Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
|
|
|
- Cornelius Rodgers
- 9 years ago
- Views:
Transcription
1 Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA [email protected] Yunghsiang S. Han Graduate Institute of Communication Engineering National Taipei University Sanhsia, Taipei, 237 Taiwan [email protected] Abstract In Wireless Sensor Networks (WSNs), symmetric key schemes may be used to provide security. Recently, a class of random key pre-distribution techniques have been proposed and investigated. Such techniques only guarantee to establish keys for some pairs of physically connected sensors. In this work, we address the issue of delivering secret link keys to each of the source s neighbors in wireless sensor networks. We propose a scheme called Babel that finds a common bridge node to deliver one key to each of the to-be-connected neighbors. The novelty of our scheme is to deliver multiple keys through a common bridge node and regular paths instead of multi-hop secure paths. Since the delivered keys are only disclosed to one node, the common bridge node, key compromise probability of the Babel scheme is significantly lower compared to other delivery techniques. I. INTRODUCTION Wireless Sensor Networks (WSNs) have been the focus of active research over the past few years. Some researchers investigated efficient data delivery, energy conservation, and other related issues []. Network security has also been a research focus mainly due to the fragility of the sensor nodes against node capture and modification. In order to provide security for communication and data collection in WSNs, security keys need to be delivered and used. Due to the lack of trusted servers nearby (for public/private key schemes), secret key schemes may be more viable to protect such local communications. The question is how to deliver such secret keys to the communicating nodes. In 2002, Eschenauer and Gligor proposed a random key pre-distribution technique allowing sensors to preload a subset of keys (key ring) from a large key pool. It has been shown that, when the size of the key ring and the size of the key pool are chosen carefully, the neighboring sensors will have a relatively large probability of sharing a common key. With such a shared key, the neighboring nodes can establish secret link key securely [2]. The scheme has been extended by researchers in several research groups [3] [5]. It has been shown that there are still some local links that are disconnected on the security plane. The lack of such secure links can be thought as intentional. This is because an extremely high local connectivity (on the security plane) would mean higher vulnerability and lower network resilience, as shown in [2], [4]. In this work, we focus on the issue of delivering secret link keys from a source to multiple neighbors. Random key predistribution techniques may only connect some neighbors to the source with common keys. Other neighbors are still disconnected from the source on the security plane. Eschenauer and Gligor suggested to use the secure multi-hop path scheme to deliver such secrets [2]. In their scheme, the secret is disclosed to all the nodes on the path. If any of these nodes is compromised, the secret is disclosed to the adversary. Instead, we propose a new technique called Babel that tries to find a common bridge node to deliver secret link keys to these neighbors. The novelty of our scheme is to deliver multiple keys with the use of a common bridge node and regular paths instead of multi-hop secure paths. Since the delivered keys are only disclosed to one node, the common bridge node, key compromise probability of the Babel scheme is significantly lower compared to other delivery techniques. We expect our scheme to be implemented in the networks where the source node needs to communicate with all its physical neighbors securely. Disclosure of any information sent from the source poses a security threat. An example is the cluster-based wireless sensor networks where the cluster head needs to communicate with the sensors in its neighborhood. Besides the related work discussed above [2], [4], [5], Chan et al. presented a technique to establish secure link keys for two neighboring nodes if they do not share enough common keys [3]. These two neighbors first identify all secure paths between themselves. Then one node generates a set of random keys (of the same size) for all the paths and send one key to the destination through each of the paths. After the destination receives all the numbers, it exclusive-ors all of them to obtain the secret link key. Li et al. proposed to use k intermediate nodes between two sensors to establish a link key [6]. Two methods were presented to identify such k nodes, which should be securely-connected to both nodes. The maximum distance separable (MDS) codes are used to establish link keys between neighbors without common keys through multiple paths [7], [8]. Traynor et al. proposed to use a few more powerful sensors to achieve key establishment [9]. Since these sensors are expected to have tamper-resistant hardware, the keys on these sensors are considered safe. Miller and Vaidya proposed to use Bloom filter and Merkel trees to
