Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zinaida Benenson is active.

Publication


Featured researches published by Zinaida Benenson.


international workshop on security | 2006

Tampering with motes: real-world physical attacks on wireless sensor networks

Alexander Becher; Zinaida Benenson; Maximillian Dornseif

Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.


international conference on embedded wireless systems and networks | 2009

Cooperative Intrusion Detection in Wireless Sensor Networks

Ioannis Krontiris; Zinaida Benenson; Thanassis Giannetsos; Felix C. Freiling; Tassos Dimitriou

We consider the problem of cooperative intrusion detection in wireless sensor networks where the nodes are equipped with local detector modules and have to identify the intruder in a distributed fashion. The detector modules issue suspicions about an intrusion in the sensors neighborhood. We formally define the problem of intrusion detection and identify necessary and sufficient conditions for its solvability. Based on these conditions we develop a generic algorithm for intrusion detection and present simulations and experiments which show the effectiveness of our approach.


european symposium on research in computer security | 2006

TrustedPals: secure multiparty computation implemented with smart cards

Milan Fort; Felix C. Freiling; Lucia Draque Penso; Zinaida Benenson; Dogan Kesdogan

We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, an efficient smart card based implementation of SMC for any number of participating entities in such a model. Security modules can be trusted by other processes and can establish secure channels between each other. However, their availability is restricted by their host, that is, a corrupted party can stop the computation of its own security module as well as drop any message sent by or to its security module. We show that in this model SMC can be implemented by reducing it to a fault-tolerance problem at the level of security modules. Since the critical part of the computation can be executed locally on the smart card, we can compute any function securely with a protocol complexity which is polynomial only in the number of processes (that is, the complexity does not depend on the function which is computed), in contrast to previous approaches.


international conference on embedded wireless systems and networks | 2005

An algorithmic framework for robust access control in wireless sensor networks

Zinaida Benenson; Felex C. Gartner; Dogan Kesdogan

If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We first determine security issues in the context of access control in sensor networks especially focusing on the problem of node capture, i.e., the possibility that an attacker can completely take over some of the sensor nodes. We then introduce the notion of t-robust sensor networks which can withstand capture of up to t nodes and consider three basic security concepts for such networks: (1) t-robust storage, a mechanism to securely store data within a set of sensors such that capture of any t sensors does not reveal that data to the adversary; (2) n-authentication which ensures that authentication is achieved with every uncompromised sensor in the broadcast range of a client (n denotes the number of nodes in that broadcast range); and (3) n-authorization, an authorization primitive with similar properties like n-authentication. We present a generic t-robust protocol for implementing access control using these primitives.


communication system software and middleware | 2007

Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks

Matthias R. Brust; Adrian Andronache; Steffen Rothkugel; Zinaida Benenson

Clustering techniques create hierarchal network structures, called clusters, on an otherwise flat network. Neighboring devices elect one appropriate device as clusterhead. Due to the dynamic environment, clusterhead selection becomes an important issue. We consider the problem of appropriate clusterhead selection in wireless ad-hoc networks and sensor networks. This work presents topological criteria for robust clusterhead candidate selection, resilient to sporadic node mobility and failure as well as for efficient information dissemination. One of the main ideas of our approach is to avoid selecting nodes located close to the network partition border as such nodes are more likely to move out of the partition, thus causing a clusterhead re-election. We conducted experiments both for static topologies as well as for cases in the presence of node mobility. Our results showed that the frequency of clusterhead re-election and average shortest path length from the clusterhead decrease when considering topological criteria. Additionally, the clusters tend to be robust to clusterhead failure. The presented mechanisms rely on local topological information only and do not require geographical data.


pervasive computing and communications | 2006

Authenticated query flooding in sensor networks

Zinaida Benenson; Lexi Pimenidis; Ernest Hammerschmidt; Felix C. Freiling; Stefan Lucks

We propose a novel mechanism for authentication of flooded queries in sensor networks. Each sensor can verify with certain probability that the query is sent by the base station. Implicit cooperation between sensor nodes during the flooding process ensures that the propagation of fake queries is limited to a small part of the network.


human factors in computing systems | 2013

Android and iOS users' differences concerning security and privacy

Zinaida Benenson; Freya Gassmann; Lena Reinfelder

We compare Android and iOS users according to their demographic differences, security and privacy awareness, and reported behavior when installing apps. We present an exploratory study based on an online survey with more than 700 German students and describe directions for further research.


trust and privacy in digital business | 2014

Differences between Android and iPhone Users in Their Security and Privacy Awareness

Lena Reinfelder; Zinaida Benenson; Freya Gassmann

This work compares Android and iPhone users according to their security and privacy awareness when handling apps. Based on an online survey conducted with over 700 German respondents (mostly university students) we found out that Android users seem to be more aware of the risks associated with the app usage than iPhone users. For example, iPhone users almost never consider the possibility of apps sending premium-rate SMS or causing other hidden costs. Furthermore, Android users more often mention security, trust and privacy issues as important factors when they decide to use a new app. We hypothesize that the cause of these differences they are likely to arise through differences in app market policies, in app review processes and in presentation of data usage by the apps.


information security conference | 2006

Authenticated Query Flooding in Sensor Networks

Zinaida Benenson; Felix C. Freiling; Ernest Hammerschmidt; Stefan Lucks; Lexi Pimenidis

We propose a novel mechanism for authentication of flooded queries in sensor networks. Each sensor can verify with certain probability that the query is sent by the base station. Implicit cooperation between sensor nodes during the flooding process ensures that the propagation of fake queries is limited to a small part of the network


Information Technology | 2010

Attacker Models for Wireless Sensor Networks

Zinaida Benenson; Erik-Oliver Blaß; Felix C. Freiling

Abstract Assumptions about attackers critically influence security and efficiency of protocols. Without precisely defined attacker models, proving security of protocols becomes impossible. Especially the area of sensor network security lacks well-established and precise attacker models. We present a general framework for attacker models in wireless sensor networks that structures and orders typical assumptions about attackers. Zusammenfassung Präzise Annahmen über mögliche Angreifer sind unbedingt erforderlich zur Entwicklung von Sicherheitslösungen. Dennoch gibt es im Bereich Sensornetze keine etablierten Angreifermodelle. In dieser Arbeit wird ein Rahmenwerk zur Definition und Strukturierung von Angreiferannahmen in Sensornetzen vorgestellt.

Collaboration


Dive into the Zinaida Benenson's collaboration.

Top Co-Authors

Avatar

Felix C. Freiling

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar

Philipp Morgner

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anna Girard

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar

Ioannis Krontiris

Goethe University Frankfurt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lena Reinfelder

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge