Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems

Akshay Dua, Nirupama Bulusu, Wu-Chang Feng, Wen Hu
2014 ACM Transactions on Embedded Computing Systems  
Crowd-sourced mobile embedded systems allow people to contribute sensor data, for critical applications, including transportation, emergency response and eHealth. Data integrity becomes imperative as malicious participants can launch software and Sybil attacks modifying the sensing platform and data. To address these attacks, we develop (i) a Trusted Sensing Peripheral (TSP) enabling collection of high-integrity raw or aggregated data, and participation in applications requiring additional
more » ... ities; and (ii) a Secure Tasking and Aggregation Protocol (STAP) enabling aggregation of TSPs trusted readings by untrusted intermediaries, while efficiently detecting fabricators. Evaluations demonstrate that TSP and STAP are practical and energy-efficient. A preliminary version of this article appeared in the Usenix Workshop on Hot Topics in Security (HotSec '09) [Dua et al. 2009 ]. This article features significant new measurements on the trusted sensing peripheral, and new contributions on the design and evaluation of a secure and trusted data aggregation protocol, as well as extending the trusted sensing peripheral to legacy mobile devices.
doi:10.1145/2629338 fatcat:ttwzbvbgcfcbzk2zjylegme424