• Title/Summary/Keyword: secure aggregation

Search Result 33, Processing Time 0.024 seconds

Trust-Based Filtering of False Data in Wireless Sensor Networks (신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거)

  • Hur, Jun-Beom;Lee, Youn-Ho;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.76-90
    • /
    • 2008
  • Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.

An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network (무선 센서 네트워크에서 최소 통신비용 수행을 위한 허위 데이터 식별 프로토콜)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.121-129
    • /
    • 2011
  • In wireless sensor networks, a compromised sensor node can inject false data during data aggregation. Existing solutions of securing data aggregation require high communication cost in securing data aggregation. In this paper, we propose a monitoring-based secure data aggregation protocol that minimizes communication cost of identifying the location of false data injection attacks. The main idea is that when monitoring nodes find an injected false data, their reporting messages along with Message Authentication Codes (MACs) are summarized in a single message before sending it to the Base Station (BS). Then the BS identifies the attacking node. The simulation shows that energy consumption of the proposed protocol with short and normal concatenations of MACs are 45% and 36% lower than that of an existing protocol, respectively.

The Design and Implementation Methodology of Multilevel Secure Data Model Using Object Modelling Technique (객체 모델링 기법을 이용한 다단계 보안 데이터 모델의 설계와 구현 방안)

  • 심갑식
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.3
    • /
    • pp.49-62
    • /
    • 1998
  • 본 논문은 객체 모델링 기법을 이용하여 다단계 보안 데이터베이스 응용에 대한 구조적 특징을 표현하기 위한 모델을 제시한다. 즉, 응용 영역에 대한 데이터와 보안 의미르 통합한다. 이는 응용 영역의 데이터에 대한 불법적 유출이나 수정을 방지하는 도구가 된다 . 개발한 도구를 기초로 한 구현 모델에서는 다단계 데이터베이스를 단일 보안등급 데이터베이스들로 분해한다. 인스턴스뿐만 아니라 스키마도 보호하며 속성값 다중 인스턴스화 기법을 이용하여 커버 스토리를 표현한다. 그리고 그 모델에서의 생성, 검색, 삭제, 그리고 갱신과 같은 연산 의미를 설명한다.

A Study of RDF Security Concerns in Semantic Web

  • Ubaidullah, Ubaidullah;Abbas, Fizza;Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.906-909
    • /
    • 2013
  • The Semantic Web is leading us to a world of information sharing by enabling distributed knowledge aggregation and creation. RDF is the foundations of the Semantic Web. For secure Semantic web we need to secure RDF as well. Unauthorized access to an RDF document can change or damage its semantics or manipulate the relations between resources. This article includes the study of RDF security issues and analysis of the existing solutions. After finding limitations of existing solution, a hybrid approach has been proposed.

Secure and Robust Clustering for Quantized Target Tracking in Wireless Sensor Networks

  • Mansouri, Majdi;Khoukhi, Lyes;Nounou, Hazem;Nounou, Mohamed
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.164-172
    • /
    • 2013
  • We consider the problem of secure and robust clustering for quantized target tracking in wireless sensor networks (WSN) where the observed system is assumed to evolve according to a probabilistic state space model. We propose a new method for jointly activating the best group of candidate sensors that participate in data aggregation, detecting the malicious sensors and estimating the target position. Firstly, we select the appropriate group in order to balance the energy dissipation and to provide the required data of the target in the WSN. This selection is also based on the transmission power between a sensor node and a cluster head. Secondly, we detect the malicious sensor nodes based on the information relevance of their measurements. Then, we estimate the target position using quantized variational filtering (QVF) algorithm. The selection of the candidate sensors group is based on multi-criteria function, which is computed by using the predicted target position provided by the QVF algorithm, while the malicious sensor nodes detection is based on Kullback-Leibler distance between the current target position distribution and the predicted sensor observation. The performance of the proposed method is validated by simulation results in target tracking for WSN.

