DOC PREVIEW
UCF EEL 6788 - Security and Privacy Issues in Wireless Communication

This preview shows page 1-2-3-4-5 out of 15 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1AgendaIntroductionFormal definitions-SecurityFormal definition-PrivacySensor NetworksSensor NetworksWireless Physical Layer ProtectionNetwork Level PrivacyReceiver Location ProtectionSource Location ProtectionSource Location ProtectionPath ForwardConclusionQuestionsSecurity and Privacy Issues in Wireless CommunicationBy: Michael Glus, MSEEEEL 678811Agenda•Introduction•Challenges•Sensor Networks•Solutions Presented•Path Forward•Conclusion2Introduction•Security and privacy are a large concern with technology in our society•Anyone with an internet enabled cell phone can potentially transmit sensitive personal information wirelessly•Identity threats are everywhere and security/privacy must be taken into account when using any technology3Formal definitions-Security•Authentication: To make sure the sender and receiver are the correct parties to transmit data between•Confidentiality: To prevent unauthorized disclosure of information to outsiders•Integrity: To ensure that the information being transmitted is correct and unmodified. Modified can mean deletion, rearrangement, creation, or delay.•Non-repudiation: To make sure the sender or receiver has to accept the transmission•Access Control: To limit access to devices and applications •Availability: To ensure that the network is available to users whenever necessary4Formal definition-Privacy•Anonymity: To make sure the users’ identity and the receivers identity is never disclosed unless the user authorizes the disclosure•Non-linkability: The users communication sessions should not be able to be linked together •Context privacy: The users context info (location, length of communication) should not be made available unless the user authorizes it•Confidentiality and integrity: The communications between the user and the receiver should remain confidential and the data should not be comprised in any way5Sensor Networks•Concealing the receiver or source location is a good goal for sensor networks•The receiver (or sink node) could potentially be a single point of failure if all information is funneled to it•There are 2 main ways to discover information: packet tracing and by analyzing the data traffic rate 6Sensor Networks•Content preservation is also important (i.e. data integrity)•Encryption is one method of securing data•Injecting fake packets into the network is another way to secure data because any adversary that intercepts the data should not be able to figure out which packets contain real data–One drawback on fake packets is the bandwidth requirement as well as the energy constraints7Wireless Physical Layer Protection•Physical layer protection is much easier on a wired network as opposed to wireless•The goal is to transmit data between nodes with any adversary in between communication being kept as ignorant as possible•Signal to noise ratio can be exploited to enhance wireless security•As long as the main communication channel has a higher SNR than a potential attackers channel SNR, then the wireless link is said to be secure8Network Level Privacy•Network level privacy can be broken down into four subcategories:–Sender node location preservation: no intermediate nodes have any information about the location (in terms of physical distance or number of hops) about the sender node except the source, its immediate neighbors, and the destination–Sender node identity privacy: no intermediate nodes can get any information about who is sending the packets except the source, its immediate neighbors, and the destination–Route privacy: no nodes or adversary can predict the information about the complete path from source to destination–Data packet privacy: no nodes are able to see the information inside a payload of the data packet except the source and destination9Receiver Location Protection•Concealing the receiver location is paramount in a sensor network. •Standard routing protocols generally choose shortest path to conserve energy and computing power•A proposed solution is to random routing path complemented with fake packet injection10Source Location Protection•Source location protection is similar to concealing the receiver location•One solution proposed was where packets were randomly forwarded to one node and then onto a mixing ring•The mixing ring is a ring of nodes used to pass the packet a random number of times before passing the packet to the receiver•This allows protection because an adversary would have a hard time figuring out where a packet came from (source)11Source Location Protection•Another solution used for source location protection is a directed random walk•A directed random walk uses the idea of levels•A receiver node has level=0 before a packet arrives, once a packet arrives then the sender node has level=1 and the receiver node will have level=1 after it forwards it to the next node with equal probability•This allows the packet to take a “walking” path to its final destination•Since the next node selection is random, this idea protects the source location12Path Forward•Network/Technology designers should work together with potential users to try to mitigate any security/privacy concerns•A policy should be adopted to complement the technology, this way security and privacy can be assured •This collaboration will lead to more robust systems and also more user friendly systems13Conclusion•Security and privacy issues will continue to evolve as technology advances•Network designers must take various potential threats into account •The solutions presented provide a good baseline for network design, the main issues were highlighted•More research will be conducted as different technologies are developed14Questions•If you have any questions regarding the presentation please don’t hesitate to send me an email at [email protected]•Thanks for your


View Full Document

UCF EEL 6788 - Security and Privacy Issues in Wireless Communication

Documents in this Course
Load more
Download Security and Privacy Issues in Wireless Communication
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Security and Privacy Issues in Wireless Communication and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Security and Privacy Issues in Wireless Communication 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?