2 Z G A Fig.. Illustration of the security connectivity around node S. Solid lines represent security and physical connectivity. Dotted lines connect physical neighbors but they don t share any common key. Node Z is a node that is relatively far away from the neighborhood but it shares a key with all nodes connected with it through dashed lines. distribute key information so that the chance of neighboring nodes establishing a key can be close to [0]. B S F C II. PROBLEM FORMULATION Figure illustrates the problem of delivering multiple secret link keys to neighboring nodes. Node S has several physical neighbors, which include nodes A, B, C, D, E, F, and G, clockwise. The solid lines in Fig. represent security and physical connectivity. The dotted lines represent physical connectivity only. Therefore, links S-B, S-E, and S-G are disconnected on the security plane. Nodes B, E, and G are termed to-be-connected neighbors, N tbc. In order to secure the data transmission between node S and all its neighbors with symmetric encryption/decryption technique, we need to establish a secret link key for each of the physical links connecting to node S. In Fig., the secret link key between node S and nodes A, C, D, and F can be set up easily with the shared keys. However, it is more difficult for node S to establish secret link keys with nodes B, E, and G. Problem Statement: (Delivery of Multiple Secret Link Keys) When random key pre-distribution techniques are employed in WSNs, it is possible that sensor nodes do not share keys with several neighboring nodes. In order to establish secure communication for these links, secret link keys need to be delivered to these neighbors. How should these secret link keys be delivered so that the chance of secret disclosure is as small as possible? III. THE BABEL SCHEME In this work, we propose the Babel scheme to deliver multiple secret link keys toward the to-be-connected neighbors. Our main idea is to find one node that shares keys with the source node and each of its to-be-connected neighbors. The node is termed common bridge node. The common bridge node will be the only node other than the source and the receiving nodes knowing the secrets. All nodes in between E D only serve as passive routers without knowing the secrets that they help to forward. Such an approach lowers the key disclosure probability. We will discuss the chance of finding such a common bridge node and how to deliver multiple secret link keys securely when it cannot be found in Section III-B. A. The Babel Scheme We introduce the Babel scheme through the example shown in Fig.. Denote the set of keys stored on node i as K i. Node S collects the Message Authentication Codes (MACs) of a challenge message based on each of the keys in K S, K B, K E, and K G. These information are control-flooded in the network. Each overhearing node compares the MACs of the message based on its carried keys and those on the overheard information. Only those nodes sharing a key with the source and each of the to-be-connected neighbors will respond. As an example, we assume that node Z satisfies the above condition, i.e., node Z shares at least one key with each of these nodes (nodes S, B, E, and G). The shared keys could be different or the same. It will respond and volunteer to serve as the common bridge by replying to node S. The reply message includes its response to each of the challenges with the shared keys. Every node not satisfying the shared key criteria forwards the message by attaching its ID to the end of the message (for path record). Note that node Z may be physically multi-hop away from the source node. Controlled flooding is used, i.e., the message may only travel up to a certain number of hops, Time-To-Live (TTL). The message is discarded when it has been forwarded TTL times. When the reply from node Z arrives at node S, node S sends them to the to-be-connected neighbors. Each of the tobe-connected neighbors validates the responses and ensures that node Z does share a key with itself. After each node verifies node Z s claim of sharing a key, node S sends the secret link keys (for nodes B, E, and G) to node Z. Upon receiving the message, Node Z encrypts the secret link keys with the shared keys with nodes B, E, and G, respectively. For example, the secret link key between nodes S and B will be encrypted at node Z with the common key between nodes Z and B. Such encrypted secret link keys are then returned to node S. Node S forwards the encrypted secret link keys to the to-be-connected neighbors, which decrypt the secret link keys. Note that all message transmissions between nodes S and Z, except the first broadcast message, are encrypted with the shared key between these two. This will protect the transmitted information from being disclosed to a third party. Even though node Z can send all information to nodes B, E, and G directly, transmission through node S is preferred in order to protect the scheme from nodes, especially the non-common-bridge-nodes, faking common keys. The transmission overhead is slightly higher but the scheme is more secure [7], [8]. We use the challenge-response technique to verify the common keys between the common bridge node and the source and the to-be-connected neighbors. With the use of this technique, key and key index disclosure are unnecessary.
