Multimedia Traffic Security Architecture for the Internet of Things
|
|
|
- Benedict Merritt
- 10 years ago
- Views:
Transcription
1 Multimedia Traffic Security Architecture for the Internet of Things Liang Zhou, Nanjng University of Posts and Telecommunications Han-Chieh Chao, National Ilan University Abstract An important challenge for supporting multimedia applications in the Internet of Things is the security heterogeneity of wired and wireless sensor and actuator networks. In this work, we design a new and efficient media-aware security framework for facilitating various multimedia applications in the Internet of Things. First, we present a novel multimedia traffic classification and analysis method for handling the heterogeneity of diverse applications. Then a media-aware traffic security architecture is proposed based on the given traffic classification to enable various multimedia services being available anywhere and anytime. Furthermore, we provide a design rule and strategy to achieve a good trade-off between a system s flexibility and efficiency. To the best of our knowledge, this study is the first to provide general media-aware security architecture by jointly considering the characteristics of multimedia traffic, security service, and the Internet of Things. T he Internet of Things (IoT) is a novel network architecture that is rapidly gaining attention in the scenario of next-generation wireless telecommunications. The basic idea of IoT is pervasively providing us with a variety of things or objects, such as radio frequency identification (RFID) tags, sensors, actuators, and mobile phones, which are able to interact and cooperate with each other to realize the tasks of communication, computation, and service [1]. Such a network poses a bright foreground for large-data multimedia applications as demand for emerging applications like video on demand (VoD), IPTV, and voice over IP (VoIP) has grown tremendously [2]. Figure 1 provides a classic example of multimedia service architecture in the context of IoT. Nowadays, security is of critical importance for various multimedia applications in IoT [3]. Since the IoT is built to broadly execute unverified user-implemented applications from different users, both applications and users can be sources of security threats to the IoT [4, 5]. For example, the vulnerabilities of applications and sensors can be exploited by hackers, and malicious users can access the IoT to launch vicious service attacks. Moreover, a legitimate user may tamper with shared multimedia data or excessively exhaust network resources to interrupt services available to other legitimate users. On the other hand, however, the existing IoT has not employed a specific security mechanism to deal with the threats mentioned above [5]. Thus, it is very important and necessary to deploy a security strategy to protect securitycritical multimedia applications streaming over the IoT. As we know, traffic management plays a key role in achieving high multimedia quality of service (QoS) in a network [1]. Unfortunately, conventional multimedia traffic management algorithms, developed mainly to guarantee delay and distortion constraints while usually neglecting security requirements, are not appropriate for security-aware multimedia applications. In this article, we propose a security-critical multimedia service architecture in the IoT context, which jointly considers traffic analysis, security requirements, and traffic scheduling for multimedia applications. To illustrate the effectiveness, the proposed media-aware traffic security architecture (MTSA) is applied to obtain satisfying traffic management based on the given media-aware traffic classification and analysis. MTSA is one of the first security-aware traffic management strategies for multimedia applications running over the IoT. The fundamental contributions of this article include the following aspects: Traffic classification and analysis for various multimedia applications streaming over IoT Developing a novel architecture for media-aware traffic security Designing and evaluating the proposed security-critical traffic management scheme The rest of this article is organized as follows. We present the multimedia traffic classification and analysis in the context of the IoT. We provide the media-aware traffic security architecture and specify the interaction and cooperation between the different parts. Moreover, the corresponding design rule and strategy are proposed. Finally, we conclude this article. Multimedia Traffic Classification and Analysis The characteristics of the IoT make it possible to develop a huge amount of multimedia traffic. Usually, an IoT is realized by equipping multiple sensors with high intelligence of communication, computation, and service capabilities. Specifically, we can divide the multimedia traffic running over IoT into three categories: communication, computation, and service. In this section, we analyze the above three kinds of multimedia traffic. Figure 2 illustrates multimedia traffic classification and analysis in the context of an IoT. IEEE Network May/June /11/$ IEEE 35
