Secure Time Synchronization Service for Sensor Networks
|
|
|
- Ruby Crawford
- 10 years ago
- Views:
Transcription
1 Secure Time Synchronization Service for Sensor Networks Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava Networked and Embedded Systems lab, 56-15B, EE-IV, University of California Los Angeles {saurabh, {capkun, ABSTRACT In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attacks. This toolbox includes protocols for secure pairwise and group synchronization of nodes that lie in each other s power ranges and of nodes that are separated by multiple hops. We provide an in-depth analysis of security and energy overhead of the proposed protocols. Categories and Subject Descriptors C.. [Computer Systems Organization]: Computer Communication Networks Network Protocols. General Terms Algorithms, Security, Verification. Keywords Sensor Networks, Security, Time Synchronization, Message Authentication Code, Delay. 1. INTRODUCTION Time synchronization is critical to sensor networks at many layers of its design. It enables better duty-cycling of the radio, accurate and secure localization, beamforming and other collaborative signal processing. Examples of existing sensor network applications where precise time is needed include: measuring the time-of-flight of sound; distributing an acoustic beam forming array; forming a low-power TDMA radio schedule; integrating a time-series of proximity detections into a velocity estimate; suppressing redundant messages by recognizing duplicate detections of the same event by different sensors; ordered logging of events during system debugging; integrating multi sensor data; or coordinating on future action. Imagine the detrimental affect on the functionality of all these applications if a malicious adversary is able to abuse the underlying time synchronization protocol. Nodes will have faulty estimates about the location of other nodes. Packets will be lost if the sleep-wakeup schedules of nodes do not intersect. This can further trigger unnecessary packet retransmissions if MAC layer acknowledgements are enabled. It will be trivial for adversaries to perform replay attacks. Collaborative data processing and signal processing techniques will be adversely affected. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. WiSE 05, September, 005, Cologne, Germany. Copyright 005 ACM /05/0009 $5.00. Although time synchronization problem has been thoroughly studied in sensor networks [1] and there are several prototype implementations, such as RBS [], TPSN [3], FTSP [4] that can achieve microseconds accuracy, none of the existing protocols are resilient to malicious attacks. These protocols have not been built with security in mind. Realizing the inadequacy of existing time synchronization solutions, we develop several schemes for achieving secure time synchronization in sensor networks. Our approach involves integrating security mechanisms into existing protocols as well as developing new protocols from scratch. Our contributions are three fold. First, we perform an in-depth security analysis of the senderreceiver synchronization protocols [], [3]. We show that as sensor networks are deeply coupled with the physical world that they monitor, a malicious adversary can subvert the time synchronization protocol by exploiting weaknesses at the interface between the sensor network and the physical world. Examples of time synchronization protocols vulnerable to these attacks include TPSN [3], FTSP [4], LTS [5], Mini/Tiny Sync [6]. Although exactly the same attacks are feasible on receiver-receiver synchronization [3], we do not explicitly cover them in this paper due to space constraints. Second, we integrate security mechanisms into the basic approach of sender-receiver synchronization to propose a protocol for secure pairwise time synchronization in sensor networks. We show that for a nominal overhead, our protocol can counter malicious attacks from external attackers. We extend this basic scheme to propose and analyze three protocols for secure pairwise synchronization over multiple hops: opportunistic, direct and transitive. Each of these protocols offers a different point of operation in the energy security subspace and should be used according to the application needs. Third, we propose a protocol for secure group time synchronization. We show that this protocol is resilient to attacks from external attacker as well as to attacks from a subset of compromised group nodes. Typical applications of secure group synchronization include object tracking, beamforming, intruder detection and fire monitoring. These applications will function accurately only if the synchronization error between any two nodes in a monitoring group is bounded within some pre-specified limits. In our protocol this is achieved, in part, through data fusion, the process of transforming and merging individual sensor readings into a high-level sensing result. In this paper, we focus on detecting the malicious attacks. We abort the ongoing time synchronization protocol once the attack is detected. We neither provide mechanisms to prevent the attacks from taking place nor do we provide mechanisms to continue with the process of time synchronization while modifying the protocol taking into account the malicious attack. Both of these are challenging problems and form part of our future work. Yet, a significant contribution of this paper is to highlight the security 97
