Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems
ACM Transactions on Embedded Computing Systems
Crowd-sourced mobile embedded systems allow people to contribute sensor data, for critical applications, including transportation, emergency response and eHealth. Data integrity becomes imperative as malicious participants can launch software and Sybil attacks modifying the sensing platform and data. To address these attacks, we develop (1) a Trusted Sensing Peripheral (TSP) enabling collection of high-integrity raw or aggregated data, and participation in applications requiring additional modalities; and (2) a Secure Tasking and Aggregation Protocol (STAP) enabling aggregation of TSP trusted readings by untrusted intermediaries, while efficiently detecting fabricators. Evaluations demonstrate that TSP and STAP are practical and energy-efficient.
Copyright © 2021 ACM, Inc.
Locate the Document
Dua, A., Bulusu, N., Feng, W. C., & Hu, W. (2014). Combating software and Sybil attacks to data integrity in crowd-sourced embedded systems. ACM Transactions on Embedded Computing Systems (TECS), 13(5s), 1-19.