*banner
 

Rethinking Security Properties, Threat Models and the Design Space in Sensor Networks : A case study in SCADA systems
Alvaro Cardenas, Tanya Roosta, Shankar Sastry

Citation
Alvaro Cardenas, Tanya Roosta, Shankar Sastry. "Rethinking Security Properties, Threat Models and the Design Space in Sensor Networks : A case study in SCADA systems". Ad Hoc Networks, pp. in publication, May 2009.

Abstract
In recent years we have witnessed the emergence and establishment of research in sensor network security. The majority of the literature has focused on discovering numerous vulnerabilities and attacks against sensor networks, along with suggestions for corresponding countermeasures. However, there has been little guidance for understanding the holistic nature of sensor network security for practical deployments. In this paper, we discuss these concerns and propose a taxonomy composed of the security properties of the sensor network, the threat model, and the security design space. In particular, we try to understand the application-layer goals of a sensor network, and provide a guide to research challenges that need to be addressed in order to prioritize our defenses against threats to application-layer goals.

Electronic downloads

Citation formats  
  • HTML
    Alvaro Cardenas, Tanya Roosta, Shankar Sastry. <a
    href="http://chess.eecs.berkeley.edu/pubs/598.html"
    >Rethinking Security Properties, Threat Models and the
    Design Space in Sensor Networks : A case study in SCADA
    systems</a>, <i>Ad Hoc Networks</i>, pp.
    in publication, May 2009.
  • Plain text
    Alvaro Cardenas, Tanya Roosta, Shankar Sastry.
    "Rethinking Security Properties, Threat Models and the
    Design Space in Sensor Networks : A case study in SCADA
    systems". <i>Ad Hoc Networks</i>, pp. in
    publication, May 2009.
  • BibTeX
    @article{CardenasRoostaSastry09_RethinkingSecurityPropertiesThreatModelsDesignSpace,
        author = {Alvaro Cardenas and Tanya Roosta and Shankar Sastry},
        title = {Rethinking Security Properties, Threat Models and
                  the Design Space in Sensor Networks : A case study
                  in SCADA systems},
        journal = {Ad Hoc Networks},
        pages = {in publication},
        month = {May},
        year = {2009},
        abstract = {In recent years we have witnessed the emergence
                  and establishment of research in sensor network
                  security. The majority of the literature has
                  focused on discovering numerous vulnerabilities
                  and attacks against sensor networks, along with
                  suggestions for corresponding countermeasures.
                  However, there has been little guidance for
                  understanding the holistic nature of sensor
                  network security for practical deployments. In
                  this paper, we discuss these concerns and propose
                  a taxonomy composed of the security properties of
                  the sensor network, the threat model, and the
                  security design space. In particular, we try to
                  understand the application-layer goals of a sensor
                  network, and provide a guide to research
                  challenges that need to be addressed in order to
                  prioritize our defenses against threats to
                  application-layer goals.},
        URL = {http://chess.eecs.berkeley.edu/pubs/598.html}
    }
    

Posted by Alvaro Cardenas on 16 Jun 2009.
Groups: chess
For additional information, see the Publications FAQ or contact webmaster at chess eecs berkeley edu.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.

©2002-2018 Chess