2 flaw of existing time synchronization protocols and prevent the sensor nodes from incorrectly assuming that they are synchronized when in reality they are not.. PROBLEM FORMULATION Our system consists of a network of sensor nodes. If two sensor nodes reside within the power range of one another, they are considered neighbors. We assume that the radio link between neighbors is bidirectional. We also assume that neighboring sensors share pairwise secret keys. There are several schemes in literature for secure pairwise key establishment between sensor nodes [7], [8], [9]..1 Sensor Node Clock Every sensor node maintains its own clock and this is the only notion of time that a node has. The clock is an ensemble of hardware and software components; it is essentially a timer that counts the oscillations of a quartz crystal running at a particular frequency. Let us represent this clock for node A by C A. Furthermore C A (t) represents the time in the local clock of node A at real time t. This real time can be UTC. In this paper, we are not concerned about synchronizing the clocks with real time; we will use it as a common reference to compare different sensor node clocks. The difference in the clocks of two sensor nodes at any time t is referred as the offset error between them. There are three reasons for the nodes to be representing different times in their respective clocks (1) The nodes might have been started at different times, () The quartz crystals at each of these nodes might be running at slightly different frequencies, causing the clock values to gradually diverge from each other (termed as the skew error), (3) The frequency of the clocks can change variably over time because of aging or ambient conditions such as temperature (termed as the drift error). Figure 1 summarizes these sources of error using a representative example of two nodes, A and B. 1. Offset (δ) = C A (t) - C B (t). Skew (η) = C A CB t t C 3. Drift (λ) = A C B t t Figure 1. Sources of Error In this paper, we aim to achieve instantaneous synchronization between sensor nodes. So our aim is to remove the offset error between the nodes at any given instant of time.. Sender-Receiver Synchronization The approaches for synchronizing a pair of nodes can be broadly classified as sender-receiver or receiver-receiver [3]. Pairwise sender-receiver synchronization is performed by a handshake protocol between a pair of nodes. This protocol is executed in three steps as follows 1 : Pairwise Sender-receiver Synchronization 1. A(T1) (T)B : A, B, sync 1 We use the following notation throughout this paper. Node-id (Send time) (Receive time) Node-id : Packet contents.. B(T3) (T4)A : B, A, T, T3, ack 3. A calculates offset between the nodes. Here, T1, T4 represent the time measured by the local clock of node A, C A. Similarly T, T3 represent the time measured by C B. At time T1, A sends a synchronization pulse packet to B. Node B receives this packet at T, where T is equal to T1+δ+d. Here, δ and d represent the offset between the two nodes and end-to-end delay respectively. At time T3, B sends back an acknowledgement packet. This packet contains the values of T and T3. Node A receives the packet at T4. Similarly, T4 is related to T3 as T4 = T3-δ+d. Node A can now calculate the clock offset and the end-toend delay as: ( T T1) ( T 4 T3) ( T T1) + ( T 4 T3) δ = ; d = K(1) Several schemes such as TPSN [], LTS [5], Mini/Tiny Sync [6] are based on sender-receiver synchronization..3 Malicious Attacks In this section, we list some of the attacks that an external malicious attacker can perform to abuse the functionality of the pairwise sender-receiver synchronization protocol. An external attacker will be successful if he makes node A calculate a faulty value of the offset. The attacker can modify the values of T and T3. It can change the contents of the message being sent from B to A or it can generate a completely new message by assuming the identity of node B. Besides directly modifying the values of T and T3, the attacker can influence their measurement. Notably, T is measured as the time at which the initial synchronization pulse packet sent by A is received at B. If an attacker could delay the time at which B receives the synchronization pulse, he could modify the computation of the offset at A. To delay the synchronization pulse, an attacker can simply jam the initial pulse, store in its memory and replay it at some arbitrary time in the future as shown in Figure 3. This attack cannot be prevented by the use of conventional cryptographic primitives. From now onwards, we refer to this attack as the pulse-delay attack. Here, we assume that the attacker can jam the communication between two nodes by transmitting signals which will disrupt packet reception at the receiver. By jamming, we consider disruptive jamming that cannot be detected at the receiver. Currently available sensor network platforms use 433MHz Chipcon1000,.4 GHz IEEE compliant (Direct Sequence (DSSS)) or Bluetooth (Frequency Hopping (FHSS)). Even if DSSS and FHSS resist various types of jamming well, because of their low transmitting RF power (1mW), these sensor platforms are vulnerable to broadband jamming (BBN). Recently, Xu et al. [10] showed that jamming attacks are indeed feasible against Mica motes, and that detecting these attacks requires significant resources. The attacker can perform a similar pulse-delay attack on the acknowledgement packet to modify T Pulse-Delay Attack Figure shows the idea behind pulse-delay attack. We have already shown that we use two equations to derive the end-to-end delay and the clock offset between the sender and the receiver. These are: T= T1+δ+d and T4 = T3-δ+d. If an attacker performs 98
