Trust Key Management Scheme for Wireless Body Area Networks
|
|
|
- Magnus Harrison
- 10 years ago
- Views:
Transcription
1 International Journal of Network Security, Vol. 12, No. 2, PP , Mar Trust Key Management Scheme for Wireless Body Area Networks Mohammed Mana 1, Mohammed Feham 1, and Boucif Amar Bensaber 2 (Corresponding author: Mohammed Mana) STIC Lab., Department of telecommunications, University of Tlemcen, Tlemcen, Algeria 1 Laboratoire de mathématiques et informatique appliquées LAMIA, Université du Québec à Trois-Riviéres 2 C.P. 500 Trois-Riviéres, Québec, Canada G9A 5H7 ( manamed [email protected], m [email protected], [email protected]) (Received Jan. 25, 2010; revised and accepted Feb. 17, 2010) Abstract With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In addition to providing continuous monitoring and analysis of physiological parameters, the recently proposed Wireless Body Area Networks (WBAN) incorporates context aware sensing for increased sensitivity and specificity. A number of tiny wireless sensors, strategically placed on the human body, create a WBAN that can monitor various vital signs, providing real-time feedback to the user and medical personnel. The wireless body area networks promise to revolutionize health monitoring. Since the sensors collect personal medical data, security and privacy are important components in this kind of networks. It is a challenge to implement traditional security infrastructures in these types of lightweight networks, since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in WBANs has emerged to be biometrics. In this paper, we present an approach that exploits physiological signals (electrocardiogram (ECG)) to address security issues in WBAN: a Trust Key Management Scheme for Wireless Body Area Network. This approach manages the generation and distribution of symmetric cryptographic keys to constituent sensors in a WBAN (using ECG signal) and protects the privacy. Keywords: Biometric security, ECG signal network, key management, privacy, wireless body area 1 Introduction Recent technological advances in wireless networking, microelectronics integration and miniaturization, sensors, and the Internet allow us to fundamentally modernize and change the way health care services are deployed and delivered. Focus on prevention and early detection of disease or optimal maintenance of chronic conditions promise to augment existing health care systems that are mostly structured and optimized for reacting to crisis and managing illness rather than wellness [3]. Wearable systems for continuous health monitoring are a key technology in helping the transition to more proactive and affordable health care. They allow an individual to closely monitor changes in her or his vital signs and provide feedback to help maintain an optimal health status. If integrated into a tele-medical system, these systems can even alert medical personnel when life-threatening changes occur. In addition, the wearable systems can be used for health monitoring of patients in ambulatory settings [8]. For example, they can be used as a part of a diagnostic procedure, optimal maintenance of a chronic condition, a supervised recovery from an acute event or surgical procedure, to monitor adherence to treatment guidelines (e.g., regular cardiovascular exercise), or to monitor effects of drug therapy. One of the most promising approaches in building wearable health monitoring systems utilizes emerging wireless body area networks (WBANs) [9]. A WBAN consists of multiple sensor nodes, each capable of sampling, processing, and communicating one or more vital signs (heart rate, blood pressure, oxygen saturation, activity) or environmental parameters (location, temperature, humidity, light). Typically, these sensors are placed strategically on the human body as tiny patches or hidden in user s clothes allowing ubiquitous health monitoring in their native environment for extended periods of time. Figure 1 illustrates a basic design of a health care system [21]. Security and privacy are important components in WBANs. A medical sensor network monitors humans. A human-centered sensor network has distinct features such as the sensitive nature of the data, the mobility of sensors, and the proximity to potential attackers, leading to these security challenges [17]:
2 International Journal of Network Security, Vol. 12, No. 2, PP , Mar Figure 1: The basic design of a health care system How to ensure the privacy and integrity of the medical data, given that the wireless channel is easily subject to many forms of attacks? How to ensure that only authorized people can access the data? How to prevent someone from using captured sensors to recover sensitive medical information or inject false information? Figure 1 illustrates the basic design of a health care system. There are three main components: the Wireless Body Area Network (WBAN), the external network and the medical server. The WBAN contains several sensors that measure medical data such as ECG, body movement, temperature etc. These sensors are equipped with a radio interface and send their measurements wireless to a central device called the personal server or the base station. This can be done either directly or via several intermediate hops. The base station is unique for each