- Browse by Author
Browsing by Author "ZareAfifi, Saharnaz"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Cluster Base Network: A Neighborhood Watch Approach(Office of the Vice Chancellor for Research, 2013-04-05) ZareAfifi, Saharnaz; King, BrianSensors can significantly impact one’s life, they can be used to measure various phenomena such as CO2, temperature, chemicals, water quality, etc. They can also be used in surveillance situations. The data collected by the sensors is processed into information from which decisions are made. Faulty information could cause severe problems. For example, a CO2 sensor with a low battery charge may trigger a false CO2 alarm, causing emergency personnel to respond, thus causing a temporary shortage of personnel able to respond to real emergencies. This situation is exacerbated in a sensor network where data collected is highly sensitive and decisions are important. Furthermore, sensor networks are ad-hoc in nature, with no central authority to analyze network behavior. A goal of our research is to construct energy efficient mechanisms that increase the integrity of the data collected within the sensor network in the presence of potential malicious behavior, sensors with weakened battery power, and/or faulty sensors. A mechanism that we have used in our research is a cluster-based approach. Here the ad-hoc network is partitioned into small clusters. Data collection, communications and processing can be observed by cluster members. The cluster members can police each other, assessing the trustworthiness of each member and collectively signing this assessment. Thus sensors can act as neighborhood watch in a large city, in the sense neighbors watch each other's house to protect each other and enhance the security of the neighborhood. In this research, we developed an energy efficient network protocol that constructs clusters without the use of a central authority. We have also constructed an energy efficient protocol for a cluster to assess members’ trustworthiness and mechanisms that allow the cluster to sign this assessment.Item Securing Sensor Networks(Office of the Vice Chancellor for Research, 2012-04-13) ZareAfifi, Saharnaz; Verma, Romil; King, BrianSensors can have significant impact on one's life. They can measure temperature, level of humidity, speed, motion, distance, light or the presence/absence of an object and many other phenomena and then these measurements can be processed together to provide the information that we use to make informative decisions. Today with the use of smart devices, such as iPhone, android phones, etc, we can interface with these sensors and use them in our daily lives. In the future, we will encounter even more intelligent and precise sensors, some that can significantly change our society. For example, consider sensors which can track eye movements and then process these movements to move the cursor within a windows session on a computer [1], envision how this could impact a paraplegic or even be applied within a computer aided surgical unit. Consider future sensors that can analyze the protein contents of a single cell and how they can be used in applications for medical diagnosis [2] or sensors that allow you to track and modify your energy usage [3]. Again, a potential conduit to these sensors may be our smart devices. In general, these sensors will provide us data, for which we can make decisions that improve our lives. In the future these sensors will be interconnected, data will be collected, and processed and automated decisions will be made and implemented by our smart devices. If humans collect the data to make information, i.e. make decisions, then the human can intercede when they view the data is inaccurate, but if devices make automated decisions then such information/decisions will be limited by the accuracy of the sensor data. We cannot rely on faulty information generated by inaccurate data. Faulty data can be generated by sensors that are acting improperly, perhaps because of a consumed power source (i.e. battery) or by entities, i.e. malicious parties, who infuse false data into the sensor network. The potential of a malicious party within the sensor network exists, and in order for us to rely on the sensor data we must be able to detect faulty data as well as malicious behavior (possibly by the sensor device). In this research project we will explore several potential attacks to the sensor network. In this work, we will briefly discuss two security problems. First, if a sensor is sending faulty data then the information generated can be faulty. This information is usually characterized as data aggregation (the data from multiple sensors is aggregated into information) and such an attack is characterized as the Data Aggregation attack. In this project, we will explore methods to detect the Data Aggregation attack and develop countermeasures to protect against the attack. Secondly, because malicious parties (or sensors) may exist, there is a potential in an automated system, of one device accusing another device of inappropriate behavior. For example, a malicious device may accuse other devices to avoid detection. This type of attack is characterized as the Reputation attack. In this work we will discuss the Reputation and Data Aggregation attacks, and develop power friendly countermeasures (fewer complexes with small amount of calculation) to these attacks.