ABSTRACT
Despite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort. This lack of trust discourages the emergence of applications where users have an incentive to lie about their sensor readings, such as falsifying a location or altering a photo taken by the camera.
This paper presents a broad range of applications that would benefit from the deployment of trusted sensors, from participatory sensing to monitoring energy consumption. We present two design alternatives for making sensor readings trustworthy. Although both designs rely on the presence of a trusted platform module (TPM), they trade-off security guarantees for hardware requirements. While our first design is less secure, it requires no additional hardware beyond a TPM, unlike our second design. Finally, we present the privacy issues arising from the deployment of trusted sensors and we discuss protocols that can overcome them.
- AMD. AMD64 Architecture Programmer's Manual, Volume 2, 2009. http://www.amd.com/us-en/assets/content_type/white_papers_and_tech_docs/24593.pdf.Google Scholar
- App Games. Swine Flu Tracker Map iPhone Game, 2009. http://www.1888freeonlinegames.com/iphonegames/free-swine-flu-tracker-map-119.html.Google Scholar
- E. Brickell, J. Camenisch, and L. Chen. Direct Anonymous Attestation. In Proc. of 11th CCS, October 2004. Google ScholarDigital Library
- V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless Device Identification using Radiometric Signatures. In Proc. of 14th Mobicom, September 2008. Google ScholarDigital Library
- A. Dua, N. Bulusu, and W. chang Feng. Towards Trustworthy Participatory Sensing. In Proc. of the 4th HotSec, August 2009. Google ScholarDigital Library
- U. Feige and A. Shamir. Witness indistinguishable and witness hiding protocols. In Proceedings of 22nd STOC, Baltimore, MD, May 1990. Google ScholarDigital Library
- C. Fretzagias and M. Papadopouli. Cooperative location-sensing for wireless networks. In Proceedings of the 2nd PerCom, Orlando, FL, March 2004. Google ScholarDigital Library
- S. Ganeriwal and M. B. Srivastava. Reputation-based framework for high integrity sensor networks. In Proceedings of the ACM Workshop on Security in Ad-hoc & Sensor Networks (SASN), Washington, DC, October 2004. Google ScholarDigital Library
- P. Gilber, L. P. Cox, J. Jung, and D. Wetherall. Toward trustworhy participatory sensing. In Proceedings of the 11th HotMobile, Annapolis, MD, February 2010.Google Scholar
- S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. In Proceedings of the 17th STOC, Providence, RI, May 1985. Google ScholarDigital Library
- S. Goldwasser and E. Waisbard. Efficient transformation of well known signature schemes into designated confirmer signature schemes. TR: MCS03-13, The Weizmann Institute of Science, 2003.Google Scholar
- Google. Panoramio -- Photos of the World, 2009. http://www.panoramio.com.Google Scholar
- R. Gummadi, H. Balakrishnan, P. Maniatis, and S. Ratnasamy. Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks. In Proc. of the 6th NSDI, April 2009. Google ScholarDigital Library
- U. Hengartner. location privacy based on trusted computing and secure logging. In Proc. of the 4th SecureComm, September 2008. Google ScholarDigital Library
- Intel. Intel Trusted Execution Technology, 2009. http://download.intel.com/technology/security/downloads/315168.pdf.Google Scholar
- V. Lenders, E. Koukoumidis, P. Zhang, and M. Martonosi. Location-based Trust for Mobile User-generated Content: Applications, Challenges and Implementations. In Proc. of the 9th HotMobile, February 2008. Google ScholarDigital Library
- D. Liu, P. Ning, and W. Du. Attack-resistant location estimation in sensor networks. In Proceedings of the 4th IPSN, Los Angeles, CA, April 2005. Google ScholarDigital Library
- P. Mohan, V. Padmanabhan, and R. Ramjee. Nericell: rich monitoring of road and traffic conditions using mobile smartphones. In Proc. of the 6th SenSys, November 2008. Google ScholarDigital Library
- E. Paulos, R. Honicky, and E. Goodman. Sensing Atmosphere. In Proc. of the Workshop on Everyday Mobile Phones in Support of Participatory Research, November 2007.Google Scholar
- Purdue University. Cell phone sensors detect radiation to thwart nuclear terrorism, 2008. http://www.purdue.edu/UNS/x/2008a/080122FischbachNuclear.html.Google Scholar
- S. Saroiu and A. Wolman. Enabling new mobile applications with location proofs. In Proc. of 10th HotMobile, February 2009. Google ScholarDigital Library
- Skyhook Wireless. Skyhook, 2009. http://www.skyhookwireless.com.Google Scholar
- N. O. Tippenhauer, K. Rasmussen, C. Popper, and S. Capkun. Attacks on public wlan-based positioning systems. In Proc. of the 7th MobiSys, June 2009. Google ScholarDigital Library
- A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman. Lockr: Better Privacy for Social Networks. In Proc. of the 5th coNEXT, December 2009. Google ScholarDigital Library
- Trusted Computing Group. TMP Specification version 1.2, 2009. www.trustedcomputinggroup.org/specs/TPM/.Google Scholar
- Wi-Fi FreeSpot. Directory, 2009. http://www.wififreespot.com.Google Scholar
- I am a sensor, and I approve this message
Recommendations
Sensor scheduling for p-percent coverage in wireless sensor networks
We study sensor scheduling problems of p-percent coverage in this paper and propose two scheduling algorithms to prolong network lifetime due to the fact that for some applications full coverage is not necessary and different subareas of the monitored ...
The optimization of sensor relocation in wireless mobile sensor networks
Wireless Sensor Networks (WSNs) have been an active research area these years due to their broad range of potential applications. Several research issues, which include energy-aware routing, sensor deployment problems, data aggregation, etc., have been ...
A Secure Message Percolation Scheme for Wireless Sensor Network
Information Networking. Towards Ubiquitous Networking and ServicesWireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We engineer a secure group management scheme for dealing with data gathered ...
Comments