WBAN (and hence for every patient/user) and acts as a gateway between the WBAN and the external network. As it has more processing power than normal sensors, it can process the medical data and generate alarms if necessary. Each sensor shall only send its recorded data to the unique gateway it is linked with and this needs to be enforced by specific security mechanisms. The external network can be any network providing a connection between the base station and the medical server. The medical server securely stores, processes and manages the huge amount of medical bio-data coming from all of the patients. This data can then be observed and analyzed by medical staff. What makes securing sensor networks more difficult than other types of networks is that wireless sensor nodes usually have limited resources, while conventional security mechanisms incur high costs in terms of CPU, memory, bandwidth, and energy consumption [17]. The contribution of our work is to secure communication links between sensor nodes using biometrics data. We propose to generate symmetric cryptographic keys from Electrocardiogram signal (ECG) and distribute them securely and efficiently between sensor nodes over the WBAN. The remainder of this paper is organized as follows. Section 2 gives an overview of the security in WBANs. This is followed by a detailed descriptions for a trust key management scheme for wireless body area networks in Section 3. In Section 4, is given the analysis of our protocol in terms of security services and energy cost. Lastly, concluding remarks for future directions are given in Section 5. 2 Related Work Security issues in WBAN are particularly important because sensitive medical information must be protected from unauthorized use for personal advantage and fraudulent acts that might be hazardous to a user s life (e.g., alteration of system settings, drug dosages, or treatment procedure). The security mechanisms employed in Wireless Sensor Networks do generally not offer the best solutions to be used in Wireless Body Area Networks for the latter have specific features that should be taken into account when designing the security architecture. The number of sensors on the human body, and the range between the different nodes, is typically quite limited. Furthermore, the
3 International Journal of Network Security, Vol. 12, No. 2, PP , Mar Table 1: Security schemes used in health care architectures System Hardware Security architecture platform scheme Code Blue Mica2 ECC & TinySec ALARM-NET Tmote Sky Hardware Encryption SNAP Tmote Sky Tiny ECC WBAN Tmote Sky Hardware Encryption sensors deployed in a WBAN are under surveillance of the person carrying these devices. This means that it is difficult for an attacker to physically access the nodes without this being detected. When designing security protocols for WBAN, these characteristics should be taken into account in order to define optimized solutions with respect to the available resources in this specific environment [22]. Several security solutions have been proposed in protecting biomedical sensor network. Following are presented the main approaches followed by the architectures mentioned in Table 1 [4, 5, 16, 27, 28]. 2.1 TinySec TinySec is proposed as a solution to achieve link-layer encryption and authentication of data in biomedical sensor networks [10]. TinySec [24] is a link-layer security architecture for wireless sensor networks that is part of the official TinyOS release. It generates secure packets by encrypting data packets using a group key shared among sensor nodes and calculating a MAC for the whole packet including the header. TinySec by default relies on a single key manually programmed into the sensor nodes before deployment. This network-wide shared key provides only a baseline level of security. It cannot protect against node capture attacks. If an adversary compromises a single node or learns the secret key, she can gain access on the information anywhere in the network, as well as inject her own packets. This is probably the weakest point in TinySec, since, node capture has been proved to be a fairly easy process. 2.2 Hardware Encryption As an alternative to TinySec, one could utilize hardware encryption supported by the ChipCon 2420 Zig- Bee complaint RF Transceiver, one of the most popular radio chip on wireless sensor nodes. Based on AES encryption using 128-bit keys, the CC2420 can perform IEEE MAC security operations, including counter (CTR) mode encryption and decryption, CBC- MAC authentication and CCM encryption plus authentication. It can also perform plain stand-alone encryption of 128 bit blocks [12]. The WBAN group, employed this method in their network infrastructure [15], where the personal server shares the encryption key with all of the sensors in the WBAN during the session initialization. Hardware encryption is also followed by ALARM- NET [22]. One limitation of the method is that it does not offer AES decryption, so transmitted information cannot be accessed by intermediate nodes if needed (e.g. for aggregation purposes). Any decryption can be performed only at the base station. Another drawback of the method is that it is highly dependent on the specific platform. Other sensor node hardware do not offer hardware encryption support, so a different approach