2 Camera 3 Sensor node Sensor node Camera 2 Wireless link: Wired link Sensor node Camera 1 Data sink Microcomputer External comm. device Link point Data server Gateway system Client terminal Source system Multimedia service system Object RFID reader Transmission system Figure 1. An example of multimedia service architecture in the context of IoT [6]. Communication Traffic Anytime, anywhere, anymedia has been the communications goal for the IoT. In this context, the core component is an RFID system that consists of several readers and RFID tags. Each tag is characterized by a unique identifier and applied to different objects. Readers trigger tag transmission by generating a message, which represents a query for the possible presence of tags in the circumference of the reader [6]. For a practical IoT, an RFID tag is a small microchip attached to an antenna, and the antenna is used for both receiving the reader s message and transmitting the tag ID to the reader. Actually, sensor networks are the major components of an IoT, and they can cooperate with RFID systems to complete the communication function. As we know, sensor networks are composed of a number of sensing nodes communicating in a multihop fashion. Usually, nodes report the results of their sensing to sink nodes. As to the communication traffic over the IoT, IEEE does not include specifications on the higher layers of the protocol stack, which is necessary for the seamless integration of sensor nodes into the Internet [1]. Therefore, how to design appropriate communication traffic is an interesting and changeling task: The maximum physical layer packet in the framework of IEEE is 127 bytes, while the maximum frame size at the medium access control (MAC) layer is 102 bytes. Moreover, due to the security algorithm employed at the link layer, which results in overhead, the frame size may further decrease [2]. Different from traditional IP networks, in many scenarios sensor nodes are set in sleep mode to save energy and cannot work during communication periods. In general, integrating sensing technologies into passive RFID systems would enable various multimedia traffic types available in the IoT context. Recently, several works have been conducted in this area. For example, a project on wireless identification and sensing platforms is being carried out at Intel Labs, powered and read by standard RFID readers, harvesting the power from the reader s querying message [6]. Briefly speaking, the objectives of designing appropriate multimedia traffic are energy efficiency, scalability, reliability, and robustness. 36 IEEE Network May/June 2011
3 Communication Energy Scalability Hybrid computation Static computation Networking condition User location Reliability 1. Environment monitoring 2. Mobile networking 3. Sensor network 4. Combining sensing with RFID Robustness User interests User satisfaction Service Dynamic computation Network interface Score Form Heterogeneous platform Service adaptation: 1. Summarization 2. Transcoding Computation Platform Strategy Figure 2. Multimedia traffic classification and analysis in the IoT context. Computation Traffic Usually, computation traffic over an IoT can be processed by mobile agents or sink nodes autonomously. The sequence in which a mobile agent visits the selected source nodes can have a significant impact on computation traffic [1]. Note that finding an optimal source-visiting solution is a typical non-deterministic polynomial-time-complete problem [3]. Computation traffic can be categorized as follows: Static computation: The computation state of the mobile agent is determined by the source node before it is dispatched. Dynamic computation: The agent autonomously determines the source nodes, and decides the dynamic route or resource allocation according to the current network conditions. Hybrid computation: The set of source nodes is decided by the sink nodes, while the source-visiting sequences are processed by the mobile agents. Static Computation It makes use of current global network conditions and finds an efficient path before the mobile agents are sent. In [1], the authors summarize two approaches, Local Closest First (LCF) and Global Closest First (GCF). Specifically, both approaches start at the sensor node closest to the dispatcher. When source nodes intend to form multiple clusters with similar distance to the sink, GCF causes zigzag routing due to the itinerary fluctuations among those clusters. Dynamic Computation Because the global information collected at the sink node may become outdated due to variations over the IoT, dynamic computation can enable the mobile agents or sink nodes to decide the next hop at each step of the routing establishing process. In addition, in the process of deciding a dynamic route, it is necessary to take into account the trade-offs between the cost of migration and the benefit of migration