3 a pulse-delay attack (e.g., on the initial sync packet), the equations will change to: T* = T1+δ+d and T4 = T3-δ+d, where T* = T+Δ. Here Δ is the pulse-delay introduced by the attacker. The clock offset and the end-to-end delay then become: ( T T1) ( T 4 T3) + Δ ( T T1) + ( T 4 T3) + Δ δ = ; d = K() This shows that the attacker can, by varying the pulse-delay, Δ, arbitrarily change the computed clock offset. An important observation is that in the process of carrying out a pulse-delay attack, the attacker also changes the computed end-to-end delay. In equation () both offset, δ, and the end-to-end delay, d, are higher by Δ/ than equation (1). Note that the attacker has no control over the calculation of the end-to-end delay. As we will show in later sections, we exploit this observation to develop a protocol for detecting pulse-delay attacks. A Send at T1 Snoop Jam the signal T * = T 1 + d + δ + Δ Replay it later Figure. Pulse-delay attack B Recv at T* PULSE DELAY FACTOR 3. SECURE TIME SYNCHRONIZATION In this section, we integrate security mechanisms into the basic approach of sender-receiver synchronization to make it resilient to adversarial attacks from external attackers. 3.1 Secure Pairwise Synchronization (SPS) We propose the following protocol: Secure Pairwise Synchronization (SPS) 1. A (T1) (T) B : A, B, N A, sync. B (T3) (T4) A : B,A,N A,T,T3,ack, MAC{K AB }[B,A,N A,T,T3,ack] 3. A calculates end-to-end delay d={(t-t1)+(t4-t3)}/ If d d* then δ={(t-t1)-(t4-t3)}/, else abort In this protocol, message integrity and authenticity are ensured through the use of Message Authentication Codes (MAC) and a key K AB shared between A and B. This prevents external attackers from successfully modifying any values in the synchronization pulse or in the acknowledgement packet. Furthermore, the attacker cannot assume an identity of node B as it does not hold the secret key K AB. An attacker can hear the packet over the wireless channel and can use the MAC in the future to generate authenticated packets. Using a random nonce, N A, during the handshake safeguards the protocol against such replay attacks. Potentially more harmful attacks are pulse-delay attacks. In our protocol, these attacks are detected through a comparison of the computed message end-to-end delay, d, with the maximal expected message delay d*. Note that the calculation of the endto-end delay, d, comes as an auxiliary benefit of the protocol. We have added no extra overhead on the functionality of senderreceiver synchronization. If the computed delay is greater than the maximal expected delay, we abort the offset calculation. 3. Performance Evaluation Clearly, how much the attacker can influence the synchronization relies on our estimate of the maximal delay d* and in order to make a judicious choice let us first analyze the end-to-end delay, d, in the absence of any external attackers. The three significant contributors to the end-to-end delay are: 1. Waiting time at the medium access control (mac ) layer to access the channel: This delay is variable in nature and can range from a few microseconds to a few minutes.. Time taken in transmitting the packet bit-by-bit at the radio of the sender node: This time will be in hundreds of microseconds and is deterministic in nature. It depends on the packet size and the radio speed. 3. Propagation time over the wireless link between the sender and receiver node: This is only a few nanoseconds. Time stamping the packets below the mac layer is feasible on typical sensor networking platforms [3], which removes the most significant variable factor, mac access waiting time. The only other variable component is the propagation time over the wireless link. The transmission delay only depends on the size of the packet which can be fixed. Note that although the relevant contents in the sync and ack packets are of different lengths, we add some redundant bits to each packet to ensure that they are of the same length. This ensures that the transmission delay is symmetric for the two packet exchanges. Since the transmission delay is many orders of magnitude larger than the end-to-end delay, a stable value of the end-to-end delay can be calculated Measurement on Mica Motes Timing-sync protocol for sensor networks (TPSN), proposed in [3], is one of the most popular approaches for time synchronization in sensor networks that is based on senderreceiver synchronization. This protocol uses mac layer time stamping to achieve an accuracy of around 10μs for mica motes. We needed to incorporate the cryptographic functionality in this protocol. Specifically, as the packets are time stamped below the mac layer, we needed a cryptographic library that can calculate the Message Authentication Code (MAC) on-the-fly as the packets are being transmitted. TinySec [19], a symmetric cryptographic library on motes, enables this MAC calculation. Essentially, our prototype implementation of SPS integrates the time stamping library provided by TPSN with TinySec and performs a thresholding on the computed delay at the end of the two-way packet exchange. We ran this prototype implementation of SPS on 5 different pair of motes. For every pair we ran multiple independent runs to calculate the value of the computed delay (d in equation (1)) from the protocol. In all, we computed the delay for 1000 independent runs. The first plot in Figure 3 shows the actual delay measured in every run and the second plot shows the corresponding histogram of the measured delay. Table 1 summarizes the statistics. We use lowercase for Medium Access Control (mac) and uppercase for Message Authentication Codes (MAC). 99