3 The pseudo-code of the Babel scheme is shown through Algorithms, 2, and 3. In particular, Algorithm finds a common bridge node. Algorithm 2 verifies the responses from the common bridge node. Algorithm 3 is then used to send secret link keys through the common bridge node. We use the following notations in our pseudo-codes: Time-To-Live (TTL): a predefined number of hops for the request message to travel λ: the number of keys carried by each node S: source node N tbc : set of to-be-connected neighbors of S K i,t : keys on node i, i {S} N tbc, t λ t i : the index of the shared key between the common bridge node and node i, i {S} N tbc LK S,i : secret link key between nodes S and i, i N tbc Algorithm Pseudo-code to Find Common Bridge Node : S obtains MAC(i, t) based on K i,t for each (i, t), i {S} N tbc, t λ 2: S broadcasts a msg with MACs and TTL 3: for each z receiving the msg do 4: if i {S} N tbc, t i, such that MAC(z, t i ) = MAC(i, t i ) then A common bridge node is found 5: z prepares responses to MAC(i, t i ), i {S} N tbc 6: z encrypts responses with K z,ts 7: Msg and MAC(S, t S ) are sent from z to S 8: else 9: TTL TTL- 0: if TTL > 0 then : z adds its ID to the end of msg 2: z forwards the msg 3: else 4: z discards the msg 5: end if 6: end if 7: end for B. Discussions Due to the page limit, we provide the following brief discussions of the Babel scheme in this subsection. Note that a node lying about its keys either cannot decrypt the message from node S or its responses for the challenges from the to-be-connected neighbors fail. It is possible that such a node Z cannot be found to share a key with each of these nodes. Then multiple nodes may be used to deliver secret link keys for all these nodes. For instance, node Z may be used to deliver secret link keys toward nodes B and E. Node Z 2 may be used to establish a secret link key toward node G. When each common bridge node is only required to connect the source node and one tobe-connected neighbor, the scheme is similar to the scheme in [6] with k =. Algorithm 2 Pseudo-code to Verify Common Bridge Node : S verifies response from z on claimed common key K z,ts 2: if response is valid then 3: S decrypts msg with K S,tS 4: S forwards responses from z to each i N tbc 5: for each i N tbc do 6: i verifies response from z on claimed common key K z,ti 7: if response is valid then 8: i sends confirmation to S 9: end if 0: end for : if S receives confirmation for each i N tbc then 2: S accepts z as the common bridge node 3: else 4: S rejects z as the common bridge node 5: end if 6: else 7: S discards msg 8: end if Algorithm 3 Pseudo-code to Send Secret Link Keys : S encrypts LK S,i, i N tbc, with K S,tS 2: S sends encrypted msg to z 3: z decrypts msg with K z,ts, recovering LK S,i, i N tbc 4: i N tbc, z encrypts LK S,i with K z,ti 5: z encrypts encrypted link keys with K z,ts 6: z sends msg to S 7: S receives msg from z, decrypts msg with K S,tS 8: S sends encrypted link keys to i N tbc 9: i N tbc decrypts link key with K i,ti Multiple bridge nodes may be used to deliver partial or encoded link key information from node S to nodes B, E, and G. In fact, assuming a large number of sensors in the network, we can find many nodes similar to node Z. Assuming that we find l such nodes, nodes Z, Z 2, and Z l. MDS scheme given in [8] may be used to encode the link keys. When l is arbitrarily large, the compromise probability of the link keys can be arbitrarily low. IV. ANALYSIS A. Probability of Finding a Common Bridge Node We will analyze the chance of finding a common bridge node based on an independent, sharing key probability. A more realistic analysis should consider the size of the key pool and the number of carried keys, λ, but we leave that to our future work. Note that, when the number of carried keys is much larger than the number of to-be-connected neighbors, these two models should be close to each other. Assume there are N nodes in the sensor network. The probability of two nodes sharing at least a common key is. Suppose there are m to-be-connected neighbors.
4 Probability of finding at least one common bridge node, P bridge m=2 0.2 m=3 m=4 m=5 0. m=6 m= Connectivity probability, Fig. 2. The probability of finding a common bridge node. These are numerical results based on () when N = 500. The chance of finding at least one sensor in the network that can help to deliver the secret link keys is: P bridge = [ ( ) m+ ] N m, () where ( ) m+ represents the probability that one node does not share a common key with the source and each of its m neighbors and we have assumed that the events of each pair of nodes sharing a common key are mutually independent. In Fig. 2, we show the numerical results of the probability of finding at least a common bridge node in various network scenarios. The results of different number of to-be-connected neighbors, m, are presented in Fig. 2. As m increases, the probability of finding at least one common bridge node lowers. But this probability can be seen to be close to one when > B. Security Analysis In our security analysis, we measure the probability of any secret link key being compromised or disclosed. Since there are altogether m keys to be delivered and established, anytime one or all of these secret link keys are compromised, we treat the secret link key delivery compromised. We argue that such a security analysis provides an accurate guideline for several communication structure such as cluster-based WSNs. Since such secret link keys will be used for intra-cluster communication that should be protected from all outsiders, the disclosure of any secret link key (hence communication) will lead to security compromise in the cluster. Our security analysis is based on the assumption that a ratio of 0 x c < sensors are compromised by the adversary. We assume that adversaries compromise sensor nodes randomly. When a sensor is compromised, all information attached to the sensor is disclosed. Since our scheme only uses one common bridge sensor to deliver link keys to the neighbors, the chance of such keys being compromised is simply x c plus p e (x c ), where p e (x c ) is the probability that any of the common keys shared by node Z and node S, or any of node Z and any of the to-be-connected neighbors of node S, is broken because other nodes in the network are compromised. That is, P (Babel) c = x c + p e (x c ). (2) Note that p e (x c ) depends on the random key pre-distribution scheme employed in the network. If we consider the multiplespace scheme proposed in [4], p e (x c ) is quite small when x c is less than a threshold. We shall investigate the compromise probability of the secure multi-hop path scheme [2]. In this scheme, the source finds a secure multi-hop path toward each to-be-connected neighbor. Many bridge nodes are employed in this scheme, increasing its vulnerability. Let the chance of having j, j, nodes serving as bridge nodes be q j, j= q j =. When there are altogether j bridge nodes, the chance of any link key being compromised becomes P (Multi) c j ( x c ) j + p e (x c ), (3) where inequality is because that the secret link keys are encrypted/decrypted by j sensors with different shared keys and we have used p e (x c ) as the lower bound of compromise probability. Equality appears when j =. Therefore, the chance of having any secret link key compromised is P (Multi) c + p e (x c ) q j ( x c ) j. (4) j= V. PERFORMANCE EVALUATION We used Matlab in our simulations, in which N sensors are randomly deployed to an area of 000 by 000 m 2. Wireless transmission range is 00 m. Every pair of nodes had a chance of being securely connected. We chose one source randomly and tried to establish a secret link key to each of its security-disconnected neighbors. In our simulations, we used a simplified circular connectivity model and an abstract of the physical and networking models. Furthermore, we focused on key sharing among different nodes. Therefore, simulations through NS2 or OPNET are unnecessary at this stage. A. Transmission Cost Since the transmission overhead of our scheme depends largely on how far the common bridge node is away from the source node, we measured the average hop count as the transmission cost. In Fig. 3, we show such average hop count as a function of key sharing connectivity,. Curves for networks with different total number of sensors are shown to represent the effect of different node density. It is interesting to see from Fig. 3 that the number of hops toward the closest common bridge node is roughly the same for various N values when is either large or small. This might have been caused by the opposite effects of more nodes and more to-be-connected neighbors. When is in the middle, larger N leads to longer hops because of more to-beconnected neighbors.
