Literature review of Security and Privacy in Visual Sensor Network: A survey.
Winkler, T., & Rinner, B. (2014). Security and Privacy Protection in Visual Sensor Networks: A Survey. ACM Computing Surveys (CSUR), 47(1), 2.
8. Classification of Attack (Contโdโฆ)
โข Illegitimate Data Access:
โข Disrupting Service:
โข Illegitimate Control:
8
Attacker collects data for his/her own
use by eavesdropping
Takes (partial) control of a node by forge
or injecting control messages.
Takes (partial) control of a node by forge
or injecting control messages.
Takes (partial) control of a node by forge
or injecting control messages.
9. โWho will guard the guards?โ
*Roman poet: Juvenal
Prevention from outsiders attack:
- Data Encryption
- Authentication
- Digital Signature etc.
โข Applying Four Eye principle
โข Only minimal amount of information is disclosed
9
10. โข Modi๏ฌcation of Softwares
โข Installation of new software (i.e: Malware, Rootkits)
โข Changes of routing and MAC protocol.
Software vs Hardware Attack
10
Hardware based security:
- Smartcards
- CPU instruction set extensions
- Trusted Platform Module (TPM)
More sophisticated methods:
- Reverse engineering of IC
- Via side channel exploitation.