responses requires strong foundations in distributed computing artificial intelligence databases control theory and security. Before these intelligent systems can be deployed in critical infrastructures such as emergency rooms and powerplants the security properties of sensors must be fully understood. Existing wisdom has been to apply the traditional security models and techniques to sensor networks. However sensor networks are not traditional computing devices and as a result existing security models and methods are ill suited. In this position paper we take the first steps towards producing a comprehensive security model that is tailored for sensor networks. Incorporating work from Internet security ubiquitous computing and distributed systems we outline security properties that must be considered when designing a secure sensor network. We propose challenges for sensor networks - security obstacles that when overcome will move us closer to decreasing the divide between computers and the physical world. 1 Introduction The advent of low-powered wireless networks of embedded sensors HSW 00 MFHH03 ABC 04 has spurred the development of new applications at the interface between the real world and its digital manifestation. A distributed computing platform that can measure properties of the real world formulate intelligent inferences and instrument responses requires a new class of techniques in distributed computing artificial .
đang nạp các trang xem trước