accuracy. The dynamic computation approach seeks the sensor node that satisfies both the largest available remaining energy and the least energy consumption for the agent s migration. Hybrid Computation In hybrid computation, the decision of the source-visiting set is static, whereas the selection of the testing sequence is dynamic. In particular, a hybrid computation scheme called mobile-agent-based directed diffusion is proposed in [7]. Specifically, if the sources in the target region detect an event of interest, they flood or broadcast exploratory packets to the sink nodes. The whole process is determined by the source-visiting sequence as it migrates among the nodes in the source-visiting set. Therefore, the mobile agent follows a cost-efficient path among target sensors. Service Traffic Service traffic contains two aspects: score and form. The score implies the degree of interest a user has in multimedia traffic, while the form denotes the content features on a particular device. For the purpose of efficiently operating various types of multimedia traffic, we classify the data into three categories: preference data, situation data, and capability data. At first, the multimedia traffic server calculates the similarity between the media service and the preference data by employing the method in [7]. Then it evaluates the probability of the media service belonging to one of the servers. We can get the score from the weighted sum of the above calculated similarity and probability. Additionally, multimedia traffic adaptation mainly uses two techniques: summarization and transcoding [3]. Multimedia summarization means summarizing a media service into a short one (from the perspective of data size) that can be viewed on a short timescale. Multimedia transcoding means transforming the content from one media type to another so that the content can be suitably processed by a particular device or efficiently transmitted in a specific communication condition. IEEE Network May/June
4 Mediaaware traffic security architecture Key management Scalable scheme Non-scalable scheme Authentication Group Source Individual sender Figure 3. Major components of MTSA. Major components Media-Aware Traffic Security Architecture In order to meet the information security requirements for multimedia communication, computation, and service in the environment of an IoT, it is necessary to consider some criteria that refer to the traffic security strategy and performance. In this section, we provide a novel media-aware traffic security architecture (MTSA) to solve this problem. It should be noted that MTSA is a development of the information security framework, and multimedia traffic and contents are embedded into the existing architecture [8]. Figure 3 shows the four major components of MTSA. Key Management Many network-based key management schemes have been proposed in the last decade, and they can be divided into three classes [7]: Non-scalable and scalable schemes. Scalable schemes can also be divided into three groups: hierarchical key management, centralized flat key management, and distributed flat key management. Flat schemes, clustered schemes, tree-based scheme,s and other schemes [6]. Centralized schemes, distributed subgroup schemes, and distributed schemes [5]. We propose a new classification using two criteria: the multimedia traffic that exercises the control and whether the scheme is scalable or not. Thus, we get three classes: service control, user control, and flow control. Each class is further classified into scalable and non-scalable schemes. In the context of IoT key management, scalability refers to the ability to provide a larger group of multimedia contents without any prior knowledge. A scalable scheme is able to manage a large group over a wide area with highly dynamic sensors. If the computation and communication traffic at the sources increase dramatically with the size of the group, the scheme is treated as non-scalable. Batch rekeying Periodic Leave rekeying Join rekeying Watermaking Multiple copies Single copy Batch Rekeying In spite of the efficiency of scalable schemes for multicast applications, changing the key has two major weak points: synchronization and inefficiency [6]. Periodic batch rekeying provides a good trade-off between security improvement and computation complexity. Usually, a new user has to wait longer to join the service group, and the period of batch rekeying is thus a design parameter that can be adjusted according to different security requirements and current network conditions. To accommodate different multimedia application needs, three modes of operation are suggested [9]: Periodic batch rekeying: The key server handles both join and leave requests periodically in a batch. Periodic batch leave rekeying: Tthe key server deals with each join request immediately to reduce the delay for a new user to access the IoT but processes leave requests in a batch. Periodic batch join rekeying: The key server deals with each leave