Belief and Survey Propagation for SAT信仰和调查传播的SAT.pptVIP

  • 3
  • 0
  • 约2.07万字
  • 约 90页
  • 2018-06-24 发布于四川
  • 举报

Belief and Survey Propagation for SAT信仰和调查传播的SAT.ppt

Belief and Survey Propagation for SAT信仰和调查传播的SAT

The 1st International Workshop on Advances in Sensor Networks Security of Sensor Networks Tanya Roosta TRUST Seminar UC Berkeley, November 9, 2006 Overview Taxonomy of attacks on sensor networks Convergence analysis of Reweighted-Tree sum-product algorithms Time synchronization security Reputation system for tracking Game theory Overview Taxonomy of attacks on sensor networks Convergence analysis of Reweighted-Tree sum-product algorithms Time synchronization security Reputation system for tracking Game theory Background on Sensor Network Wireless networks consist of a large number of motes self-organizing, highly integrated with changing environment and network Highly Constrained resources processing, storage, bandwidth, power Facilitate large scale deployment Health care Surveillance Critical infrastructure Motivation Sometimes deployed in hostile environment, and have random topology Vision is to integrate sensors into critical infrastructure, such as wireless Supervisory Control And Data Acquisition systems (SCADA) Traditional security techniques can not be applied because … Challenges Unique to Sensor Networks Random Topology Secure aggregation Context privacy [PMRSSW06] Scalability of trust/key management schemes Power and computation efficiency Security Attacks on Sensor Networks Need to have a comprehensive taxonomy of security and confidentiality attacks on sensor networks to describe [RSS06]: Attacker’s goal Trust model Security requirements Various types of attacks Attacker’s Goal Eavesdropping (outsider attacker) Disruption of applications (insider attacker) Subverting a subset of sensor nodes (insider attacker) Trust Model There is usually a central base station that gathers all the data reported by the sensor nodes Only trust assumption: the base station is trustworthy No other trust requirement is placed Security Requirements Confidentiality Authentication Integrity Freshness Secure Group Management Availability Graceful degradatio

文档评论(0)

1亿VIP精品文档

相关文档