TAILIEUCHUNG - Sensor Network Security: More Interesting Than You Think ∗

The threat is real and immediate. Essentially, every week there are news reports of some company or organization that has had data stolen – from the Department of Defense to, increasingly, small businesses. Most incidents, of course, are never made public. The potential damage, as we will discuss, involves far more than stolen or damaged data. Cyber is connected to our economy and job creation. It is not just national security information that is being stolen from databases in the . All kinds of intellectual property are targeted. Information stolen from. | Sensor Network Security More Interesting Than You Think Madhukar Anand Eric Cronin Micah Sherr Matt Blaze Zachary Ives and Insup Lee Department of Computer and Information Science University of Pennsylvania anandm ecronin msherr blaze zives lee @ Abstract With the advent of low-power wireless sensor networks a wealth of new applications at the interface of the real and digital worlds is emerging. A distributed computing platform that can measure properties of the real world formulate intelligent inferences and instrument responses requires strong foundations in distributed computing artificial intelligence databases control theory and security. Before these intelligent systems can be deployed in critical infrastructures such as emergency rooms and powerplants the security properties of sensors must be fully understood. Existing wisdom has been to apply the traditional security models and techniques to sensor networks. However sensor networks are not traditional computing devices and as a result existing security models and methods are ill suited. In this position paper we take the first steps towards producing a comprehensive security model that is tailored for sensor networks. Incorporating work from Internet security ubiquitous computing and distributed systems we outline security properties that must be considered when designing a secure sensor network. We propose challenges for sensor networks - security obstacles that when overcome will move us closer to decreasing the divide between computers and the physical world. 1 Introduction The advent of low-powered wireless networks of embedded sensors HSW 00 MFHH03 ABC 04 has spurred the development of new applications at the interface between the real world and its digital manifestation. A distributed computing platform that can measure properties of the real world formulate intelligent inferences and instrument responses requires a new class of techniques in distributed computing artificial .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.