request immediately to reduce the exposure to users who have left but handles join requests in a batch. Authentication User authentication involves methods ranging from the use of access control and capability certificates to mutual authentication between the server and user [3, 4]. control: The multimedia server maintains a list of hosts who are either authorized to join the service group or excluded from it. When a user sends a join request, the server checks its ID in the access control list to determine whether membership is permitted or not. It is necessary to note that update of this list is important since the list may change dynamically with new authorizations or exclusions. Ability certificates: Usually, it is issued by a designated certificate authority. An ability certificate contains information about the identity of the host and a set of rights. It is used to authenticate the user and give him/her rights to access multimedia data. Mutual authentication: The server and user authenticate each other via cryptographic means. From [8], we know that the public key scheme can be used for this purpose. As we know, multimedia authentication is a challenging problem in secure heterogeneous communications. According to different types of multimedia applications and the network resources available to users, three levels of multimedia authentication can be used: Group authentication: provides assurance that the packets are transmitted by a registered group member (a registered server or a registered user) Source authentication: provides assurance that the packets are transmitted by a registered user Individual sender authentication: provides assurance of the identity of the registered user of the packets Watermarking Typical uses of watermarks include identification of the origin of content, tracing illegally distributed copies, and disabling unauthorized access to content [8]. Generally speaking, characteristics and requirements for watermarks in multimedia applications are totally different. Identification of the origin of multimedia content requires the embedding of a single watermark into the content at the server. To trace illegal copies, a unique watermark is needed based on the location or identity of the recipient in multimedia applications. For general delaysensitive multimedia applications, watermark extraction or detection needs to take place only when there is a dispute regarding a user s rights. Frankly speaking, the copyright protection problem in the IoT is also a challenging problem. All users in a network group receive the same watermarked content. If a copy of this content is illegally distributed to other users, it may be difficult to find out who is responsible for this action. Such a problem can be eliminated in a homogeneous network environment by embedding a unique watermark for each user. 38 IEEE Network May/June 2011
5 Sensor Distributed privacy paradigm Authority Cost Encryption Key management Energy Secret sharing Figure 4. Design rule and strategy for a distributed privacy paradigm. Design Rule and Strategy Exchange Share Copyright content MTSA provides a systematic framework for multimedia information security, however, designing the corresponding rule and strategy for MTSA is still a challenging task. The decentralized data acquisition process in MTSA offers opportunities to exploit the distributed nature of the network. We provide a novel distributed privacy paradigm for MTSA, in which the authority, cost, and encryption are obtained in a decentralized manner. Figure 4 illustrates the corresponding general rule and strategy. Goal and Model The above discussion motivates us to aim at the following goals for a distributed privacy system: Each sensor or mobile agent must create its own share without the need for a central authority. From the perspective of size, each secret sharing must not be larger than the original secret. From the perspective of an attacker, obtaining multimedia contents will not degenerate the secret sharing size. Specifically, the first goal makes it necessary to employ a distributed method with traditional service architecture. The second one promotes cost-effective share processing and excludes the method of straightforward encryption. Since each sensor in IoT has correlated information, it is essential that this similarity can be used for reducing the secret sharing size. The third one protects the IoT system from an attacker who may access to the static multimedia contents by reconstructing a secret. In particular, the characteristics of the threat model we employ are as follows: Each user can eavesdrop on only a small subset of communication paths. Once a node is hijacked, it will be removed from the system. An active attack on multimedia applications is performed at normal sensors. The first threat assumption reflects a reasonable level of capability of the attacker. To reduce the share size, an attacker must be physically distributed across the entire IoT. The second and third threat requirements make it impossible to corrupt the server content during the process of share generation. Distributed Secret Sharing The approach we consider is different from the traditional secret sharing problem. In secret sharing, a trusted central authority (sometimes a multimedia server) shares a single secret for many users. Here, unconditional secrecy is achieved through the server s use of hash functions for share generation that are known only to the server; not even the users can access the share. There are several differences between the secret sharing for MTSA and traditional secret sharing algorithms. First, traditional secret sharing is designed to create shares from a single unique secret. In the case of MTSA, each sensor has a correlated reading of the others representing a composite secret; direct application of secret sharing to each component of the composite secret would be bandwidth-inefficient, making it crucial to design a nontrivial method to account for correlations. Second, given the centralized nature of secret sharing, where a server creates the shares, one straightforward adaptation is to have the sensors in a group exchange their information to a single node. However, given the high possibility of an inside attack, traditional algorithms suffer from a single point of failure. In particular, an attacker just needs to physically compromise the server to eavesdrop. Third, if each sensor can access all the servers, each node would necessarily have to share the random multimedia content with one server, making it again easier for an eavesdropper to obtain the values by compromising any one of the sensors. According to the above analysis, we develop a new paradigm that is suitable for MTSA. Although secret sharing and visual secret sharing have been proposed for a while, a distributed variant of the visual secret sharing paradigm is our contribution. Our proposed algorithm sacrifices unconditional secrecy to provide a general multimedia security solution for all the sensors in an IoT. In particular, we employ a visual secrecy measure that degrades proportional to the number of shares in possession of an eavesdropper. Such a relaxed definition of secrecy is based on perceived multimedia distortion [5, 7]. Compared to traditional visual secret sharing solutions, the proposed scheme reduces the complexity of multimedia computations and decreases the size of the shares. This point is very important for MTSA. The framework of the proposed paradigm for implementing MTSA is shown in Fig. 5. Further Discussion Here, we discuss the possible directions for further developing the proposed distributed secret sharing for MTSA. As the key management is an important issue in all encryption based security systems, it cannot be separated from the design of secure multimedia distribution. In most distribution architectures, multimedia content is encrypted with a symmetric key which also needs to be protected in transmission to the user. A common tool of achieving the protection of the decryption key is public-key cryptography. The difficulty in cryptanalyzing public-key ciphers would provide reasonable security for all kinds of multimedia applications [9]. It is necessary to develop new models that specify how digital copyrighted content can be consumed from the perspective of multimedia service providers in an IoT. The usage rights need to be delivered to the users together with the multimedia content and the decryption keys. The simplest form of this strategy is copy control information (CCI). It expresses the conditions under which a user is allowed to copy multimedia content legally. An important subset of CCI is the two copy generation management systems: 11 (copy-never), 10 (copy-once), 01 (no-more-copies), and 00 (copy-free). It is possible to associate CCI with content in two ways: included IEEE Network May/June
6 PAN network-1 network-2 network-3 network-4 Multimedia traffic flows IoT Multimedia service provider Traffic analysis Application agent Agent Multimedia service Security operation User profile Media-aware traffic security architecture Figure 5. The framework of the proposed paradigm for implementing MTSA [3]. in a designated field in a multimedia stream, and embedded as a watermark in a multimedia stream. Conclusions In this work, we design a new and efficient media-aware security framework for facilitating diverse multimedia services in internet of things environment. At first, we present the multimedia traffic classification and analysis for handling the heterogeneity of diverse networks. After that, a novel media-aware traffic security architecture is presented based on the proposed traffic classification to enable diverse multimedia services provisioning to users anywhere at any time. At last, we propose the design rule and strategy to achieve a good trade-off between system flexibility and efficiency. Acknowledgment This work is supported in part by the National Science Council, Taiwan under Grant NSC E and Grant NSC E References [1] L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A Survey, Computer Networks, vol. 54, no. 15, Oct. 2010, pp [2] M. Chen, S. Gonzalez, and V. Leung, Applications and Design Issues of Mobile Agents in Wireless Sensor Networks, IEEE Wireless Commun., vol. 14, no. 6, 2007, pp [3] L. Zhou et al., Context-Aware Multimedia Service in Heterogeneous Networks, IEEE Intelligent Sys., vol. 25, no. 2, Mar./Apr. 2010, pp [4] L. Zhou et al., Distributed Scheduling Scheme for Video Streaming over Multi-Channel Multi-Radio Multi-Hop Wireless Networks, IEEE JSAC, vol. 28, no. 3, Apr. 2010, pp [5] H. V. Zhao, W. S. Lin, and K. J. R Liu, A Case Study in Multimedia Fingerprinting: Behavior Modeling and Forensics for Multimedia Social Networks, IEEE Sig. Proc. Mag., vol. 26, no. 1, Jan. 2009, pp [6] M. Chen et al., Software Agent-based Intelligence for Code-centric RFID Systems, IEEE Intelligent Sys., vol. 25, no. 2, Mar./Apr. 2010, pp [7] D. Kundur et al., Security and Privacy for Distributed Multimedia Sensor Networks, Proc. IEEE, vol. 96, no. 1, Jan. 2008, pp [8] A. M. Eskicioglu, Multimedia Security in Group Communications: Recent Progress in Key Management, Authentication, and Watermarking, Multimedia Systems, vol. 9, 2003, pp [9] H. Susanto and F. Muhaya, Multimedia Information Security Architecture Framework, Proc. FutureTech Biographies LIANG ZHOU [M] ([email protected]) received his Ph.D. degree in electronic engineering from both Ecole Normale Superieure, Cachan, France, and Shanghai Jiao Tong University, China, in March From 2009 to 2010 he was a postdoctoral researcher at ENSTA-ParisTech, France. Since October 2010 he has been a Humboldt Research Fellow at the Technical University of Munich, Germany. His research interests are in the area of networked multimedia communications and computing. HAN-CHIEH CHAO [SM] ([email protected]) is a joint appointed full professor of the Department of Electronic Engineering and Institute of Computer Science & Information Engineering, National Ilan University, Taiwan. His research interests include high-speed networks, wireless networks, IPv6-based networks, digital creative arts, and the digital divide. He currently serves as Editor-in-Chief for IET Communications, International Journal of Ad Hoc and Ubiquitous Computing, Journal of Internet Technology, and International Journal of Internet Protocol Technology. He is a Fellow of the Institution of Engineering and Technology (FIET) and a Chartered Fellow of the British Computer Society (FBCS). 40 IEEE Network May/June 2011
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
About the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
An Experimental Study on Wireless Security Protocols over Mobile IP Networks
An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: [email protected] Jorinjit S. Gill Department of Electrical and
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Prevention of Anomalous SIP Messages
International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
Wireless Sensor Networks Chapter 3: Network architecture
Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
SANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
Access Control And Intrusion Detection For Security In Wireless Sensor Network
Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
A Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Design of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]
WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday
Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014
Alessia Garofalo Ph.D. Student in Information Engineering University of Naples «Parthenope» Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks Fai della Paganella, 10-12/02/2014
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT
Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chih-Yuan Lee Department of CSIE National Taipei University 1 Outline Abstract Introduction Background System
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Fundamentals of Mobile and Pervasive Computing
Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:
Mobile Multimedia Meet Cloud: Challenges and Future Directions
Mobile Multimedia Meet Cloud: Challenges and Future Directions Chang Wen Chen State University of New York at Buffalo 1 Outline Mobile multimedia: Convergence and rapid growth Coming of a new era: Cloud
5. Security in the IPN
1. Introduction 2. Inter-Internet Dialogs 3. Building a stable Backbone for the IPN 4. IPN Nodes 5. Security in the IPN 6. Deployed Internets in the IPN 7. Working conclusions 5. Security 5.1. Introduction
MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY
MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY Nadher M. A. Al_Safwani, Suhaidi Hassan, and Mohammed M. Kadhum Universiti Utara Malaysia, Malaysia, {suhaidi, khadum}@uum.edu.my, [email protected]
Robust protocols for the Industrial Internet of Things
Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, 70125 Bari, Italy
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