has to be taken in this case. 2.3 Elliptic Curve Cryptography Recently, elliptic curve cryptography (ECC) has emerged as a promising alternative to RSA-based algorithms, as the typical size of ECC keys is much sorter for the same level of security. There have been notable advances in ECC implementation for WSNs in recent years. Uhsadel et al. [23] propose an efficient implementation of ECC and Liu et al. developed TinyECC [7], an ECC library that provides elliptic curve arithmetic over prime fields and uses inline assembly code to speed up critical operations on the ATmega128 processor. Also lately, Szczechowiak et al. presented NanoECC [2], which is relatively fast compared with other existing ECC implementations, although it requires a heavy amount of ROM and RAM sizes. Even though elliptic curve cryptography is feasible on sensor nodes, its energy requirements are still orders of magnitude higher compared to that of symmetric cryptosystems. Therefore, elliptic curve cryptography would make more sense to be used only for infrequent but security-critical operations, like key establishment during the initial configuration of the sensor network [19]. 2.4 Biometric Methods A key establishment method to secure communications in biomedical sensor networks has emerged to be biometrics [18]. It advocates the use of the body itself as a means of managing cryptographic keys for sensors attached on the same body, if they measure a piously agreed physiological value simultaneously and use this value to generate a pseudo-random number, this number will be the same. Then it can be used to encrypt and decrypt the symmetric key to distribute it securely. The physiological value to be used should be chosen carefully, as it must exhibit proper time variance and randomness. The ECG (electrocardiogram) has been shown to be appropriate [20]. Several schemes are proposed to protect WBAN using ECG signal, authors in [1, 13, 28] proposed to generate the session keys from ECG signal and distribute them between nodes over the network. The disadvantage of these methods is that the accuracy of key recoverability is less than 100% at nodes over the network. Our contribution aims to generate symmetric session keys from ECG signal. It also aims to establish securely and efficiently the generated keys between the sensor
4 International Journal of Network Security, Vol. 12, No. 2, PP , Mar nodes and the base station in order to secure end to end transmission. Our protocol is characterized by minimal resource consumption. 3 Our Contribution In this section, we present our protocol (Trust key Management Scheme for Wireless Body Area Network) which secures keys exchange between sensor nodes and the base station with minimal resource consumption. 3.1 Assumptions Before describing the protocol, let us identify the assumptions underlying our model. We assume that: The base station has more resources than a regular sensor node. The base station can keep a record of the keys it shares with each sensor node and can use these keys to send confidential messages to individual nodes. The base station can make long range radio transmissions to reach a node anywhere within the sensor network. However, in order for messages to travel from a sensor node to the base station, the message has to hop from node to node in order to maximize the energy conservation. The base station has a pair of keys (private and public key). Each sensor is capable to use symmetric and asymmetric encryption, by implementing (hard or soft) each of these operations. Each sensor node gets the public key of the base station before deployment from an off-line dealer. The base station gets a template reference (biometric features generated from the ECG signal of the user) before deployment from an off-line dealer. 3.2 Notation We will use the following notation to illustrate different primitives in our cryptographic operations: Biokey: is the ECG-generated key. Biokey Ref : is the template reference. It is used to authenticate sensor nodes by the base station. E k (M): an encryption of message M with a symmetric key K. E P ub (M): is an encryption of message M with the Base station s public key. Id: is a node s identifier. Figure 2: ECG signal A, B, C: are examples of node Ids. cmp 1, cmp 2,...: are examples of a counter (initialized to some random values). N A, N B, N C,...: are examples of a nonce generated by nodes A, B, C,..., respectively. 3.3 The Protocol The protocol is divided in four steps, key generation phase, key setup phase, key authentication phase and key update phase. 1) Key Generation Phase: While many physiological features can be utilized as biometrics, the ECG has been found to specifically exhibit desirable characteristics for WBAN applications. More specifically, it has delivered promising prospects for security in the WBAN settings. In this emerging area of research, the relevant ECG techniques ostensibly appear to be mere examples of fiducial methods. Fiducials are essentially points of interest on a heartbeat. The P, PQ, QRS, QT, T and RR time intervals as well as the amplitudes of P, R and T fiducials Figure 2 can be used to provide security in WBAN. Good cryptographic keys need a high degree of randomness, and keys derived from random time varying signals have higher security, since an intruder cannot reliably predict the true key. This is especially the case with ECG, since it is time-varying, changing with various physiological activities [14]. More precisely, heart rate variability is characterized by a (bounded) random process [25]. Following is given a description of our strategy for generating cryptographic keys from the ECG signal Figure 3. From a cryptographic perspective, the ECGgenerated binary sequence (in our work, it is noted Biokey), is already suitable for a symmetric encryption scheme. However, we use its morphed version using a morphing block (here we use the MD5 function
5 International Journal of Network Security, Vol. 12, No. 2, PP , Mar Figure 3: Key generation from ECG-signal for the morphing function M(.)) to ensure user privacy and confidentiality. As noted in [15], for privacy reasons, any signals, including biometrics, generated from physiological data should not be retraceable to the original data. The reason is because the original data may reveal sensitive medical conditions of the user, which is the case for the ECG. Therefore, a morphing block serves to confidently remove obvious correlations between the generated key and the original medical data. In the next section, is given how to exchange securely the generated session keys (K session ) between each sensor node and the base station. 2) Key Setup Phase: The node closest to the BS (base station) initiates the key setup phase by issuing the join- network message. In our sample topology shown in Figure 4, node A and node B are the closest to the BS. Using the process discussed above in Key Generation, each node should: Generates the biometric key Biokey. Computes the session key using Biokey and the morphing encoder (Ksession = M(Biokey)). Encrypts the Biokey with the base station s Public key, then transmits it to the Base Station. Let us assume node A initiates the key exchange phase: A BS : Id A, E pub (Biokey A), MAC(K sessiona, Id A Biokey A ). E KsessionA (Ok; cmp A ) BS Id A, E pub( Biokey A), MAC(K sessiona, Id A Biokey A) A C D E Figure 4: Node A initiates the key setup phase The base station decrypts the received message with its corresponding private key, compares the received Biokey A to the template reference Biokey Ref. On confirming the validity of the device (i.e. the check is successful), the base station computes the session key K sessiona using the received Biokey A. It uses this key (K sessiona ) to check the MAC message and to send the following encrypted information to node A: an Ok message and a counter cmp A, initialized to some random value. The counter is used to assure freshness. Every time the counter is used, the value gets incremented by 1. BS A : E KsessionA (Ok, cmp A ). B
6 International Journal of Network Security, Vol. 12, No. 2, PP , Mar The first nodes that manage to complete the key setup procedure with the base station act as gateways for the other nodes in the network. The next sensor node (assume C as shown in Figure 5) wishing to join the network performs the same sequence of steps performed by node A: Generates the biometric key Biokey C. Computes the session key K sessionc, (K sessionc = M(Biokey C )) Encrypts the Biokey C with the base station s Public key. The request join- network is then broadcast by the node C. E KsessionC (Ok; cmp C, Id A, K A-C ) BS Id C, E pub ( Biokey C ), MAC(K session, Id C Biokey C ) Id A, E KsessionA (N A ) A Id C, E pub ( Biokey C ), MAC(K sessionc, Id C Biokey C ) C D E Figure 5: Node C initiates the key exchange phase In our sample topology, the request will be received by the node A. C A : Id C, E pub (Biokey C ), MAC(K sessionc, Id C Biokey C ). Node A generates a nonce N A and encrypts it with its session key. It appends its identifier Id A and the encrypted N A to the request. The request is finally forwarded to the BS: A BS : Id C, E pub (Biokey C ), MAC(K sessionc, Id C Biokey C ), B Id A, E KsessionA (N A ). The base station performs the routine validity checks on the sensor node and sends node C the information it needs to be a part of the network. In addition to the Ok message and the counter cmp C the base station also sends node C the identifier 1 Id A of node A and the key authentication K A C (K A C = M(K sessiona N A )) to inform it that node A is its gateway to reach the base station. BS C : E KsessionC (Ok, cmp C, Id A, K A C ). 1 K A C is used to secure communication link between node A and node C. Once this information is available at node C, it attempts to authenticate its gateway A as described in the next section. Node C is setting up a secure key with the base station. The gateway node A has already successfully complete the key setup procedure with the base station. 3) Key Authentication Phase: On receiving the Id A and the key authentication K A C, node C attempts to authenticate its gateway A using a challenge response. To do so, node C generates a nonce N C, encrypts it with the key authentication K A C and transmits it to the node A. Node A, on receiving an authenticate me message, computes its own copy of K A C = M(K sessiona N A ) and responds with the original nonce N C and a new nonce N A, both encrypted with the newly agreed key K A C. To complete node C s authentication, node C responds with the nonce N A encrypted with the shared key K A C. NodeC NodeA : Id C, E KA C (N C). NodeA NodeC : Id A, E KA C (N C, N A). NodeC NodeA : Id C ; E KA C (N A). The same process is then carried out for all the remaining sensor nodes as they join the network. 