adaptive security and privacy for mhealth sensing
play

Adaptive security and privacy for mHealth sensing Shrirang Mare 1 , - PowerPoint PPT Presentation

Adaptive security and privacy for mHealth sensing Shrirang Mare 1 , Jacob Sorber 1 , Minho Shin 2 , Cory Cornelius 1 , and David Kotz 1 1 Dartmouth College, USA 2 Myongi University, South Korea Source: Javanov et. al., Stress Monitoring Using a


  1. Adaptive security and privacy for mHealth sensing Shrirang Mare 1 , Jacob Sorber 1 , Minho Shin 2 , Cory Cornelius 1 , and David Kotz 1 1 Dartmouth College, USA 2 Myongi University, South Korea

  2. Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System ,

  3. Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System ,

  4. Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System ,

  5. Secure, private, and efficient protocol Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System ,

  6. Wireless protocols Mobile Node Sensor Node Payload Header MAC 0xa170c3 Encrypted Data 0xa21b3d Fixed address a1:70:c3

  7. Wireless protocols Mobile Node Sensor Node Payload Header MAC 0xa170c3 Encrypted Data 0xa21b3d Fixed address a1:70:c3 0xa170c3 Encrypted Data 0x001e72

  8. Privacy preserving wireless protocols Mobile Node Sensor Node Payload Header MAC 0x7a0d1e Encrypted Data 0xa21b3d Address pool 7a:0d:1e 47:c2:23 17:dc:b2

  9. Privacy preserving wireless protocols Mobile Node Sensor Node Payload Header MAC 0x7a0d1e Encrypted Data 0xa21b3d Address pool 7a:0d:1e 47:c2:23 17:dc:b2 0x17dcb2 Encrypted Data 0x001e72

  10. Packet overhead In Wi-Fi networks Header Payload MAC MAC Header 4-16 bytes 16 bytes 1000+ bytes

  11. Packet overhead In Wi-Fi networks Header Payload MAC MAC Header 4-16 bytes 16 bytes 1000+ bytes In medical sensor networks Payload ~10-50 bytes

  12. Packet overhead In Wi-Fi networks Payload MAC Header 4-16 bytes 16 bytes 1000+ bytes In medical sensor networks Header Payload MAC ~10-50 bytes

  13. Packet overhead In Wi-Fi networks Payload MAC Header 4-16 bytes 16 bytes 1000+ bytes In medical sensor networks Header Payload MAC ~10-50 bytes

  14. Adversary Non-adaptive protocol

  15. Overhead Adversary Non-adaptive protocol

  16. Overhead Adversary Non-adaptive protocol Adaptive protocol

  17. Overhead Adversary Non-adaptive protocol Adaptive protocol

  18. Adaptive packet overhead Payload Header MAC

  19. Adaptive packet overhead Payload Header MAC

  20. Packet filtering logic 0x7a0da1 Encrypted Data 0xa21b3d Header MAC

  21. Packet filtering logic 0x7a0da1 Encrypted Data 0xa21b3d Header MAC

  22. Packet filtering logic Accept Packet 0x7a0da1 Encrypted Data 0xa21b3d Header MAC

  23. Packet filtering logic Accept Packet 0x7a0da1 Encrypted Data 0xa21b3d Header MAC 0xa962b2 Encrypted Data 0xd7c012

  24. Packet filtering logic Accept Packet 0x7a0da1 Encrypted Data 0xa21b3d Header MAC Ignore 0xa962b2 Encrypted Data 0xd7c012 Packet

  25. Packet filtering logic Accept Packet 0x7a0da1 Encrypted Data 0xa21b3d Header MAC Ignore 0xa962b2 Encrypted Data 0xd7c012 Packet 0xa962c3 Encrypted Data 0xd7c012

  26. Packet filtering logic Accept Packet 0x7a0da1 Encrypted Data 0xa21b3d Header MAC Ignore 0xa962b2 Encrypted Data 0xd7c012 Packet 0xa962c3 Encrypted Data 0xd7c012

  27. Packet filtering logic Accept Packet 0x7a0da1 Encrypted Data 0xa21b3d Header MAC Ignore 0xa962b2 Encrypted Data 0xd7c012 Packet Forgery 0xa962c3 Encrypted Data 0xd7c012 attempt

  28. When to adapt? • Security guarantee: During a time period T Pr(successful forgery) < 2 − δ • Successful forgery Header Encrypted Data MAC l Number of forgery attempts = 2 l required to succeed

  29. When to adapt? Pr(successful forgery) in 1 forgery attempt = 1 2 l Pr(successful forgery) in x = 1 − (1 − 1 2 l ) x forgery attempts

  30. When to adapt? Pr(successful forgery) in 1 forgery attempt = 1 2 l Pr(successful forgery) in x = 1 − (1 − 1 2 l ) x < 2 − δ forgery attempts

  31. When to adapt? Pr(successful forgery) in 1 forgery attempt = 1 2 l Pr(successful forgery) in x = 1 − (1 − 1 2 l ) x < 2 − δ forgery attempts x < log(1 − 2 − δ ) log(1 − 1 2 l )

  32. Security throughout the sensor’s lifetime T T T Pr(succ. forgery) < 2 − δ Sensor’s lifetime (L)

  33. Evaluation MN SN 80 Security Bits 60 40 20 Attack 0 0 500 1000 1500 2000 2500 Time (s)

  34. Adaptive security plot 300 250 Bit − level security of protocol 200 150 Adaptive protocol 100 50 0 0 50 100 150 200 250 300 Work done by an adversary (lg scale)

  35. Conclusion • Using fixed large packet overhead is inefficient for low-power sensor networks • because a network is not always in a hostile environment • Adaptive protocol provides privacy and is efficient. • Adaptive protocol provides reasonable security when required

  36. Adaptive security and privacy for mHealth sensing Shrirang Mare 1 , Jacob Sorber 1 , Minho Shin 2 , Cory Cornelius 1 , and David Kotz 1 1 Dartmouth College, USA 2 Myongi University, South Korea

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend