Muutke küpsiste eelistusi

Secure Sensor Cloud [Pehme köide]

The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned.

The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.

Preface xi
Acknowledgments xiii
1 Introduction 1(16)
1.1 Wireless Sensing Devices and Wireless Sensor Networks
1(2)
1.2 Sensor Cloud
3(5)
1.2.1 Sensor Cloud Layered Architecture
4(1)
1.2.2 Virtual Sensors
5(2)
1.2.3 Sensor Cloud Delivery Models
7(1)
1.3 Secure Sensor Cloud
8(9)
2 Preliminaries 17(10)
2.1 Security Risk Assessment
17(4)
2.1.1 Risk Assessment Methodologies
17(4)
2.2 Cryptographic Operations
21(3)
2.2.1 Homomorphic Encryption
21(1)
2.2.2 Paillier Encryption
22(1)
2.2.3 Elliptic Curve Cryptography
22(1)
2.2.4 Key Policy Attribute-Based Encryption
23(1)
2.2.5 Proxy Re-Encryption
24(1)
2.3 Other Mathematical Primitives
24(3)
2.3.1 Bilinear Maps
24(1)
2.3.2 Shamir's Secret Sharing
25(1)
2.3.3 Bloom Filter
25(2)
3 Sensor Cloud Architecture and Implementation 27(18)
3.1 Virtual Sensors
28(2)
3.2 Sensor Cloud Architecture
30(3)
3.2.1 Client-Centric Layer
30(2)
3.2.2 Middleware Layer
32(1)
3.2.3 Sensor-Centric Layer
32(1)
3.3 Software Design
33(1)
3.4 QoS in Sensor Cloud
34(1)
3.5 Implementation
34(8)
3.5.1 System Setup
34(1)
3.5.2 Middleware Implementation Details
35(3)
3.5.3 Backend Base Station Server Implementation Details
38(1)
3.5.4 Data Streaming for Multi-user Environment
39(1)
3.5.5 Virtual Sensor Implementation
40(2)
3.5.6 Time Model for Virtual Sensors
42(1)
3.6 Summary
42(3)
4 Risk Assessment in a Sensor Cloud 45(24)
4.1 Introduction
45(3)
4.2 Risk Assessment Framework for WSN in a Sensor Cloud
48(13)
4.2.1 Attack Graphs for Wireless Sensor Networks
49(4)
4.2.2 Quantitative Risk Assessment by Modeling Attack Graphs Using Bayesian Networks
53(7)
4.2.3 Time Frame Estimations
60(1)
4.3 Use Case Scenario Depicting the Risk Assessment Framework
61(4)
4.3.1 Attack Graph for Confidentiality
61(3)
4.3.2 Time Frame Estimations
64(1)
4.4 Discussions
65(2)
4.4.1 Complexity Analysis and Scalability
65(1)
4.4.2 Risk Assessment vs. Intrusion Detection Systems
66(1)
4.5 Summary
67(2)
5 Secure Aggregation of Data in a Sensor Cloud 69(12)
5.1 Introduction
69(1)
5.2 Related work
70(2)
5.3 Secure Hierarchical Data Aggregation Algorithm
72(3)
5.3.1 Modified ECDSA Signature Algorithm
72(2)
5.3.2 EC Elgamal Encryption
74(1)
5.4 Privacy and Integrity Preserving Data Aggregation (PIP)
75(4)
5.4.1 The PIP Algorithm
76(1)
5.4.2 Numerical Example
77(2)
5.5 Summary
79(2)
6 Access Control of Aggregated Data in Sensor Clouds 81(16)
6.1 Introduction
81(1)
6.2 Related Work
82(1)
6.3 Models
83(1)
6.3.1 System Model
83(1)
6.3.2 Adversary Model
83(1)
6.4 Access Control Policy
84(3)
6.5 Overview of the Scheme
87(1)
6.6 Access Control Scheme
87(3)
6.6.1 System Setup
87(1)
6.6.2 Access Control Secret Key Generation
87(1)
6.6.3 Data Aggregation Key Generation
88(1)
6.6.4 Data Aggregation Key Establishment
89(1)
6.6.5 Data Aggregation
90(1)
6.7 Discussion
90(1)
6.8 Revocation of Users
91(1)
6.9 Modifying Access at Runtime
92(2)
6.9.1 Encryption Scheme for Modifying Access at Runtime
93(1)
6.9.2 Protocol for Modifying Access at Runtime
94(1)
6.10 Security Analysis
94(1)
6.11 Summary
95(2)
7 Efficient and Secure Code Dissemination in Sensor Clouds 97(16)
7.1 Introduction
97(1)
7.2 Related Work
98(2)
7.3 System Model and Assumptions
100(1)
7.4 Proposed Approach
101(1)
7.5 The EC-BBS Proxy Re-Encryption Scheme
102(1)
7.6 Detecting Common Functions
103(1)
7.7 Proposed Algorithm
104(7)
7.7.1 Pre-Deployment Phase
104(2)
7.7.2 Pre-Dissemination
106(1)
7.7.3 Code Dissemination
107(2)
7.7.4 Activity on the Nodes
109(2)
7.8 A Discussion on Security
111(1)
7.8.1 Confidentiality of Code
111(1)
7.8.2 Integrity of Code
112(1)
7.9 Summary
112(1)
Bibliography 113(12)
Authors' Biographies 125