4) Key Update Phase: a key update tries to prevent long term attack aiming to extract the encrypting keys by analyzing the encrypted traffic over the network for long time. In a WBAN an automatic key update must be defined, since a network can be deployed for many days or months. In our approach, we propose a periodic key update for each established session key. The key update is initiated by the base station by launching a key update request. On receiving the key update request, each sensor node generates a new biometric key Biokey, Encrypts it with the base station s public key and sends the encrypted message to the base station. Node BS : E P ub (Biokey ). On receiving the encrypted message, the base station decrypts it, checks the node s validity, computes the new session key from Biokey (the new key K session = M(Biokey )), updates the session key and sends an Ok message and a new counter cmp to the node. BS Node : E K session(ok, cmp ). The period of the key update is relative to the key length and the complexity of the used algorithm which means that this period is fixed by the administrator of the WBAN.
7 International Journal of Network Security, Vol. 12, No. 2, PP , Mar Analysis 4.1 Security Services Confidentiality: This aspect is ensured by the use of symmetric encryption to encrypt the exchanged traffic between the base station and sensor nodes. The confidentiality is enforced using automatic key update to prevent long term attacks. Integrity: The integrity in our approach can be ensured using MAC (Message authentication codes) computed and joined to each sent packet between the base station and any sensor over the network. Authentication: Authentication between sensor nodes over the WBAN as well as between each sensor node and the base station is ensured using the ECG-generated keys. Table 2: Energy cost comparison Schemes based ECC Energy cost (mj) SSSL 39 SKERBEROS 39,6-47,6 Our protocol 28,13 Data freshness: the use of the counter avoids replay attacks and ensure data freshness. 4.2 Energy Cost Analysis The energy cost of any key management scheme is determined by the energy required for the execution of cryptographic primitives and the energy needed for transmitting the encrypted data. According to [26], the transmission of a single byte of data requires 59, 2muJ and 28, 6µJ for reception. To join network, a sensor node needs to send one message to the base station containing its identifier (1 bytes), the biometric key (16 bytes) and the MAC message (16 bytes) added 12 bytes of protocol headers. Thus the size of the sent packet is 45 bytes, the energy needed for transmitting such packet is 2,67 mj. In reception, added to the protocol headers the sensor node receives an Ok message (2 bytes) and a counter (4 bytes) added one bytes of gateway s identifier and 16 bytes of the key authentication if the sensor node is far from the base station and cannot directly communicate with it, the energy needed for reception is 1,01 mj at max. In addition, the energy needed to encrypt the message using the base station s public key is 22, 82 mj and that needed to decrypt the received message sent by the base station is 0,054 mj according to [26] if the used algorithm is AES and using 128 bits key length. Therefore the total energy cost is 26, 56 mj. To complete mutual authentication, a sensor node needs a 1, 57 mj to complete the challenge response. Consequently, the total energy cost of our protocol is 28, 13mJ. Compared to other schemes based ECC-160 bits (Table 2, Figure 5) like simplified SSL protocol [6] or simplified Kerberos protocol [11] where their energy costs are respectively 39 mj and mj, our scheme is more energy saving which make it very suitable for wireless body area network. Figure 6: Energy cost consumption 5 Concluding Remarks Wireless Body Area Networks (WBANs) are an enabling technology for mobile health care. These systems reduce the enormous costs associated to patients in hospitals as monitoring can take place in real-time even at home and over a longer period. A critical factor in the acceptance of WBANs is the provision of appropriate security and privacy protection of the wireless communication medium. The data traveling between the sensors nodes should be kept confidential and integrity protected. Certainly in the mobile monitoring scenario, this is of uttermost importance. In this paper, we have presented a trust key management scheme for wireless body area network. Our protocol attempts to solve the problem of security and privacy in WBANs. It also aims to securely and efficiently generating and distributing the session keys between the sensor nodes and the base station to secure end to end transmission. It also allows to secure communication links between the nodes themselves. Compared to other approaches, our approach is more suitable for wireless body area network because it is efficient and energy saving. Acknowledgments The research is developed in STIC (System and Technology of Information and Communication) Laboratory, Department of telecommunications, University of Tlemcen, Tlemcen, Algeria.
8 International Journal of Network Security, Vol. 12, No. 2, PP , Mar References [1] S. D. Bao, C. Y. Poon, Y. T. Zhang, and L. F. Shen, Using the timing information of heartbeats as an entity identifier to secure body sensor network, IEEE Transactions on Information Technology in Biomedicine, pp , [2] S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body, Proceedings of the 32nd International Conference on Parallel Processing, pp , [3] E. Dishman, Inventing wellness systems for aging in place, IEEE Computer, vol. 37, no. 5, pp , May [4] M. R. Doomun and K. M. S. Soyjaudah, Analytical comparison of cryptographic techniques for resourceconstrained wireless security, International Journal of Network Security, vol. 9, no. 1, pp , July [5] J. GrosschLadl, TinySA: A security architecture for wireless sensor networks (extended abstract), Proceedings of the 2nd International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2006), Lisbon, Portugal, December 4 7, ACM Press, [6] J, GrosschL adl, Alexander Szekely, Stefan Tillich, The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks (Extended Abstract), ASIACCS 07, pp , Singapore, Mar , [7] M. Guennoun, M. Zandi, and K. E. Khatib, On the use of biometrics to secure wireless biosensor networks, Information and Communication Technologies: From Theory to Applications, pp. 1-5, [8] R. S. H. Istepanian, E. Jovanov, and Y. T. Zhang, Guest editorial introduction to the special section on m-health: Beyond seamless mobility and global wireless health-care connectivity, IEEE Transactions on Information Technology in Biomedicine, vol. 8, no. 4, pp , Dec [9] E. Jovanov, A. Milenkovic, C. Otto, and P. C. D. Groen, A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation, Journal of NeuroEngineering and Rehabilitation, vol. 2, no. 6, Mar ( [10] C. Karlof, N. Sastry, and D. Wagner, TinySec: A link layer security architecture for wireless sensor networks, Second ACM Conference on Embedded Networked Sensor Systems, pp , Nov [11] T. Landstra, S. Jagannathan, and M. Zawodniok, Energy-efficient hybrid key management protocol for wireless sensor networks, International Journal of Network Security, vol. 9, no. 2, pp , Sep [12] A. Liu and P. Ning, TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks, Proceedings of the International Conference on Information Processing in Sensor Networks, pp , [13] K. Lorincz, D. J. Malan, T. R. F. F. Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh, and S. Moulton, Sensor networks for emergency response: Challenges and opportunities, IEEE Pervasive Computing, vol. 3, no. 4, pp , [14] S. Lu, J. Kanters, and K. H. Chon, A new stochastic model to interpret heart rate variability, Proceeding of the 25th EMBS Annual International Conference, pp , [15] S. S. M. Meingast and T. Roosta, Security and privacy issues with health care information technology, Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp , Aug [16] K. Malasri, and L. Wang, Addressing security in medical sensor networks, Proceedings of the 1st ACM SIGMOBILE International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments, pp. 7-12, ACM, [17] K. Malasri and L. Wang, Addressing Security in Medical Sensor Networks, HealthNet 07, pp. 7-12, San Juan, Puerto Rico, USA, June 11, [18] M. Manzo, T. Roosta, and S. Sastry, Time synchronization attacks in sensor networks, Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp , [19] Md. M. Haque, A. S. K. Pathan, and C. S. Hong, Securing U-healthcare sensor networks using public key based scheme, ICACT 08, pp , Feb , [20] H. S. Ng, M. L. Sim, and C. M. Tan, Security issues of wireless sensor networks in healthcare applications, BT Technology Journal, vol. 24, no. 2, pp , [21] C. Otto, A. Milenkovic, C. Sanders, and E. Jovanov, System architecture of a wireless body area sensor network for ubiquitous health monitoring, Journal of multimedia, vol. 1, no. 4, pp , [22] D. Singelee, B. Latre, B. Braem, M. Peeters, M. D. Soete, P. D. Cleyn, B. Preneel, I. Moerman, and C. Blondia, A secure low-delay protocol for multi-hop wireless body area networks, Ad-hoc, Mobile and Wireless Networks, pp , Sep. 20, [23] P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, NanoECC: Testing the limits of elliptic curve cryptography in sensor networks, Proceedings of the 5th European conference on Wireless Sensor Networks, LNCS 4913, pp , Springer- Verlag, [24] L. Uhsadel, A. Poschmann, and C. Paar, Enabling full-size public- key algorithms on 8-bit sensor nodes, Proceedings of European Workshop on Security in Ad-Hoc and Sensor Networks, LNCS 4572, pp , Springer-Verlag, 2007.
9 International Journal of Network Security, Vol. 12, No. 2, PP , Mar [25] K. Venkatasubramanian and S. S. Gupta, Physiological Value Based Security. (ftp. cs. rochester. edu/ security-privacy-overview-and-biosensors.ppt) [26] K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, EKG-based key agreement in body sensor networks, IEEE Conference on Computer Communications Workshops, pp. 1-6, [27] S. Warren, J. Lebak, J. Yao, J. Creekmore, A. Milenkovic, and E. Jovanov, Interoperability and security in wireless body area network infrastructures, Proceedings of the 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp , [28] A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, and J. Stankovic, ALARM-NET: Wireless sensor networks for assisted-living and residential monitoring, Department of Computer Science, University of Virginia, Technical Repport, CS , Mohammed Feham received his PhD in Engineering in optical and microwave communications from the university of Limoges, France in 1987, and his PhD in science from the university of Tlemcen, Algeria in Since 1987 he has been assistant professor and professor of microwave and communication engineering his research interest is in telecommunication systems and mobile networks. Boucif Amar Bensaber received his PhD in computer science from the university of Rene Descartes (Paris V), France in In 1999, he worked as a scientist research associate at the research and evaluation center in diagnostics (RECD), CHUS Sherbrooke (Canada). Since 2000, he has been professor at the university of Quebec (UQTR), Canada. His research interest is in wireless networks, multicast protocols, distributed architectures, information and communication technologies and data mining. Mohammed Mana received his engineer degrees in computer science from the University of Tlemcen, Algeria in 2003, and his M.S. degrees in networks and telecommunication systems within of the same University in Member of STIC laboratory in the University of Tlemcen. Now he is an assistant professor in computer science at the university of Saida, Algeria. His recent work is dealing with mobile wireless networks, their applications, their security, routing and management.