Analysis and Compensation of STO Effects in the Multi-band OFDM Communication System of TDM Reception Method (TDM 수신 방식의 멀티 대역 OFDM 통신 시스템에서 STO 특성 분석 및 보상)

  • Lee, Hui-Kyu;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5A
    • /
    • pp.432-440
    • /
    • 2011
  • For the 4th generation mobile communication, LTE-advanced system needs the broad frequency band up to 100MHz for providing the data rate of maximum 1Gpbs. However, it is very difficult to secure the broad frequency band in the current frequency allocation situation. So, carrier aggregation was proposed as the solution, in which several fragmented frequency bands are used at the same time. Basically, multiple parallel receivers are required to get the information data from the different frequency bands but this conventional multi-chain receiver system is very inefficient. Therefore, in this paper, we like to study the single chain system that is able to receive the multi-band signals in a single receiver based on the time division multiplexing (TDM) reception method. This proposed TDM receiver efficiently manage to receive the multi-band signals in time domain and handle the baseband signals with one DSP board. However, the serious distortion could be generated by the sampling timing offset (STO) in the TDM-based system. Therefore, we like to analyze STO effects in the TDM-based system and propose a compensation method using estimated STO. Finally, it is shown by simulation that the proposed method is appropriate for the single chain receiver and show good compensation performance.

Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption

  • Babamir, Faezeh Sadat;Eslami, Ziba
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2940-2955
    • /
    • 2012
  • In this paper, we propose aggregate signcryption for achieving data security in UWSNs. The main challenge of these networks established in sensitive environments is offline sink visiting. Moreover, the sensors must retain collected data for long enough time to offload them onto the itinerant sink. Thus, the unattended nature of data collection intervals might offer the adversary the opportunity to apply various attacks without detection. In this paper, employing low order operations (in time and space), we propose a new secure scheme in which various security goals such as confidentiality (through encrypting), authentication and integrity (through signing) are achieved. In addition, the aggregation process of our scheme reduces the space and communication overheads both for sensors and sink, i.e. the proposed technique efficiently enables the sensors and sink to protect, verify and recover all the related data. We further compare our scheme with the best alternative work in the literature.

A Study on the de-identification of Personal Information of Hotel Users (호텔 이용 고객의 개인정보 비식별화 방안에 관한 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.51-58
    • /
    • 2016
  • In the area of hotel and tourism sector, various research are analyzed using big data. Big data is being generated by any digital devices around us all the times. All the digital process and social media exchange produces the big data. In this paper, we analyzed the de-identification method of big data to use the personal information of hotel guests. Through the analysis of these big data, hotel can provide differentiated and diverse services to hotel guests and can improve the service and support the marketing of hotels. If the hotel wants to use the information of the guest, the private data should be de-identified. There are several de-identification methods of personal information such as pseudonymisation, aggregation, data reduction, data suppression and data masking. Using the comparison of these methods, the pseudonymisation is discriminated to the suitable methods for the analysis of information for the hotel guest. Also, among the pseudonymisation methods, the t-closeness was analyzed to the secure and efficient method for the de-identification of personal information in hotel.

A Study on Secure and Statistical Data Aggregation in Ad Hoc Networks (애드혹 네트워크에서 안전한 통계정보수집 기법에 관한 연구)

  • Cho, Kwantae;Lee, Byung-Gil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.561-563
    • /
    • 2014
  • 애드혹 네트워크(Ad Hoc Network)는 최근 이슈가 되고 있는 사물 간 인터넷(Internet of Things), 스마트그리드(Smart Grid), 사람 중심 도시 센싱(People-Centric Urban Sensing), 해상 통신(Maritime Communications) 환경에서 다양하게 활용되는 네트워크 구조다. 이러한 환경에서의 애플리케이션들은 사용자들에게 다양한 편의성을 제공하기 위하여 사용자의 민감한 프라이버시 정보를 요구하기도 한다. 하지만, 만약 수집되어지는 프라이버시 정보가 인가되지 않은 공격자에게 노출된다면, 사용자는 불안함을 호소할 수 있을 것이고, 동시에 해당 데이터를 수집하고자 했던 서비스제공자는 경제적으로 커다란 손실을 입을 수 있다. 이러한 프라이버시 정보 노출을 방지하기 위하여 안전한 데이터 수집 기법들이 연구되어 왔다. 하지만, 대부분의 기법들은 기밀성만 제공할 뿐, 부인방지 및 익명성은 제공하지 않는다. 그리고 더 나아가 기존 기법들은 통계정보 수집과 개별적인 정보 수집을 동시에 제공하지 않는다. 본 논문은 개별정보수집 및 통계정보 수집을 모두 지원하며 동시에, 사용자에게 강화된 익명성 개념인 비연결성을 제공하는 새로운 데이터 수집 기법을 소개한다.