Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems

被引:64
作者
Cardenas, Alvaro A. [1 ]
Roosta, Tanya [1 ]
Sastry, Shankar [1 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
基金
美国国家科学基金会;
关键词
Sensor networks; Survey; Taxonomy; Threat models; Security requirements;
D O I
10.1016/j.adhoc.2009.04.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years we have witnessed the emergence and establishment of research in sensor network security. The majority of the literature has focused on discovering numerous vulnerabilities and attacks against sensor networks, along with suggestions for corresponding countermeasures. However, there has been little guidance for understanding the holistic nature of sensor network security for practical deployments. In this paper, we discuss these concerns and propose a taxonomy composed of the security properties of the sensor network, the threat model, and the security design space. In particular, we try to understand the application-layer goals of a sensor network, and provide a guide to research challenges that need to be addressed in order to prioritize our defenses against threats to application-layer goals. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1434 / 1447
页数:14
相关论文
共 30 条
  • [1] Alliance ZigBee., 2005, ZigBee Specifications
  • [2] [Anonymous], ACM WORKSH SEC AD HO
  • [3] BERBER B, 1995, METHODS MODEL BASED, pCH2
  • [4] Cardenas A.A., 2007, INFOCOM
  • [5] Chan H., 2003, IEEE S RES SEC PRIV
  • [6] On the distribution and revocation of cryptographic keys in sensor networks
    Chan, HW
    Gligor, VD
    Perrig, A
    Muralidharan, G
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) : 233 - 247
  • [7] Douceur J.R., 2002, IPTPS 01
  • [8] DU W, 2003, 10 ACM C COMP COMM S
  • [9] Eisenhauer J., 2006, ROADMAP SECURE CONTR
  • [10] Eschenauer L., 2002, P 9 ACM C COMP COMM, P41, DOI DOI 10.1145/586110.586117