5 Average Hop Count, h Fig. 3. source. Secret compromise probability, P c N=300 N=500 N= Connectivity probability, The average hop count from the common bridge node toward the Babel =0.5, N=300 =0.5, N=500 =0.5, N=800 =0.8, N=300 =0.8, N=500 =0.8, N= Compromise probability, x c Fig. 4. The relative value of compromise probability for Babel and the secure multi-hop path scheme [2]. We neglect the term p e(x c) in both (2) and (4). Note that the compromise probability shown for the secure multi-hop path scheme is a lower bound. B. Compromise Probability We have also measured the chance of secret link keys being compromised and disclosed. The comparisons were made between the Babel scheme and the secure multi-hop path scheme [2]. In the secure multi-hop path scheme, the source node finds a secure multi-hop path, on which every two consecutive nodes share at least a key, to deliver a secret link key. We first counted the occurrences of having j unique intermediate bridge nodes and calculated the compromise probability based on (4). We have omitted the term of p e (x c ) in our comparisons. The results are shown in Fig. 4, where we demonstrate the performance of the Babel scheme and the secure multi-hop path scheme. Note that the performance of the Babel scheme does not change with N or due to its unique property of employing one common bridge node. We can see that the Babel scheme has a lower compromise probability for all x c values. As increases, the compromise probability of the secure multi-hop path scheme lowers. This is because of the smaller hop and smaller number of intermediate bridge nodes when increases. VI. CONCLUSIONS We have proposed the Babel scheme that delivers secret link keys toward multiple to-be-connected neighbors. The Babel scheme makes use of a remote node that shares at least a key with the source and each of its to-be-connected neighbors. Our preliminary analysis and performance evaluation show that Babel outperforms existing schemes such as the secure multihop path scheme in security performance. In future work, we will focus on analyzing the security performance of the Babel scheme and its comparison with related techniques. This is especially important because the Babel scheme employs a single node to forward the secret keys and fault-tolerance should be investigated. ACKNOWLEDGMENT This work was supported in part by grant LBoR0078NR00C and by the National Science Council of Taiwan, R.O.C., under grants NSC E REFERENCES [] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A survey on sensor networks, IEEE communications Magazine, pp. 02 4, August [2] L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, in Proc. of the 9th ACM conference on Computer and communications security, Washington, DC, USA, November , pp [3] H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, in Proc. of IEEE Symposium on Security and Privacy, Berkeley, California, May , pp [4] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, A pairwise key pre-distribution scheme for wireless sensor networks, ACM Transactions on Information and System Security, vol. 8, no. 2, pp , May [5] D. Liu and P. Ning, Establishing pairwise keys in distributed sensor networks, in Proc. of the 0th ACM Conference on Computer and Communications Security (CCS 03), Washington, DC, USA, October , pp [6] G. Li, H. Ling, and T. Znati, Path key establishment using multiple secured paths in wireless sensor networks, in Proc. of CoNEXT 05, 2005, pp [7] D. Huang and D. Medhi, A byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks, in Proc. of 9th IEEE International Parallel and Distributed Processing Symposium, Colorado, USA, April , pp. 240b 240b. [8] J. Deng and Y. S. Han, Using MDS codes for the key establishment of wireless sensor networks, in Proc. of the International Conference on Mobile Ad-hoc and Sensor Networks (MSN 05), X. Jia, J. Wu, and Y. He, Eds., Wuhan, P. R. China, December , vol of Lecture Notes in Computer Science (LNCS), pp , Springer- Verlag. [9] P. Traynor, H. Choi, G. Cao, S. Zhu, and T. LaPorta, Establishing pair-wise keys in heterogeneous sensor networks, in Proc. of the 25th Conference of the IEEE Communications Society (Infocom 06), Barcelona, Spain, April [0] M. J. Miller and N. H. Vaidya, Leveraging channel diversity for key establishment in wireless sensor networks, in Proc. of the 25th Conference of the IEEE Communications Society (Infocom 06), Barcelona, Spain, April
3/25/2014. 3/25/2014 Sensor Network Security (Simon S. Lam) 1
Sensor Network Security 3/25/2014 Sensor Network Security (Simon S. Lam) 1 1 References R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84,
A Secure Key Management Scheme in Wireless Mesh Networks
A Secure Key Management Scheme in Wireless Mesh Networks Farah Kandah, Weiyi Zhang, Xiaojiang Du, Yashaswi Singh Department of Computer Science, North Dakota State University, Fargo, ND 585 Department
