![Page 1: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/1.jpg)
Emerging Paradigms in SensorEmerging Paradigms in SensorNetwork SecurityNetwork Security
Prof. Deepa Kundur, Ph.D.Prof. Deepa Kundur, Ph.D.
Department of Electrical EngineeringTexas A&M University
![Page 2: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/2.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
SeSensor nsor MMediediaa AAlgorthms lgorthms & & NNeettworkingworkingfor for TTrusted rusted IIntelligent ntelligent CComputingomputing((SeMANTICSeMANTIC) Group) Group Dr. Deepa Kundur
Undergrad Researchers:
Ph.D. Students Anli Chen Alexandra Czarlinska Chuhong Fei William Luh Nebu Mathai Unoma Ndili Samer Al-Kiswamy
Ashly Kirkland, Jim Griffin, Kyle Marshall, Scott Savage, PeterMehl, Zuber Abdella
![Page 3: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/3.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
What is a Sensor Network?What is a Sensor Network?
Well-known definition: communication + computation + inference
+ actuation
Applications: Environmental monitoring, “smart” spaces,
collaborative media interfaces Military, civilian and industrial surveillance,
unmanned aerial and ground vehicles
![Page 4: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/4.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Properties of Sensor NetworksProperties of Sensor Networks
Redundant Collaborative Data-centric Actuating Application-
specific
Ad hoc Untethered Autonomous Hierarchical
![Page 5: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/5.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
RedundantAd hocCollaborativeHierarchicalAutonomousActuationUntetheredApplication-Specific
![Page 6: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/6.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Sensor Nets and SecuritySensor Nets and Security
Resource Constraints Wireless communications
Collaborative Processing/Aggregation Interaction with Physical Environment
Sensing Actuation
![Page 7: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/7.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Security StrategiesSecurity Strategies
Establish Trust Limit Trust Distribute Trust Discriminate Trust
KEY MANAGEMENT
![Page 8: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/8.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Limiting Trust.Limiting Trust.
![Page 9: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/9.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Secure AggregationSecure AggregationBASESTATION
LARGE SCALE STATICAGGREGATION
SMALL SCALEMOBILE AGGREGATION
![Page 10: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/10.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Statistical Disclosure Control Used by Census Bureaus to modify raw data
yet preserve statistical properties for laterprocessing
Di -> P[Di] Homomorphic Property:
AGG[D1,D2,…,Dn] =AGG[P[D1], P[D2],…, P[Dn]]
Secure AggregationSecure Aggregation
![Page 11: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/11.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Secure Multiparty Computation Cooperative computation among two or
more parties in which no party discloses itsinput to the others or can have it estimatedfrom the computation result
Result known to Aggregator:E[AGG[D1,D2,…,Dn]]
Keying information is not employed foraggregation, so attacker is forced toapply a severe DoS attack
Secure AggregationSecure Aggregation
![Page 12: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/12.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
MultimediaMultimedia
Secure Scalable Coding Scalable coding + progressive encryption (Wee & Apostolopoulos, 2001)
Watermarking/Steganography Transparent passive security Authentication, copy control, …
![Page 13: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/13.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Distributing Trust.Distributing Trust.
![Page 14: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/14.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Threshold Secret SharingThreshold Secret Sharing
Separate a secret into w parts such thatat least t of them are required toreconstruct the secret (Shamir, 1979)
Visual cryptography (Naor, Shamir, 1994)
![Page 15: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/15.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
INSIDER ATTACK!
![Page 16: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/16.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Visual Secret SharingVisual Secret Sharing
PERCEPTUALLYINSECURE!
Courtesy ofWilliam Luh
![Page 17: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/17.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Perceptual security considerations Computational security considerations Energy considerations
Visual Secret SharingVisual Secret Sharing
![Page 18: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/18.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Discriminative Trust.Discriminative Trust.
![Page 19: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/19.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Encryption and CompressionEncryption and Compression
CompressionEncryptioncontent securedcontent
poor compression
Compression Encryptioncontentsecuredcontent
incompatible format
Cmpr I Encryption Cmpr IIcontent securedcontent
compromise
![Page 20: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/20.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Selective EncryptionI IBB BB BB BBPP
Group of Pictures (GoP)
SpanosandMaples(1996)
![Page 21: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/21.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
I-frame Coding
Quantization Q(.)
Transform eg., DCT, DWT
EntropyCoding8x8 Blocking
Metadata (Huffman tables, headers, synchronizationinformation, etc.)
||
EntropyDecoding
De-quantization
Inv Transform eg., IDCT, IDWT
BlockRecomposition
Metadata (Huffman tables, headers, synchronizationinformation, etc.)
![Page 22: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/22.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Selective Encryption
Quantization Q(.)
Transform eg., DCT, DWT8x8 Blocking
EntropyCodingScrambling
Scramble: Coefficient order (zigzag scan) Signs of coefficients
![Page 23: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/23.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Sign Scrambling (Shi and Bhargava, 1998)
![Page 24: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/24.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Sign Scrambling (Shi and Bhargava, 1998)
![Page 25: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/25.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Sign Scrambling (Shi and Bhargava, 1998)
![Page 26: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/26.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
ConclusionConclusion
Intelligent networking securityparadigms are embracing multimediaprocessing
![Page 27: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/27.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
MM Security AchievementsMM Security Achievements
Provide finer granularity of access control Facilitate sophisticated content
adaptation in the face of security Enable resilience to insider attack
![Page 28: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/28.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
MM Security InadequaciesMM Security Inadequacies Obfuscation must have a decent
definition of trust Avoid security by obscurity
Perceptual and computational securitymust synergize
Security is made “softer” to account forerror/adaptation Implications to strength of protection?
![Page 29: Emerging Paradigms in Sensor Network Securitygray/birs/slides/kundur.pdf · Emerging Paradigms in Sensor Network Security Prof. Deepa Kundur, Ph.D. Department of Electrical Engineering](https://reader033.vdocuments.us/reader033/viewer/2022060718/607e9ab510ae3f575f6c6613/html5/thumbnails/29.jpg)
© Deepa Kundur, 2005 Electrical Engineering, Texas A&M University
Contact Info:Contact Info:
[email protected] http://www.ee.tamu.edu/~deepa