{"title":"在反向安全范式中保证W/WSAN节点的阈值出勤率","authors":"J. Konorski, A. Makutunowicz","doi":"10.1109/ICOIN.2014.6799488","DOIUrl":null,"url":null,"abstract":"We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures like smart grid systems, we seek a Threshold Attendance Protocol (TAP) that keeps the number of DISABLED nodes below a predefined threshold. The security challenge is that TAP messages have to be forwarded via the DSCC, which is exposed to various attacks and may turn rogue. In contrast, the nodes are arguably secure. For this `reverted security paradigm' we propose a TAP based on Shamir secret sharing, and discuss its correctness, optimizations and efficiency.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm\",\"authors\":\"J. Konorski, A. Makutunowicz\",\"doi\":\"10.1109/ICOIN.2014.6799488\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures like smart grid systems, we seek a Threshold Attendance Protocol (TAP) that keeps the number of DISABLED nodes below a predefined threshold. The security challenge is that TAP messages have to be forwarded via the DSCC, which is exposed to various attacks and may turn rogue. In contrast, the nodes are arguably secure. For this `reverted security paradigm' we propose a TAP based on Shamir secret sharing, and discuss its correctness, optimizations and efficiency.\",\"PeriodicalId\":388486,\"journal\":{\"name\":\"The International Conference on Information Networking 2014 (ICOIN2014)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The International Conference on Information Networking 2014 (ICOIN2014)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOIN.2014.6799488\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The International Conference on Information Networking 2014 (ICOIN2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN.2014.6799488","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures like smart grid systems, we seek a Threshold Attendance Protocol (TAP) that keeps the number of DISABLED nodes below a predefined threshold. The security challenge is that TAP messages have to be forwarded via the DSCC, which is exposed to various attacks and may turn rogue. In contrast, the nodes are arguably secure. For this `reverted security paradigm' we propose a TAP based on Shamir secret sharing, and discuss its correctness, optimizations and efficiency.