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL 1 Rajesh C. Ramannavar, 2 Suma K.V 1 Student, 2 Assistant Professor M S Ramaiah Institute of Technology,Bengaluru,India Email: 1 [email protected],
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Neighborhood-Based Security Protocol for Wireless Sensor Networks
The 6th International Conference on Information Technology and pplications (ICIT 2009) Neighborhood-Based Security Protocol for Wireless Sensor Networks Di Zhang, Ung Heo, Yi Zhao, Kang Soo You* and Jaeho
Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-Distribution
Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-Distribution Kevin Henry Cryptography, Security, and Privacy (CrySP) Lab Cheriton School of Computer Science University
Fast and Scalable Key Establishment in. Sensor Networks
Fast and Scalable Key Establishment in 1 Sensor Networks Tassos Dimitriou, Ioannis Krontiris and Fotios Nikakis Athens Information Technology [tdim, ikro, fnik]@ait.gr Abstract We present a protocol for
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Secure Key Management Architecture Against Sensor-node Fabrication Attacks
1 Secure Key Management Architecture Against Sensor-node Fabrication Attacks Jeffrey Dwoskin Dahai Xu Jianwei Huang Mung Chiang Ruby Lee {jdwoskin, dahaixu, jianweih, chiangm, rblee}@princeton.edu Department
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks
Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks Seyit Ahmet Çamtepe Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 Email: [email protected]
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm
Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department
International Journal of Advancements in Research & Technology, Volume 2, Issue 7, July-2013 ISSN 2278-7763 473
473 Comparative Analysis of Hop-to-Hop and End-to-End Secure Communication Shital Y. Gaikwad M. Tech. (Second Year Student) (Computer Network and Information Security) SGGS Institute of Engineering and
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Efficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi [email protected] Sabancı University Computer Science and
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks
7 Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks Jaydip Sen Innovation Lab, Tata Consultancy Services Ltd. India 1. Introduction In recent years, wireless sensor
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Defending Wireless Sensor Networks Against Adversarial Localization
Defending Wireless Sensor Networks Against Adversarial Localization Neelanjana Dutta, Abhinav Saxena and Sriram Chellappan Department of Computer Science Missouri University of Science and Technology Rolla,
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Evolutionary Design of Secrecy Amplification Protocols for Wireless Sensor Networks
Evolutionary Design of Secrecy Amplification Protocols for Wireless Sensor Networks Petr Švenda, Lukáš Sekanina, Václav Matyáš Masaryk University and University of Technology, Brno, Czech Republic {svenda,
Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas
I.J.Computer Network and Information Security, 21, 2, 26-32 Published Online December 21 in MECS (http://www.mecs-press.org/) Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
Wireless Sensor Network: Improving the Network Energy Consumption
Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that
Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
Wireless Network Security 14-814 Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property
Providing End-to-end Secure Communications in Wireless Sensor Networks
1 Providing End-to-end Secure Communications in Wireless Sensor Networks Wenjun Gu, Neelanjana Dutta, Sriram Chellappan and Xiaole Bai Abstract In many Wireless Sensor Networks (WSNs), providing end to
Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Jungmin So Nitin H. Vaidya Coordinated Science Laboratory, University of Illinois at Urbana-Champaign Email:
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Simulation Modeling of Secure Wireless Sensor Networks
Simulation Modeling of Secure Wireless Sensor Networks Tuan Manh Vu Carey Williamson Reihaneh Safavi-Naini Department of Computer Science University of Calgary ABSTRACT This paper describes an extensible
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
Comparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control
Comparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control Haodong Wang, Bo Sheng, Chiu C. Tan, Qun Li College of William and Mary Williamsburg,
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
The allocation algorithm for data centers in cloud computing architecture from security perspective
The allocation algorithm for data centers in cloud computing architecture from security perspective *Chuan-Gang Liu 1,Hsin-Yi Lin, Kun-Ta Hsien Deparament of Information Technology, Chia Nan University
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks
Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
