Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems

Published In

ACM Transactions on Embedded Computing Systems

Document Type

Citation

Publication Date

2014

Subjects

Data Applications

Abstract

Crowd-sourced mobile embedded systems allow people to contribute sensor data, for critical applications, including transportation, emergency response and eHealth. Data integrity becomes imperative as malicious participants can launch software and Sybil attacks modifying the sensing platform and data. To address these attacks, we develop (1) a Trusted Sensing Peripheral (TSP) enabling collection of high-integrity raw or aggregated data, and participation in applications requiring additional modalities; and (2) a Secure Tasking and Aggregation Protocol (STAP) enabling aggregation of TSP trusted readings by untrusted intermediaries, while efficiently detecting fabricators. Evaluations demonstrate that TSP and STAP are practical and energy-efficient.

Rights

Copyright © 2021 ACM, Inc.

DOI

10.1145/2629338

Persistent Identifier

https://archives.pdx.edu/ds/psu/35541

Share

COinS