Data Integrity Attacks and Defenses for Intel Lab Sensor Network

被引:0
|
作者
Yan, Renchi [1 ]
Xu, Teng [1 ]
Potkonjak, Miodrag [1 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90024 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless sensor networks have been increasingly popular and they have been deployed in a wide range of areas including transportation system, healthcare, robotics, and smart home. Wireless sensor networks have facilitated our life using the remote sensing ability. However, these systems could be taken advantage by the malicious parties to mislead users since they are often not physically secured and are used in hostile environments. We have proposed theoretical and statistical framework for creating data integrity attacks and corresponding security defenses. The data integrity attack is defined as a type of attack that targets to mislead the system by altering some collected data of the system in such a way that to achieve the goal of attackers. We use the Intel lab sensor data and demonstrate that it is easy to attack only a few essential sensors values to change the behavior of system, such as the control of air conditioner. To be more specific, by changing the temperature and humidity data measured by a group of sensors, the attacker can control the air conditioner turning on and off without being detected by correlation check. On the top of data integrity attacks, we have further developed low overhead defense schemes.
引用
收藏
页码:721 / 726
页数:6
相关论文
共 50 条
  • [1] SECDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity
    Shen, Dakun
    Hou, Tao
    Lu, Zhuo
    Liu, Yao
    Wang, Tao
    [J]. 2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [2] Certified Defenses for Data Poisoning Attacks
    Steinhardt, Jacob
    Koh, Pang Wei
    Liang, Percy
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 30
  • [3] Attacks and Defenses in the Data Plane of Networks
    Chasaki, Danai
    Wolf, Tilman
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) : 798 - 810
  • [4] Throwhammer: Rowhammer Attacks over the Network and Defenses
    Tatar, Andrei
    Konoth, Radhesh Krishnan
    Athanasopoulos, Elias
    Giuffrida, Cristiano
    Bos, Herbert
    Razavi, Kaveh
    [J]. PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, 2018, : 213 - 225
  • [5] Maintaining Lab Data Integrity
    Lowry, Amber
    [J]. BIOPHARM INTERNATIONAL, 2018, 31 (02) : 20 - 24
  • [6] Defenses Against Wormhole Attacks in Wireless Sensor Networks
    Ma, Rui
    Chen, Siyu
    Ma, Ke
    Hu, Changzhen
    Wang, Xiajing
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 413 - 426
  • [7] Vulnerability Assessments of Electric Drive Systems Due to Sensor Data Integrity Attacks
    Yang, Bowen
    Guo, Lulu
    Li, Fangyu
    Ye, Jin
    Song, Wenzhan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (05) : 3301 - 3310
  • [8] DEEPNOISE: Learning Sensor and Process Noise to Detect Data Integrity Attacks in CPS
    Luo, Yuan
    Cheng, Long
    Liang, Yu
    Fu, Jianming
    Peng, Guojun
    [J]. CHINA COMMUNICATIONS, 2021, 18 (09) : 192 - 209
  • [9] Data Poisoning Attacks and Defenses to Crowdsourcing Systems
    Fang, Minghong
    Sun, Minghao
    Li, Qi
    Gong, Neil Zhenqiang
    Tian, Jin
    Liu, Jia
    [J]. PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), 2021, : 969 - 980
  • [10] DEEPNOISE: Learning Sensor and Process Noise to Detect Data Integrity Attacks in CPS
    Yuan Luo
    Long Cheng
    Yu Liang
    Jianming Fu
    Guojun Peng
    [J]. China Communications, 2021, 18 (09) : 192 - 209