Secure sensor network pdf


















Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security … Expand. View 2 excerpts, references methods. Security-aware ad hoc routing for wireless networks.

MobiHoc ' Rushing attacks and defense in wireless ad hoc network routing protocols. WiSe ' TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. IPDPS A pairwise key pre-distribution scheme for wireless sensor networks. CCS ' Random key predistribution schemes for sensor networks. Providing secrecy in key management protocols for large wireless sensors networks.

Ad Hoc Networks. Translate PDF. Selecting combination of distributed autonomous devices using sensors the ideal sensors and wireless communications link, needs to recognize physical or environmental trends. Sensor networks knowledge of the application and penetration definition. The enhanced comprehensive design consideration.

Examples of low data area of wireless sensor networks combines sensing, rate sensors collect, humidity temperature, and magnify twist communication and computation into a single mechanism.

The secured quietly. Examples of high data rate sensors gathered power of wireless sensor networks clarifies in the ability to acceleration, pulled, and fluctuation. The procedure of utilize many numbers of small nodes that cooperate and wireless sensor networks is positioned on a simple equation; construct all nodes. Security protocols related to applications. At the very moment, the people differentiate the abilities Keywords: Application areas, system evaluation metrics, sensor of a wireless sensor network; thousands of applications come nodes, security protocols.

It casts like a real multiplication of modern technology trend. A wireless sensor network WSN consists I. Data is nodes that are regardless extended either inside the exception positioned at the wireless sensor node, decreased and send to or very near about to it. Arbitrary deployment in elusive the gateway directly or if required, uses other wireless sensor domain or calamity relief operations of sensors is been done.

In turn, the gateway Sensor nodes are assembling with an onward processor. On agent then gives the transmitted data to the system. The the contrary, transferring the raw data to the nodes major aim of this chapter is to given a sharp technical compelling for the integration, they use their processing introduction to wireless sensor networks and exist a few expanse to sectional carry out simple calculations and applications in which wireless sensor networks are transmit only the necessary and partly refined data [1].

Sensors combined into machinery, structures, and the II. Lurking asset append: minimum fatal collapse, networks. Some discussions of the network topologies that supervision of natural resources, evolved manufacturing apply to wireless sensor networks are given below.

Although, barriers to the over A. Star Network Single Point-to-Multipoint : limit use of sensors in structures and machines prevail. Lengthy wire bundles WBAN. According to this topology, a main node illustrate an expressing installation and long term conservation expenses, limiting the number of sensors that has the liability of the allotment with the medical may be arranged and consequently decreasing the total sensors and the communication over the BAN.

The aspects of the data exposed. Wireless sensor networks can favor of this type of network for wireless sensor eliminate these costs, improving installation and rejecting networks is in its clarity and the capacity to connectors. It also permits for low interruption software programmable, competent of rapid data possession, communications between the remote node and the decisive and positive over the long period, expenditure short base stations.

The latest enhancements in WSN are also is not as fit as other networks in view of its need on consolidating on mesh network topology because it a single node to create the network.

The star acquires for the broadcasting between devices network topology, usually used in Body Area without a central node for routing using a mesh of Networks BAN also called Body Sensor Network nodes. Hence, this feature rejects the central failure BSN , where sensors are allotted on the body of a and collaborates self-healing and self-organization. Applications Classification B. Pei I-Iu. Xiaojun Cao. An Atterbaclt book. CRC Press. Taylor 8t Francis Group, 20l0. Protocols and Applications.

Subir Kurnar Sarkar. Wireless Ad hot: Networking. Wireless Ad hoc and Sensor Networks — Protocols. Performance and Control. Jagannathan Sarangapani.

Gialuigi Ferrari, Wiley lndia. Wireless Sensor Networks — Signal processing and communications perspectives. Ananthram Swami. In addition to ping, packet replay attacks, and modification or encryption, privacy of sensed data also needs to spoofing of packets. Consider, for example, a person locator sor nodes to set up a secret and authenticated application. Sensors are implanted in an office link, they need to establish a shared secret key.

Generally, people the network. A naive idea is to use a global key would like to limit the right to access their cur- stored on each sensor node prior to deploy- rent location to a small group of people. There- ment, yet this is particularly vulnerable to node fore, access control has to be enforced at the compromise, for the adversary only has to com- Web server to prevent misuse of information by promise one node and all communication links unintended parties.

The Sybil attack can be exploited at different layers to cause service dis- layer, the attacker tially installed. A drawback of public key cryp- tography is that it may open up the network to ruption.

At the MAC layer, by presenting multi- ple identities the malicious node can claim a can inject malicious DoS attacks, as an attacker can send a bogus message to a sensor node, enticing it to perform dominating fraction of the shared radio resource, so legitimate nodes are left with little chance to packets.

We can use seconds of signature verification only to notice that the message is fake. Recently, researchers transmit. At the routing layer, the Sybil attacker can lure network traffic to go through the same authentication to proposed a class of random key predistribution techniques that address the problem of key physical malicious entity.

Imagine a simple rout- ing protocol where a node chooses an upstream enable the receiver establishment [4—7] However, further research is necessary to improve these algorithms in terms neighbor as the next hop with equal probability. By claiming to be a large number of identities, to detect malicious of scalability, resilience to node compromise, memory requirements, and communication with high probability a Sybil identity will be selected as the next hop. One work protocols.

In broadcast and multicast, source authentication poses a new research chal- promising approach is to leverage the key pre- distribution process.

The basic idea is to associ- to detect replayed lenge. Unfortunately, of A; otherwise, it either fails to establish a com- public key cryptography is too costly for sensor munication link with the network or fails to sur- networks.

To address this problem, Perrig et al. With compro- function key chains. The basic idea is to use multiple is often referred to as DoS attacks [8].

DoS disjoint paths to route a message such that it is attacks can be targeted at different layers of the unlikely that every path is controlled by compro- networking stack. More sophisticated attacks include spreading Jamming and Packet Injection — Jamming can be tar- bogus routing information, creating sinkholes or geted at different layers.

At the physical layer, wormholes, and Hello flooding. Karlof and Wag- the attacker can send out interfering RF signals ner systematically study how different routing to impede communication. The jamming attack- protocols are vulnerable to these attacks [12]. In a quency hopping and spread spectrum communi- data aggregation scenario, the false data value is cation [9], requiring the attacker to expend a false aggregation result.

The attacker has sev- significantly more energy to successfully jam eral options to achieve this goal. For instance, a communications. A compromised medium access control protocol employed. For node can also perform a Sybil attack, and all the instance, the attack can induce malicious colli- imaginary identities can collude in reporting sions or attempt to get an unfair share of the false data.

The Sybil attack allows one compro- radio resource. In defense, we need to design mised node to have greater impact on the aggre- secure medium access control protocols. Wood gated result. The attacker can also perform DoS and Stankovic studied link jamming systematical- attacks so that legitimate nodes cannot report ly and proposed using error correcting codes to their sensor readings to the base station. Przy- cope with the collision attack, rate limitation to datek et al. The attack- to detect replayed packets.

So far, A secure routing protocol should enable com- munication despite adversarial activities. So far and traffic patterns time synchronization protocols in sensor net- works assume a trusted environment, making routing protocols for sensor networks, such as directed diffusion [18] and geographic routing of a sensor network them particularly susceptible to various forms of stealthy attack. To large number of types of DoS attacks.

It utilizes efficient symmetric key primitives, but would routing is often address this problem, a promising direction is to use code attestation to validate the code running still be too heavyweight for sensor networks due to its communication, memory, and per- data-centric.

Because the code running on a malicious node must be different from that packet processing overhead. In addition, sensor networks are usually immobile, and traffic pat- Therefore, we need on a legitimate node, we can detect compro- mised nodes by verifying their memory content. On the hardware often data-centric. Therefore, we need to design a secure routing protocol well suited to routing protocol side, the vision of a new trusted computing age sheds new light on future computing devices: sensor networks.

We sensor networks.



0コメント

  • 1000 / 1000