Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems
Published In
ACM Transactions on Embedded Computing Systems
Document Type
Citation
Publication Date
2014
Subjects
Data Applications
Abstract
Crowd-sourced mobile embedded systems allow people to contribute sensor data, for critical applications, including transportation, emergency response and eHealth. Data integrity becomes imperative as malicious participants can launch software and Sybil attacks modifying the sensing platform and data. To address these attacks, we develop (1) a Trusted Sensing Peripheral (TSP) enabling collection of high-integrity raw or aggregated data, and participation in applications requiring additional modalities; and (2) a Secure Tasking and Aggregation Protocol (STAP) enabling aggregation of TSP trusted readings by untrusted intermediaries, while efficiently detecting fabricators. Evaluations demonstrate that TSP and STAP are practical and energy-efficient.
Rights
Copyright © 2021 ACM, Inc.
Locate the Document
DOI
10.1145/2629338
Persistent Identifier
https://archives.pdx.edu/ds/psu/35541
Citation Details
Dua, A., Bulusu, N., Feng, W. C., & Hu, W. (2014). Combating software and Sybil attacks to data integrity in crowd-sourced embedded systems. ACM Transactions on Embedded Computing Systems (TECS), 13(5s), 1-19.