Adaptive security and privacy for mHealth sensing Shrirang Mare 1 , - - PowerPoint PPT Presentation

adaptive security and privacy for mhealth sensing
SMART_READER_LITE
LIVE PREVIEW

Adaptive security and privacy for mHealth sensing Shrirang Mare 1 , - - PowerPoint PPT Presentation

Adaptive security and privacy for mHealth sensing Shrirang Mare 1 , Jacob Sorber 1 , Minho Shin 2 , Cory Cornelius 1 , and David Kotz 1 1 Dartmouth College, USA 2 Myongi University, South Korea Source: Javanov et. al., Stress Monitoring Using a


slide-1
SLIDE 1

Adaptive security and privacy for mHealth sensing

Shrirang Mare1, Jacob Sorber1, Minho Shin2, Cory Cornelius1, and David Kotz1

1 Dartmouth College, USA 2 Myongi University, South Korea

slide-2
SLIDE 2

Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System,

slide-3
SLIDE 3

Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System,

slide-4
SLIDE 4

Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System,

slide-5
SLIDE 5

Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System,

Secure, private, and efficient protocol

slide-6
SLIDE 6

Wireless protocols

0xa170c3 Encrypted Data 0xa21b3d

Mobile Node

Fixed address a1:70:c3

MAC Payload Header

Sensor Node

slide-7
SLIDE 7

Wireless protocols

0xa170c3 Encrypted Data 0xa21b3d

Mobile Node

Fixed address a1:70:c3

MAC Payload Header

0xa170c3 Encrypted Data 0x001e72

Sensor Node

slide-8
SLIDE 8

Privacy preserving wireless protocols

0x7a0d1e Encrypted Data 0xa21b3d

Mobile Node

Address pool 7a:0d:1e 47:c2:23 17:dc:b2

MAC Payload Header

Sensor Node

slide-9
SLIDE 9

Privacy preserving wireless protocols

0x7a0d1e Encrypted Data 0xa21b3d

Mobile Node

Address pool 7a:0d:1e 47:c2:23 17:dc:b2

MAC Payload Header

0x17dcb2 Encrypted Data 0x001e72

Sensor Node

slide-10
SLIDE 10

Payload

16 bytes 4-16 bytes

Packet overhead

Header MAC

In Wi-Fi networks

Header MAC

1000+ bytes

slide-11
SLIDE 11

Payload

16 bytes 4-16 bytes

Packet overhead

Header MAC Payload

In Wi-Fi networks In medical sensor networks

Header MAC

1000+ bytes

~10-50 bytes

slide-12
SLIDE 12

Payload

16 bytes 4-16 bytes

Packet overhead

Header MAC Payload

In Wi-Fi networks In medical sensor networks

Header MAC

1000+ bytes

~10-50 bytes

slide-13
SLIDE 13

Payload

16 bytes 4-16 bytes

Packet overhead

Header MAC Payload

In Wi-Fi networks In medical sensor networks

Header MAC

1000+ bytes

~10-50 bytes

slide-14
SLIDE 14

Non-adaptive protocol

Adversary

slide-15
SLIDE 15

Overhead

Non-adaptive protocol

Adversary

slide-16
SLIDE 16

Overhead

Non-adaptive protocol Adaptive protocol

Adversary

slide-17
SLIDE 17

Overhead

Non-adaptive protocol Adaptive protocol

Adversary

slide-18
SLIDE 18

Adaptive packet

  • verhead

Payload

Header MAC

slide-19
SLIDE 19

Adaptive packet

  • verhead

Payload

Header MAC

slide-20
SLIDE 20

Packet filtering logic

0x7a0da1 Encrypted Data 0xa21b3d

Header MAC

slide-21
SLIDE 21

Packet filtering logic

0x7a0da1 Encrypted Data 0xa21b3d

Header MAC

slide-22
SLIDE 22

Packet filtering logic

0x7a0da1 Encrypted Data 0xa21b3d

Accept Packet

Header MAC

slide-23
SLIDE 23

Packet filtering logic

0x7a0da1 Encrypted Data 0xa21b3d

Accept Packet

0xa962b2 Encrypted Data 0xd7c012

Header MAC

slide-24
SLIDE 24

Packet filtering logic

0x7a0da1 Encrypted Data 0xa21b3d

Accept Packet

0xa962b2 Encrypted Data 0xd7c012

Ignore Packet

Header MAC

slide-25
SLIDE 25

Packet filtering logic

0x7a0da1 Encrypted Data 0xa21b3d

Accept Packet

0xa962b2 Encrypted Data 0xd7c012

Ignore Packet

0xa962c3 Encrypted Data 0xd7c012

Header MAC

slide-26
SLIDE 26

Packet filtering logic

0x7a0da1 Encrypted Data 0xa21b3d

Accept Packet

0xa962b2 Encrypted Data 0xd7c012

Ignore Packet

0xa962c3 Encrypted Data 0xd7c012

Header MAC

slide-27
SLIDE 27

Packet filtering logic

0x7a0da1 Encrypted Data 0xa21b3d

Accept Packet

0xa962b2 Encrypted Data 0xd7c012

Ignore Packet

0xa962c3 Encrypted Data 0xd7c012

Forgery attempt

Header MAC

slide-28
SLIDE 28

When to adapt?

Pr(successful forgery) < 2−δ

Header Encrypted Data MAC

  • Successful forgery
  • Security guarantee: During a time period T

l

Number of forgery attempts required to succeed

= 2l

slide-29
SLIDE 29

When to adapt?

Pr(successful forgery) in 1 forgery attempt Pr(successful forgery) in x forgery attempts

= 1

2l

= 1 − (1 − 1

2l )x

slide-30
SLIDE 30

< 2−δ

When to adapt?

Pr(successful forgery) in 1 forgery attempt Pr(successful forgery) in x forgery attempts

= 1

2l

= 1 − (1 − 1

2l )x

slide-31
SLIDE 31

x < log(1−2−δ)

log(1− 1

2l )

< 2−δ

When to adapt?

Pr(successful forgery) in 1 forgery attempt Pr(successful forgery) in x forgery attempts

= 1

2l

= 1 − (1 − 1

2l )x

slide-32
SLIDE 32

Security throughout the sensor’s lifetime

T T T Sensor’s lifetime (L)

Pr(succ. forgery) < 2−δ

slide-33
SLIDE 33

Evaluation

500 1000 1500 2000 2500 20 40 60 80

Time (s) Security Bits Attack

MN SN

slide-34
SLIDE 34

Adaptive security plot

50 100 150 200 250 300 50 100 150 200 250 300 Work done by an adversary (lg scale) Bit−level security of protocol Adaptive protocol

slide-35
SLIDE 35

Conclusion

  • Using fixed large packet overhead is

inefficient for low-power sensor networks

  • because a network is not always in a

hostile environment

  • Adaptive protocol provides privacy and is

efficient.

  • Adaptive protocol provides reasonable

security when required

slide-36
SLIDE 36

Adaptive security and privacy for mHealth sensing

Shrirang Mare1, Jacob Sorber1, Minho Shin2, Cory Cornelius1, and David Kotz1

1 Dartmouth College, USA 2 Myongi University, South Korea