Abstract

In mission critical cyber-physical systems, dependability is an important requirement at all layers of the system architecture. In this paper, we propose protocols that increase the dependability of wireless sensor networks, which are potentially useful building blocks in cyber-physical systems. More specifically, we propose two private aggregator node election protocols, a private data aggregation protocol, and a corresponding private query protocol for sensor networks that allow for secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes. Our advanced protocols resist strong adversaries that can physically compromise some nodes.

Highlights

  • Wireless sensor and actuator networks are potentially useful building blocks for cyber-physical systems

  • We propose protocols that increase the dependability of wireless sensor networks, which are potentially useful building blocks in cyberphysical systems

  • In our second paper [2], we addressed the shortcomings of our earlier scheme: We proposed a new private aggregator node election protocol that is resistant even to internal attacks originating from compromised nodes, and we proposed a new private data aggregation protocol and a new private query protocol which preserved the anonymity of the aggregator nodes during the data aggregation process and when they provide responses to queries of the base station

Read more

Summary

INTRODUCTION

Wireless sensor and actuator networks are potentially useful building blocks for cyber-physical systems. Dependability means resistance against both accidental failures and intentional attacks, and it should be addressed at all layers of the network architecture, including the networking protocols and the distributed services built on top of them, as well as the hardware and software architecture of the sensor and actuator nodes themselves Within this context, in this paper, we focus on the security aspects of aggregator node election and data aggregation protocols in wireless sensor networks. Our protocols can be used to protect sensor network applications that rely on data aggregation in clusters, and where locating and disabling the designated aggregator nodes is highly undesirable Such applications include high-confidence cyber-physical systems where sensors and actuators monitor and control the operation of some critical physical infrastructure, such as an energy distribution network, a drinking water supply system, or a chemical pipeline.

SYSTEM AND ATTACKER MODELS
BASIC PROTOCOL
Protocol description
Protocol analysis
Density based attack
Order based attack
Node capture attacks
Data forwarding and querying
ADVANCED PROTOCOL
Initialization
Broadcast authentication
Broadcast communication
Data aggregator election
Data aggregation
Misbehaving nodes
RELATED WORK
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call