Security Issues in Biomedical Wireless Sensor Networks
Security Issues in Biomedical Wireless Sensor Networks Tassos Dimitriou, Krontiris Ioannis Athens Information Technology, 19002 Peania, Athens, Greece {tdim,ikro}@ait.edu.gr Abstract Within the hospital
BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKS
BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKS Samira Mesmoudi and Mohammed Feham STIC Laboratory, University of Tlemcen, Algeria {s_mesmoudi, m_feham}@mail.univ-tlemcen.dz
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Security and Privacy Issues in Wireless Sensor Networks for Healthcare
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring
Foundation University, Islamabad, Pakistan [email protected]
Kerberos Authentication in Wireless Sensor Networks Qasim Siddique Foundation University, Islamabad, Pakistan [email protected] ABSTRACT We proposed an authentication mechanism in the wireless sensor
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
WAITER: A Wearable Personal Healthcare and Emergency Aid System
Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping
Realizing Robust User Authentication in Sensor Networks
Realizing Robust User Authentication in Sensor Networks Zinaida Benenson Chair of Computer Science 4 [email protected] Nils Gedicke Chair of Computer Science 4 [email protected]
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
CSC 774 Advanced Network Security. Outline. Related Work
CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastr, David Wagner Presented By: Tristan Brown Outline Motivation Cryptography Overview TinySec Design Implementation
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS Raghav V. Sampangi 1, Saurabh Dey 2, Shalini R. Urs 3 and Srinivas Sampalli 1 1 Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia,
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
ONLINE HEALTH MONITORING SYSTEM USING ZIGBEE
ONLINE HEALTH MONITORING SYSTEM USING ZIGBEE S.Josephine Selvarani ECE Department, Karunya University, Coimbatore. Abstract - An on-line health monitoring of physiological signals of humans such as temperature
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
A NEW ARCHITECTURE OF A UBIQUITOUS HEALTH MONITORING SYSTEM:
A NEW ARCHITECTURE OF A UBIQUITOUS HEALTH MONITORING SYSTEM: A Prototype Of Cloud Mobile Health Monitoring System Abderrahim BOUROUIS 1,Mohamed FEHAM 2 and Abdelhamid BOUCHACHIA 3 1 STIC laboratory, Abou-bekr
A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Body Area Network Security: Robust Secret Sharing
Body Area Network Security: Robust Secret Sharing Sang-Yoon Chang, Yih-Chun Hu, Hans Anderson, Ting Fu, Evelyn Huang University of Illinois Body Area Network Background Body area network (BAN) consists
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
PROTECTION OF SECURITY AND PRIVACY FOR MEDICAL DATA IN WIRELESS MEDICAL SENSOR NETWORKS
PROTECTION OF SECURITY AND PRIVACY FOR MEDICAL DATA IN WIRELESS MEDICAL SENSOR NETWORKS C.Gayathri 1, D.Sathya 2 1 Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore,
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Summer projects for Dept. of IT students in the summer 2015
Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project
Ubiquitous Healthcare Monitor System Using Wearable Wireless Sensor Network
Ubiquitous Healthcare Monitor System Using Wearable Wireless Sensor Network Chetan D. Kurjekar 1 and Nikhil M. Palekar 2 Computer Science and Engineering, Jawaharlal Darda College of Engineering and Technology,
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
Design of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Access Control And Intrusion Detection For Security In Wireless Sensor Network
Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTERING AND KEYING TECHNIQUES
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTERING AND KEYING TECHNIQUES V K Singh 1 and Kalpana Sharma 2 1 Department of Computer Science & Engineering, Sikkim Manipal Institute
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Evaluating The Performance of Symmetric Encryption Algorithms
International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
Formal Analysis of A Novel Mutual Authentication and ey Agreement Protocol Ja'afer M. AL-Saraireh Applied Science University Amman 11961, Jordan Saleh S. Saraireh Philadelphia University Amman 11961, Jordan
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof [email protected] UC Berkeley Naveen Sastry [email protected] UC Berkeley David Wagner [email protected]
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Security Solutions for Wireless Sensor Networks
Dirk WESTHOFF, Joao GIRAO, Amardeo SARMA Abstract This paper describes security solutions for collecting and processing data in Wireless Sensor Networks (WSNs). Adequate security capabilities for medium
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,
Secure Large-Scale Bingo
Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,
DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES
In: Advances in Communications and Media Research ISBN 978-1-60876-576-8 Editor: Anthony V. Stavros, pp. 2010 Nova Science Publishers, Inc. Chapter 3 DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES
Alternative Biometric as Method of Information Security of Healthcare Systems
Alternative Biometric as Method of Information Security of Healthcare Systems Ekaterina Andreeva Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia [email protected]
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY
EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY This document introduces some basic security concepts, including network layer security, trust centers, and application support layer security features.
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Fundamentals of Mobile and Pervasive Computing
Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable
Security for Ubiquitous and Adhoc Networks
Security for Ubiquitous and Adhoc Networks Mobile Adhoc Networks Collection of nodes that do not rely on a predefined infrastructure Adhoc networks can be formed merged together partitioned to separate
