Preface |
|
xi | |
Acknowledgments |
|
xiii | |
1 Introduction |
|
1 | (16) |
|
1.1 Wireless Sensing Devices and Wireless Sensor Networks |
|
|
1 | (2) |
|
|
3 | (5) |
|
1.2.1 Sensor Cloud Layered Architecture |
|
|
4 | (1) |
|
|
5 | (2) |
|
1.2.3 Sensor Cloud Delivery Models |
|
|
7 | (1) |
|
|
8 | (9) |
2 Preliminaries |
|
17 | (10) |
|
2.1 Security Risk Assessment |
|
|
17 | (4) |
|
2.1.1 Risk Assessment Methodologies |
|
|
17 | (4) |
|
2.2 Cryptographic Operations |
|
|
21 | (3) |
|
2.2.1 Homomorphic Encryption |
|
|
21 | (1) |
|
2.2.2 Paillier Encryption |
|
|
22 | (1) |
|
2.2.3 Elliptic Curve Cryptography |
|
|
22 | (1) |
|
2.2.4 Key Policy Attribute-Based Encryption |
|
|
23 | (1) |
|
2.2.5 Proxy Re-Encryption |
|
|
24 | (1) |
|
2.3 Other Mathematical Primitives |
|
|
24 | (3) |
|
|
24 | (1) |
|
2.3.2 Shamir's Secret Sharing |
|
|
25 | (1) |
|
|
25 | (2) |
3 Sensor Cloud Architecture and Implementation |
|
27 | (18) |
|
|
28 | (2) |
|
3.2 Sensor Cloud Architecture |
|
|
30 | (3) |
|
3.2.1 Client-Centric Layer |
|
|
30 | (2) |
|
|
32 | (1) |
|
3.2.3 Sensor-Centric Layer |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (8) |
|
|
34 | (1) |
|
3.5.2 Middleware Implementation Details |
|
|
35 | (3) |
|
3.5.3 Backend Base Station Server Implementation Details |
|
|
38 | (1) |
|
3.5.4 Data Streaming for Multi-user Environment |
|
|
39 | (1) |
|
3.5.5 Virtual Sensor Implementation |
|
|
40 | (2) |
|
3.5.6 Time Model for Virtual Sensors |
|
|
42 | (1) |
|
|
42 | (3) |
4 Risk Assessment in a Sensor Cloud |
|
45 | (24) |
|
|
45 | (3) |
|
4.2 Risk Assessment Framework for WSN in a Sensor Cloud |
|
|
48 | (13) |
|
4.2.1 Attack Graphs for Wireless Sensor Networks |
|
|
49 | (4) |
|
4.2.2 Quantitative Risk Assessment by Modeling Attack Graphs Using Bayesian Networks |
|
|
53 | (7) |
|
4.2.3 Time Frame Estimations |
|
|
60 | (1) |
|
4.3 Use Case Scenario Depicting the Risk Assessment Framework |
|
|
61 | (4) |
|
4.3.1 Attack Graph for Confidentiality |
|
|
61 | (3) |
|
4.3.2 Time Frame Estimations |
|
|
64 | (1) |
|
|
65 | (2) |
|
4.4.1 Complexity Analysis and Scalability |
|
|
65 | (1) |
|
4.4.2 Risk Assessment vs. Intrusion Detection Systems |
|
|
66 | (1) |
|
|
67 | (2) |
5 Secure Aggregation of Data in a Sensor Cloud |
|
69 | (12) |
|
|
69 | (1) |
|
|
70 | (2) |
|
5.3 Secure Hierarchical Data Aggregation Algorithm |
|
|
72 | (3) |
|
5.3.1 Modified ECDSA Signature Algorithm |
|
|
72 | (2) |
|
5.3.2 EC Elgamal Encryption |
|
|
74 | (1) |
|
5.4 Privacy and Integrity Preserving Data Aggregation (PIP) |
|
|
75 | (4) |
|
|
76 | (1) |
|
|
77 | (2) |
|
|
79 | (2) |
6 Access Control of Aggregated Data in Sensor Clouds |
|
81 | (16) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
6.4 Access Control Policy |
|
|
84 | (3) |
|
6.5 Overview of the Scheme |
|
|
87 | (1) |
|
6.6 Access Control Scheme |
|
|
87 | (3) |
|
|
87 | (1) |
|
6.6.2 Access Control Secret Key Generation |
|
|
87 | (1) |
|
6.6.3 Data Aggregation Key Generation |
|
|
88 | (1) |
|
6.6.4 Data Aggregation Key Establishment |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
6.9 Modifying Access at Runtime |
|
|
92 | (2) |
|
6.9.1 Encryption Scheme for Modifying Access at Runtime |
|
|
93 | (1) |
|
6.9.2 Protocol for Modifying Access at Runtime |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (2) |
7 Efficient and Secure Code Dissemination in Sensor Clouds |
|
97 | (16) |
|
|
97 | (1) |
|
|
98 | (2) |
|
7.3 System Model and Assumptions |
|
|
100 | (1) |
|
|
101 | (1) |
|
7.5 The EC-BBS Proxy Re-Encryption Scheme |
|
|
102 | (1) |
|
7.6 Detecting Common Functions |
|
|
103 | (1) |
|
|
104 | (7) |
|
7.7.1 Pre-Deployment Phase |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
107 | (2) |
|
7.7.4 Activity on the Nodes |
|
|
109 | (2) |
|
7.8 A Discussion on Security |
|
|
111 | (1) |
|
7.8.1 Confidentiality of Code |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
Bibliography |
|
113 | (12) |
Authors' Biographies |
|
125 | |