CERIAS Weekly Security Seminar - Purdue University artwork

Ting Yu, A Framework for Identifying Compromised Nodes in Sensor Networks

CERIAS Weekly Security Seminar - Purdue University

English - September 21, 2005 04:00 - 51 minutes - 183 MB Video - ★★★★ - 6 ratings
Technology Education Courses infosec security video seminar cerias purdue information sfs research education Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed


Sensor networks are vulnerable to physical attacks. Once a node's cryptographic key is compromised, an attacker may completely impersonate it, and introduce arbitrary false information into the network. Most existing techniques focus on detecting and tolerating false information introduced by compromised nodes. They cannot pinpoint exactly where the false information is introduced and who is responsible for it.

We propose an application-independent framework for identifying compromised sensor nodes. In this framework, sensor nodes may conceptually observe the activity of each other following the deployment topology of a sensor network. An alert is generated if a node observes an abnormal activity. Such alerts are collected by the base station, which further reason and finally identify compromised nodes. We develop efficient and accurate reasoning algorithms that can effectively deal with collusion and local majorities. Our algorithms are optimal in the sense that they identify the largest number of compromised nodes without introducing false positives.
About the speaker: Ting Yu received his PhD from the University of Illinois at Urbana-Champaign in 2003. He is currently an assistant professor in the Department of Computer Science, North Carolina State University. His research interests include trust negotiation and management, privacy policy specification and enforcement, and data privacy.

Sensor networks are vulnerable to physical attacks. Once a node's cryptographic key is compromised, an attacker may completely impersonate it, and introduce arbitrary false information into the network. Most existing techniques focus on detecting and tolerating false information introduced by compromised nodes. They cannot pinpoint exactly where the false information is introduced and who is responsible for it.

We propose an application-independent framework for identifying compromised sensor nodes. In this framework, sensor nodes may conceptually observe the activity of each other following the deployment topology of a sensor network. An alert is generated if a node observes an abnormal activity. Such alerts are collected by the base station, which further reason and finally identify compromised nodes. We develop efficient and accurate reasoning algorithms that can effectively deal with collusion and local majorities. Our algorithms are optimal in the sense that they identify the largest number of compromised nodes without introducing false positives.
About the speaker: Ting Yu received his PhD from the University of Illinois at Urbana-Champaign in 2003. He is currently an assistant professor in the Department of Computer Science, North Carolina State University. His research interests include trust negotiation and management, privacy policy specification and enforcement, and data privacy.