The security properties of in-network aggregation

dc.contributorReykjavik Universityen_US
dc.contributorHáskólinn í Reykjavíken_US
dc.contributor.advisorÝmir Vigfússon, Mads F. Dam, Magnús Már Halldórsson, Philippe Bonneten_US
dc.contributor.authorJónsson, Kristján Valur
dc.contributor.schoolSchool of Computer Science (RU)en_US
dc.contributor.schoolTölvunarfræðideild (HR)en_US
dc.date.accessioned2021-03-08T12:38:14Z
dc.date.available2021-03-08T12:38:14Z
dc.date.issued2014-02-03
dc.description.abstractIn-network aggregation is an important paradigm for current and future networked systems, enabling efficient cooperate processing of aggregate information, while providing sub-linear scalability properties. However, security of this important class of algorithms has to date not been sufficiently addressed. In this dissertation, we focus on the integrity properties of in-network aggregation algorithms, with emphasis on the sub-goals of correctness and completeness. We propose an efficient solution that provides strong correctness guarantees by ensuring individual node integrity a priori by applying the principles of trusted systems. To this end, we propose dedicated trusted sensor and aggregator modules. Trusted modules, in conjunction with cryptographic authentication and transport protocols, are applied to construct trusted aggregation overlays, giving strong guarantees in terms of correctness. We support our findings by a proof-of-concept prototype in a single aggregator model, as well as a design for a hierarchical in-network aggregation system. Completeness is a more elusive goal than correctness, if only for the fact that drops and message corruptions are a fact of life in distributed systems. Hence, it may not be possible to distinguish between benign and malicious losses. Building on the trusted systems solution for correctness, we propose a protocol that decreases the adversarial influence in a tree-based aggregation network. We exploit the fact that a secure protocol can be executed over a trusted overlay, enabling per-edge fault detection and dissemination of edge ratings. Simulation-based trials suggest that the presented protocol achieves significant reduction in the potential impact an adversary can have on the completeness of aggregate results.en_US
dc.identifier.urihttps://hdl.handle.net/20.500.11815/2492
dc.language.isoenen_US
dc.publisherHáskólinn í Reykjavíken_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectTölvunarfræðien_US
dc.subjectTölvufræðien_US
dc.subjectTölvuöryggien_US
dc.subjectReikniriten_US
dc.subjectTölvuneten_US
dc.subjectComputer scienceen_US
dc.subjectComputer securityen_US
dc.subjectAlgorithmsen_US
dc.titleThe security properties of in-network aggregationen_US
dc.typeinfo:eu-repo/semantics/doctoralThesisen_US

Skrár

Original bundle

Niðurstöður 1 - 1 af 1
Nafn:
KVH-PhD_RU-2012.pdf
Stærð:
1.91 MB
Snið:
Adobe Portable Document Format
Description: