Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik
|
|
- Lesley Atkinson
- 8 years ago
- Views:
Transcription
1 Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi Sabancı University Computer Science and Engineering 1 MWSN Security, Albert Levi
2 Agenda Wireless Sensor Networks (WSN) and mobility Existing literature on key distribution in WSNs Our work on key distribution for Mobile WSNs Our work on key distribution for Underwater WSNs Our work on wormhole detection in Mobile WSNs 2 MWSN Security, Albert Levi
3 Wireless Sensor Networks >10 years Complex and challenging set of problems Including security A computing paradigm Vast amount of sensor nodes distributed over a field Both sensing (temperature, pressure, humidity, etc.) and short-range wireless communication capabilities Ultimate aim is to carry the sensed data (possibly after an in-network processing) towards a sink node Sensor nodes are small, low-cost, low-power devices with limited memory, computational power and energy communicate on short distances sense environmental data perform limited data processing 3 MWSN Security, Albert Levi
4 Wireless Sensor Networks Random deployment Inaccessable terrains, disaster relief operations, military fields Difficult to control Self-organized network protocols and algorithms Static & Mobile By themselves Due to environmental factors such as wind, or water Due to deployment of sensor nodes on moving objects E.g. ZebraNet, habitat monitoring, collect information about zebras migration an behavior pattern 4 MWSN Security, Albert Levi
5 Our Motivation Research on mobile WSNs addresses coverage problem, deployment of the network, routing problems, etc. However, security issues have not been studied much, especially compared to static WSNs TÜBİTAK 110E180 Project March 2011 August 2013 Aim is to investigate security issues in Mobile WSNs in particular, key distribution problem, which is the most basic problem existing key distribution schemes for WSNs focus on static WSNs There is a lack of key distribution schemes for mobile WSNs Motto: intelligent use of mobility for the benefit of security 5 MWSN Security, Albert Levi
6 Literature on Key Distribution in WSNs Naive Solutions Use one key for all the nodes Use pairwise-keys for all the nodes and keep all the keys in the memory Probabilistic solutions Sometimes used in combination with polynomial or matrixbased (e.g. Blom s) schemes Location-aware solutions Combinatorial designs Solutions that pay attention to mobility 6 MWSN Security, Albert Levi
7 Basic Scheme Random Key Predistribution Original idea by Eschenauer and Gligor (ACM CCS 2002) Key predistribution: Pick some keys randomly out of a global key and put them into nodes key chains before the deployment Shared Key Discovery: If two nodes share at least one key they can communicate Path-key Establishment: If they do not have direct secure link, they use neighbors to establish a key 7 MWSN Security, Albert Levi
8 Du et al. s Scheme An improvement on Basic Scheme using deployment knowledge by Du et al. (INFOCOM 2004) A zone-based Gaussian deployment model is used Nodes that will be close to each other after deployment would share keys Distant nodes will not share keys Global key pool is distributed among zones so that nodes from neighboring zones share key Key pre-distribution, shared-key discovery and path-key establishment phases 8 MWSN Security, Albert Levi
9 Local Connectivity for Basic Scheme and Du s Scheme for static WSNs Local connectivity: probability of any two neighboring nodes sharing a key Du s scheme performs better Makes use of location information 9 MWSN Security, Albert Levi
10 Effects of Mobility on Basic Scheme and Du et al. s Scheme No change in Basic Scheme Keys are distributed without any regard to location info. Decrease in Du s scheme Depends on location information Neighboring relationships change 10 MWSN Security, Albert Levi
11 A perfectly resilient key distribution scheme for Mobile WSNs Nodes and the Base Station (BS) are mobile. BS operates as a key distribution center. Nodes are not preloaded with any keys. After they are deployed to the area, BS starts to move among the nodes and distribute pairwise keys to neighboring nodes it meets along the way. In our scheme, we use Random Walk Mobility Model K. Karaca and A. Levi, "Resilient Key Establishment for Mobile Sensor Networks", MobiSensor Second International Workshop on Mobility in Wireless Sensor Networks, June 29, 2011, Barcelona, Catalonia, Spain. 11 MWSN Security, Albert Levi
12 Random Walk Mobility Model Choose a random direction between [0, 2 п] and a random speed between [speedmin, speedmax] Move in that direction with that speed for a constant time t or a constant distance d. If the boundary is reached, bounce back 12 MWSN Security, Albert Levi
13 Movement of BS S A deterministic approach to ensure that BS scans the whole area and meets with possibly all the nodes. BS starts moving from southwest corner of the area, goes to the opposite edge horizontally. After it gets very close to the boundary, it starts moving vertically for a very short distance, and then starts moving horizontally again. When it scans the whole area, it diagonally goes back to the southwest corner and starts its movement from there again. 13 MWSN Security, Albert Levi
14 Details of Our Scheme 4 components: Initialization phase, key distribution, shared-key discovery, update of the key chain Initialization Phase A shared key between BS and each node prior to deployment No other predistributed keys Nodes deployed to the area using uniform random distribution Key Distribution Starts when a node senses BS in its communication range BS generates and sends random pairwise keys to nodes using a Needham-Schroeder-like secure protocol. 14 MWSN Security, Albert Levi
15 Shared Key Discovery When two nodes want to communicate they exchange their node IDs If they have a pairwise key in their key chains, they can communicate with each other using that key 15 MWSN Security, Albert Levi
16 Update of the Key Chain Fixed key chain size for nodes Key chain is updated in first-in-first-out manner If there is no space in key chain, node deletes the first not used key and adds the new key to the key chain 16 MWSN Security, Albert Levi
17 Performance Metrics Local Connectivity probability of any two neighboring nodes sharing a common key Global Connectivity ratio of the largest isolated component to the whole network Resilience against node capture attacks A measure of additionally compromised links in case some nodes are captured by an attacker 17 MWSN Security, Albert Levi
18 Local Connectivity for Different m Values Local connectivity values between (0.42, 0.54) Little difference with respect to m Number of neighbors is more decisive (average 60, max 90) Takes time to reach steady state One round of movement for BS 18 MWSN Security, Albert Levi
19 Local Connectivity for Different BS Speed Values Local connectivity values between (0.31, 0.51) Increase in local connectivity as BS speed increases BS meets the nodes more frequently and distributes fresh keys Takes less time to reach steady state for high BS speeds Covers the area faster 19 MWSN Security, Albert Levi
20 Global Connectivity Global connectivity reaches steady state value very close to 1 after BS completes its one round 20 MWSN Security, Albert Levi
21 Resilience If a node is captured, all keys that this node carries are compromised This causes some other links that these keys are used to be compromised as well Resilience is the measure of how many additional links are compromised in case of node captures In our scheme, BS distributes pairwise keys to the nodes Nodes do not keep pairwise keys of other nodes Even if an attacker captures a number of nodes and gets access to the keys carried by those nodes, it can only compromise the links of the already captured nodes. It cannot compromise any additional links with the help of those keys Therefore our scheme has perfect resiliency against node capture 21 MWSN Security, Albert Levi
22 Conclusions for the first part We propose a key distribution scheme for Mobile Wireless Sensor Networks Our scheme achieves a local connectivity value higher than the Basic Scheme and lower than the original Du s Scheme, but a higher value than the Du s Scheme shows when the nodes are mobile Our scheme provides perfect resilience against node capture 22 MWSN Security, Albert Levi
23 Key Distribution in Underwater Wireless Sensor Networks (UWSNs) UWSNs is a type of WSNs More challenging Acoustic waves have to be used which have large latency, low bandwidth and high error-rate. Currents results in mobility UWSN is a recent research area There was no proposed scheme for key distribution. In this work, we proposed two key distribution models for UWSNs. K. Kalkan and A. Levi, " Key Distribution Scheme for Peer-to-Peer Communication in Mobile Underwater Wireless Sensor Networks ", Peer to Peer Networking and Applications (Springer), accepted for publication, October DOI: /s MWSN Security, Albert Levi
24 Mobility Model used in Our Scheme Group Mobility Models Nomadic Community Mobility Model 24 MWSN Security, Albert Levi
25 Mobility Model used in Our Scheme Meandering Current Mobility Model * Dynamics of water is considered in this mobility model This model is for large environment that spans several kilometers. It is a two dimensional model. Depends on this stream function: *A. Caruso, F. Paparella, L.F.M. Vieira, M. Erol, and M. Gerla, The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor Networks. In Proceedings of INFOCOM. 2008, MWSN Security, Albert Levi
26 *A. Caruso, F. Paparella, L.F.M. Vieira, M. Erol, and M. Gerla, The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor Networks. In Proceedings of INFOCOM. 2008, MWSN Security, Albert Levi
27 Hierarchical Scheme Surface buoys (equipped with powerful computational devices) Elevators Ordinary nodes in groups Network Architecture 27 MWSN Security, Albert Levi
28 Communication Patterns Elevator to Elevator Communication Node to Node Communication in Different Groups from Different Elevators Node to Node Communication in Different Groups from Same Elevator Node to Node Communication in Same Group Elevator to Node Communication 28 MWSN Security, Albert Levi
29 Communication Patterns Elevator to elevator communication By the help of surface buoys through the air with a pairwise key. 29 MWSN Security, Albert Levi
30 Communication Patterns Elevator to node communication By using pairwise keys Node to node communication in same group By using Blom s common key 30 MWSN Security, Albert Levi
31 Communication Patterns Node to node in different groups that belong to same elevator communication By the help of the elevator 31 MWSN Security, Albert Levi
32 Communication Patterns Node to node in different groups that belong to different elevators communication By the communication of their elevators 32 MWSN Security, Albert Levi
33 Nomadic Mobility Model 33 MWSN Security, Albert Levi
34 Key Establishment Phases Before Deployment Phase After Deployment Phase Operational Phase 34 MWSN Security, Albert Levi
35 Before Deployment Phase Surface buoy & Elevator unit is loaded with private matrix A and public matrix G for each group A node is loaded with: its own ID ID of the owning elevator A row of the private matrix A Seed of the public matrix G Prime number q 35 MWSN Security, Albert Levi
36 After Deployment Phase 36 MWSN Security, Albert Levi
37 Operational Phase 37 MWSN Security, Albert Levi
38 Performance Evaluation Secure Connectivity : Probability of sharing common key between any two neighbor nodes 38 MWSN Security, Albert Levi
39 Performance Evaluation Additionally Compromised Links Ratio: It is a measure that shows how many extra links are reached by the attacker after some nodes are captured. 39 MWSN Security, Albert Levi
40 Performance Evaluation Totally Compromised Links Ratio: It is measure that shows not only additionally compromised links but also all links that are compromised by the attacker. 40 MWSN Security, Albert Levi
41 Network Architecture for Meandering Model 41 MWSN Security, Albert Levi
42 Communication Patterns Underwater Device to Node Underwater Device to Underwater Device Node to Node in Same Group Node to Node in Different Groups from Different Underwater Devices Node to Node in Different Groups from Same Underwater Device 42 MWSN Security, Albert Levi
43 Key Establishment Phases Before Deployment Phase After Deployment Phase Operational Phase Difference: Changing the places of surface buoys during the operations 43 MWSN Security, Albert Levi
44 Performance Evaluation Secure Connectivity : Probability of sharing common key between any two neighbor nodes 44 MWSN Security, Albert Levi
45 Performance Evaluation Additionally Compromised Links Ratio: It is a measure that shows how many extra links are reached by the attacker after some are captured. 45 MWSN Security, Albert Levi
46 Performance Evaluation Totally Compromised Links Ratio: It is measure that shows not only additionally compromised links but also all links that are compromised by the attacker. 46 MWSN Security, Albert Levi
47 Conclusions for the second part We proposed a key distribution scheme for underwater mobile sensor networks We applied key distribution scheme for two mobility models : nomadic mobility and mendering mobility model Both models are hierarchical networks For both models Blom s scheme is utilized Nomadic based model is 3-D and a small limited area model whereas meandering is 2-D and a large boundless area model Reduction in secure connectivity due to mobility self-heals for both models Both models are highly resilient to capture attacks Both models are energy efficient 47 MWSN Security, Albert Levi
48 Wormhole Attacks Adversaries tunnel packets received on one part of the network to another part Wormholes may convince two nodes that they are close to each other in fact they are far away from each other Generally implemented via a low-latency communication channel available only to the attackers Disorders routing and data dissemination Generally used together with sinkhole and selective forwarding 48 MWSN Security, Albert Levi
49 Wormhole Detection in MWSNs Motivation Majority of the solutions for sensor network considers only static networks Mobile solutions are mostly for ad-hoc networks Not applicable to sensor networks directly due to limitations in sensor network Our Contribution in a Nutshell A distributed statistical wormhole detection scheme for mobile wireless sensor networks No requirement for central controllers, GPS receivers, tight clock syncronization, specialized hardware or nodes Utilize mobility of sensor nodes to estimate two network features locally via using neighboring information Network density Standard deviation in the network density Wormhole attack is detected via observing anomalies in the neighbor nodes behaviors based on the estimated values O. Şimşek and A. Levi, "A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks", In Proceedings of ISCIS th International Symposium on Computer and Information Sciences, pp , Springer, London, UK, September MWSN Security, Albert Levi
50 Wormhole Detection in MWSNs Workflow of the Proposed Scheme Local and global thresholds to blame a node as wormhole All parametric With properly selected parameters the detection rate can go up to 100% with a false positive rate between 0.3% and 1.5% 50 MWSN Security, Albert Levi
51 Thanks Questions? 51 MWSN Security, Albert Levi
3/25/2014. 3/25/2014 Sensor Network Security (Simon S. Lam) 1
Sensor Network Security 3/25/2014 Sensor Network Security (Simon S. Lam) 1 1 References R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84,
More informationSecured Communication in Wireless Sensor Networks
Secured Communication in Wireless Sensor Networks Jian Wang \ University of Teas at Arlington, Arlington, TX 77843 Email: {wang_jane@lycos.com} Abstract Recent advancement in wireless communications and
More informationResearch Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationIntroduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
More informationExpander Graph based Key Distribution Mechanisms in Wireless Sensor Networks
Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks Seyit Ahmet Çamtepe Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 Email: camtes@cs.rpi.edu
More informationWireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
More informationSecure Neighbor Discovery in Wireless Sensor Networks
Purdue University Purdue e-pubs ECE Technical Reports Electrical and Computer Engineering 8-16-2007 Secure Neighbor Discovery in Wireless Sensor Networks Saurabh Bagchi Purdue University, sbagchi@purdue.edu
More informationADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL 1 Rajesh C. Ramannavar, 2 Suma K.V 1 Student, 2 Assistant Professor M S Ramaiah Institute of Technology,Bengaluru,India Email: 1 raaj.rc586@gmail.com,
More informationSome Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
More informationBabel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang
More informationSimulation Modeling of Secure Wireless Sensor Networks
Simulation Modeling of Secure Wireless Sensor Networks Tuan Manh Vu Carey Williamson Reihaneh Safavi-Naini Department of Computer Science University of Calgary ABSTRACT This paper describes an extensible
More informationEnvironmental Monitoring Using Sensor Networks
Environmental Monitoring Using Sensor Networks... 2. Dezember 2010 Communication Systems Seminar HS10 Prof. Dr. Burkhard Stiller Institut für Informatik Universität Zürich Overview From Environmental Monitoring
More informationA Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
More informationA Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationSECURITY SCHEMES FOR WIRELESS SENSOR NETWORKS WITH MOBILE SINK
SECURITY SCHEMES FOR WIRELESS SENSOR NETWORKS WITH MOBILE SINK A Dissertation by AMAR ADNAN RASHEED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements
More informationSecure Key Management Architecture Against Sensor-node Fabrication Attacks
1 Secure Key Management Architecture Against Sensor-node Fabrication Attacks Jeffrey Dwoskin Dahai Xu Jianwei Huang Mung Chiang Ruby Lee {jdwoskin, dahaixu, jianweih, chiangm, rblee}@princeton.edu Department
More informationLoad Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
More informationDetecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Donggang Liu Peng Ning North Carolina State University {dliu,pning}@ncsu.edu Wenliang Du Syracuse University wedu@ecs.syr.edu
More informationSECURE KEY MANAGEMENT FOR DYNAMIC SENSOR NETWORKS
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 83-88 SECURE KEY MANAGEMENT FOR DYNAMIC SENSOR NETWORKS 1 N. Suganthi, 2 V. Sumathi and 3 R. S. Mohanapriyha 1 Dept of Information
More informationWireless Sensor Networks
Scaling Laws of Key Pre-distribution Protocols in 1 Wireless Sensor Networks Wenjun Gu, Xiaole Bai and Sriram Chellappan Abstract A host of key pre-distribution (KP) protocols have been proposed for secure
More informationEvaluation of Security Mechanisms for Information Dissemination. in Wireless Sensor Networks
2013 First International Conference on Artificial Intelligence, Modelling & Simulation Evaluation of Security Mechanisms for Information Dissemination in Wireless Sensor Networks Mohamad Nazim Jambli,
More informationUsing Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University
More informationInternet Sustainability and Network Marketing Safety
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been
More informationSecure Routing in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks
More informationPERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir
More informationA STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,
More informationAn Efficient Group Key Distribution Security Scheme in Wireless Sensor Networks
International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 1 An Efficient Group Key Distribution Security Scheme in Wireless Sensor Networks S.Prema *, S.Nagaraj ** *
More informationIntrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos Athens Information Technology, P.O.Box 68, 19.5 km Markopoulo
More informationSECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN
SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela, elleithy}
More informationSECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access
More informationMobile Network Analysis - Hole Healing
, pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More informationWireless Sensor Network: Improving the Network Energy Consumption
Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationEfficient Networking and Management Mechanism
Key Distribution Mechanisms for Wireless Sensor Networks: a Survey SEYIT A. ÇAMTEPE and BÜLENT YENER Rensselaer Polytechnic Institute Advances in technology introduce new application areas for sensor networks.
More informationProviding End-to-end Secure Communications in Wireless Sensor Networks
1 Providing End-to-end Secure Communications in Wireless Sensor Networks Wenjun Gu, Neelanjana Dutta, Sriram Chellappan and Xiaole Bai Abstract In many Wireless Sensor Networks (WSNs), providing end to
More informationAnomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
More informationENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
More informationAn Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
More informationA KEY RE-DISTRIBUTION AND AUTHENTICATION BASED TECHNIQUE FOR SECURED COMMUNICATION IN CLUSTERED WIRELESS SENSOR NETWORKS WITH NODE MOBILITY
A KEY RE-DISTRIBUTION AND AUTHENTICATION BASED TECHNIQUE FOR SECURED COMMUNICATION IN CLUSTERED WIRELESS SENSOR NETWORKS WITH NODE MOBILITY Saswati Mukherjee 1, Matangini Chattopadhyay 1, Samiran Chattopadhyay
More informationEfficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
More informationSECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
More informationAttacks on neighbor discovery
Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu
More informationTechnology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless
More informationAd hoc and Sensor Networks Chapter 1: Motivation & Applications
Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Give an understanding what ad hoc & sensor networks are good
More informationAn Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
More informationAn Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)
More informationDefending Wireless Sensor Networks Against Adversarial Localization
Defending Wireless Sensor Networks Against Adversarial Localization Neelanjana Dutta, Abhinav Saxena and Sriram Chellappan Department of Computer Science Missouri University of Science and Technology Rolla,
More informationSecurity Solutions for Wireless Sensor Networks
Dirk WESTHOFF, Joao GIRAO, Amardeo SARMA Abstract This paper describes security solutions for collecting and processing data in Wireless Sensor Networks (WSNs). Adequate security capabilities for medium
More informationA Secure Key Management Scheme in Wireless Mesh Networks
A Secure Key Management Scheme in Wireless Mesh Networks Farah Kandah, Weiyi Zhang, Xiaojiang Du, Yashaswi Singh Department of Computer Science, North Dakota State University, Fargo, ND 585 Department
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationCyber-Physical Security for Wireless Sensor Networks
Cyber-Physical Security for Wireless Sensor Networks Position Paper Gordon W. Skelton, PhD Center for Defense Integrated Data (CDID) Jackson State University 1230 Raymond Road Box 1200 Jackson, MS 39204
More informationSecurity Platform For Sensory Networks
Providing Transparent Security Services to Sensor Networks Hamed Soroush Athens Information Technology Email: hsor@ait.edu.gr Mastooreh Salajegheh Athens Information Technology Email: msal@ait.edu.gr Tassos
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationAttacks and Countermeasures in Sensor Networks: A Survey
NETWORK SECURITY Scott Huang, David MacCallum, and Ding Zhu Du(Eds.) pp. - c 2005 Springer Attacks and Countermeasures in Sensor Networks: A Survey Kai Xing, Shyaam Sundhar Rajamadam Srinivasan, Manny
More informationCombinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. Çamtepe 1, Bülent Yener 1 Department of Computer Science, Rensselaer Polytechnic Institute, Troy, NY 12180, USA.
More informationA Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-sink Wireless Sensor Networks
A Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-sink Wireless Sensor Networks Ayşegül Tüysüz Erman, Thijs Mutter, Lodewijk van Hoesel, and Paul Havinga University of Twente
More informationEvent Processing Middleware for Wireless Sensor Networks
Event Processing Middleware for Wireless Sensor Networks Selvakennedy Selvadurai University of Sydney Outline Introduction System Assumptions EPM Architecture Group Management and Centre Localisation Components
More informationOn the Security of Wireless Sensor Networks
On the Security of Wireless Sensor Networks Rodrigo Roman 1, Jianying Zhou 1, and Javier Lopez 2 1 Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613 roman@lcc.uma.es, jyzhou@i2r.a-star.edu.sg
More informationCongestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
More informationInternet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, mwright@uta.edu,
More informationAlessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014
Alessia Garofalo Ph.D. Student in Information Engineering University of Naples «Parthenope» Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks Fai della Paganella, 10-12/02/2014
More informationInternational Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
More informationPERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
More informationFast and Scalable Key Establishment in. Sensor Networks
Fast and Scalable Key Establishment in 1 Sensor Networks Tassos Dimitriou, Ioannis Krontiris and Fotios Nikakis Athens Information Technology [tdim, ikro, fnik]@ait.gr Abstract We present a protocol for
More informationSECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
More informationDavid R. McIntyre CS Department, Cleveland State University Cleveland, Ohio 44101
Data Distribution in a Wireless Environment with Migrating Nodes David A. Johnston EECS Department, Case Western Reserve University Cleveland, Ohio 44106 David R. McIntyre CS Department, Cleveland State
More informationWireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
More informationProtocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig
Protocols and Architectures for Wireless Sensor Netwoks by Holger Karl and Andreas Willig Grade Midterm Exam. 25% Exercises 35% (5 ~ 7 times) Term Project 30% Class Attitude 10% 2 Ad hoc and Sensor Networks
More informationKeywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture
Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Energy Efficient
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationEnd-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
More informationSecure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 25, 1691-1705 (2009) Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks Computer Engineering Department Gazi University
More informationLEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks SENCUN ZHU The Pennsylvania State University and SANJEEV SETIA George Mason University and SUSHIL JAJODIA George Mason University
More informationA Survey on Wireless Sensor Network Security
A Survey on Wireless Sensor Network Security Jaydip Sen Tata Consultancy Services Limited, Wireless & Multimedia Innovation Lab, Bengal Intelligent Park, Salt Lake Electronics Complex, Kolkata 700091,
More informationEmpirical Study on Secure Routing Protocols in Wireless Sensor Networks
Empirical Study on Secure Routing Protocols in Wireless Sensor Networks Ali Modirkhazeni Msc Student, Faculty of Computer Science and Information Systems,University Technology Malaysia Mali25@live.utm.my
More informationLoad Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
More informationProtecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationChristian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
More informationAn Enhanced Hierarchical Energy Efficient Intrusion Detection System for Malicious Packet Dropping Attacks in Wireless Sensor Networks
An Enhanced Hierarchical Energy Efficient Intrusion Detection System for Malicious Packet Dropping Attacks in Wireless Sensor Networks A Thesis Submitted in Partial Fulfillment of the Requirements for
More informationA New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks
www.ijcsi.org 365 A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks Haixia Zhao 1, Yaowei Li 2, Jincheng Shen 3, Mingchuan Zhang 1, Ruijuan Zheng 1,
More informationSecurity Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
More informationA Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu
More informationWireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
More informationNeighborhood-Based Security Protocol for Wireless Sensor Networks
The 6th International Conference on Information Technology and pplications (ICIT 2009) Neighborhood-Based Security Protocol for Wireless Sensor Networks Di Zhang, Ung Heo, Yi Zhao, Kang Soo You* and Jaeho
More informationService Management in Wireless Sensors Network
Service Management in Wireless Sensors Network Linnyer Beatrys Ruiz 1,, Thais Regina M. Braga 1, Fabrício A. Silva 1 José Marcos S. Nogueira 1, Antônio Alfredo F. Loureiro 1 1 Department of Computer Science
More informationSecure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-Distribution
Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-Distribution Kevin Henry Cryptography, Security, and Privacy (CrySP) Lab Cheriton School of Computer Science University
More informationAn Energy Efficient Location Service for Mobile Ad Hoc Networks
An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180
More informationHybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
More informationGROUP KEY DISTRIBUTION VIA LOCAL COLLABORATION IN WIRELESS SENSOR NETWORKS ANUJ CHADHA. Presented to the Faculty of the Graduate School of
GROUP KEY DISTRIBUTION VIA LOCAL COLLABORATION IN WIRELESS SENSOR NETWORKS by ANUJ CHADHA Presented to the Faculty of the Graduate School of The University of Texas at Arlington in Partial Fulfillment
More informationSECURING WIRELESS SENSOR NETWORKS: A SURVEY
3RD QUARTER 2008, VOLUME 10, NO. 3 IEEE COMMUNICATIONS SURVEYS www.comsoc.org/pubs/surveys SECURING WIRELESS SENSOR NETWORKS: A SURVEY YUN ZHOU AND YUGUANG FANG, UNIVERSITY OF FLORIDA YANCHAO ZHANG, NEW
More informationOutline. Application examples. Infrastructure-based limits? Infrastructure-based wireless networks. Possible applications
Outline TDDI13 Distributed embedded software and networks Infrastructure for wireless (Mobile) ad hoc networks Wireless sensor networks Comparison of mobile nets and WSN WSN Enabling technology 36 pages
More informationNode Degree based Clustering for WSN
Node Degree based Clustering for WSN Sanjeev Kumar Gupta Dept. of Electronics & Comm. SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Neeraj Jain Dept. of Computer Science SCOPE College
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationSCADA Security Measures
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA SCADA Security Measures
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationSPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
More informationMAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
More information