Visible to the public Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems

TitleCombating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems
Publication TypeJournal Article
Year of Publication2014
AuthorsDua, Akshay, Bulusu, Nirupama, Feng, Wu-Chang, Hu, Wen
JournalACM Trans. Embed. Comput. Syst.
Volume13
Pagination154:1–154:19
ISSN1539-9087
Keywordscritical systems, crowd-sourced sensing, data integrity, Embedded systems, mobile computing, security, Trust
Abstract

Crowd-sourced mobile embedded systems allow people to contribute sensor data, for critical applications, including transportation, emergency response and eHealth. Data integrity becomes imperative as malicious participants can launch software and Sybil attacks modifying the sensing platform and data. To address these attacks, we develop (1) a Trusted Sensing Peripheral (TSP) enabling collection of high-integrity raw or aggregated data, and participation in applications requiring additional modalities; and (2) a Secure Tasking and Aggregation Protocol (STAP) enabling aggregation of TSP trusted readings by untrusted intermediaries, while efficiently detecting fabricators. Evaluations demonstrate that TSP and STAP are practical and energy-efficient.

URLhttp://doi.acm.org/10.1145/2629338
DOI10.1145/2629338
Citation KeyDua:2014:CSS:2660459.2629338