Abstract
In mission critical cyber-physical systems, dependability is an important requirement at all layers of the system architecture. In this paper, we propose protocols that increase the dependability of wireless sensor networks, which are potentially useful building blocks in cyber-physical systems. More specifically, we propose two private aggregator node election protocols, a private data aggregation protocol, and a corresponding private query protocol for sensor networks that allow for secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes. Our advanced protocols resist strong adversaries that can physically compromise some nodes.
Highlights
Wireless sensor and actuator networks are potentially useful building blocks for cyber-physical systems
We propose protocols that increase the dependability of wireless sensor networks, which are potentially useful building blocks in cyberphysical systems
In our second paper [2], we addressed the shortcomings of our earlier scheme: We proposed a new private aggregator node election protocol that is resistant even to internal attacks originating from compromised nodes, and we proposed a new private data aggregation protocol and a new private query protocol which preserved the anonymity of the aggregator nodes during the data aggregation process and when they provide responses to queries of the base station
Summary
Wireless sensor and actuator networks are potentially useful building blocks for cyber-physical systems. Dependability means resistance against both accidental failures and intentional attacks, and it should be addressed at all layers of the network architecture, including the networking protocols and the distributed services built on top of them, as well as the hardware and software architecture of the sensor and actuator nodes themselves Within this context, in this paper, we focus on the security aspects of aggregator node election and data aggregation protocols in wireless sensor networks. Our protocols can be used to protect sensor network applications that rely on data aggregation in clusters, and where locating and disabling the designated aggregator nodes is highly undesirable Such applications include high-confidence cyber-physical systems where sensors and actuators monitor and control the operation of some critical physical infrastructure, such as an energy distribution network, a drinking water supply system, or a chemical pipeline.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have