4 Delay (in microseconds) Probability Iteration Delay (in microseconds) Figure 3. End-to-end delay over a single link Table 1: Statistics of end-to-end delay over a link Maximum (μs) Minimum (μs) Average (μs) (d avg ) Standard deviation (σ) The histogram of the computed delay closely resembles a Gaussian distribution. This is consistent with the results reported by authors in [], [3]. Since the end-to-end delay follows a Gaussian distribution, d N(d avg, σ), with a 99.97% confidence the delay will fall in the interval [d avg - 3σ, d avg + 3σ]. Hence, the maximal delay should be set to d avg + 3σ, i.e., d * = d avg + 3σ = *.8 771μs. 3.. Minimum Synchronization Precision If the end-to-end delay was a constant, we should have been able to synchronize the nodes perfectly (zero error). The delay variation introduces synchronization error. Intuitively, the minimum synchronization precision (maximum error) will occur when the end-to-end delay variations in the two directions (from A to B and from B to A) are maximal, i.e., in one direction d is equal to d avg - 3σ and in the other direction d is equal to d avg + 3σ. Using equations (1) and (), the synchronization error for this worst-case scenario will be 3σ (around 10μs) Maximum Attacker Impact We define the maximum attacker impact to be the maximum difference between the clocks of two nodes that the attacker can cause without getting detected. The worst case will occur when the actual end-to-end delay is equal to the minimum, d avg - 3σ. In this scenario, the attacker can introduce a maximum pulse-delay factor of 1σ (Δ=1σ). Node A will calculate the end-to-end delay, d, as: d = dactual + Δ / = davg 3σ + (1σ / ) = davg + 3σ = d * K(3) As the computed end-to-end delay is equal to the maximal delay, the thresholding verification will pass. Using equation (), the calculated offset will be off by Δ/. Thus, the maximum attacker impact is 6σ (around 0μs) Discussion In the absence of any malicious behavior, SPS is able to achieve the same accuracy as TPSN. The extra computation overhead of MAC calculation does not impact the accuracy of time synchronization as we are able to do on-the-fly MAC calculation. This parallelism will not be feasible on emerging new compliant platforms such as Micaz, Telos [0] etc., where the radio speeds are higher than Mica motes by an order of magnitude. However, standards also mandate the implementation of the cryptographic library (equivalent of TinySec) in hardware. Specifically, AES is available in hardware providing a faster interface. Furthermore, compliant radios expose a packet interface to the application layer unlike the byte interface exposed by the chipcon radios in Mica platforms. These different set of attributes opens up an interesting design challenge. The implementation of SPS for this new class of platforms forms the part of our future work. 4. MULTIHOP SYNCHRONIZATION So far, we have assumed that the two nodes that need to synchronize are in each-other s power range and thus can directly communicate. In this section, we propose and analyze three protocols for secure sender-receiver synchronization over multiple hops: opportunistic, direct and transitive. We assume that two sensors can obtain sets of communication paths between them, either through a priori knowledge of network topology, through topology discovery [11], or through routing information [1]. We present the protocols through a representative example: A C D B. In this example, node A wants to synchronize to node B which is not in its direct communication range. In fact the shortest path between these two nodes comprises of three hops, going through nodes C and D. 4.1 Secure Opportunistic Multi-hop (SOM) The SOM protocol is executed as follows: Secure Opportunistic Multi-hop Synchronization (SOM) 1. A (T1) C D (T) B : A, B, N A, sync. B (T3) D C (T4) A : B,A,N A,T,T3,ack, MAC{K AB }[B,A,N A,T,T3,ack] 3. A calculates end-to-end delay d={(t-t1)+(t4-t3)}/ If d d M * then δ={(t-t1)-(t4-t3)}/, else abort This protocol is essentially the same as the protocol used for onehop synchronization, with a difference that in this protocol we assume that there are several forwarding nodes between the sender and the receiver. Note that this protocol assumes that there exist a secret key between A and B, K AB, which are multiple hops apart. The expected end-to-end delay d, computed at A will be much longer in this protocol than in the one-hop case. We take this into account by estimating a maximum expected (and allowed) end-toend delay by a larger value d M *>>d*. Like in the one-hop time synchronization protocol, the variance of d M * will determine how fine-grained synchronization is and will upper-bound attacker s possible impact on the synchronization precision. The end-to-end delay in SOM is equal to the cumulative sum of the transmission delays between each pair of nodes on the path and the mac access delays of the forwarding nodes. Here, the processing delays at nodes can be neglected, as they are two to three orders of magnitude smaller than transmission and mac access delays. Although the transmission delays can be accurately predicted from radio speed, mac access times can be very unpredictable and can range from microseconds to a few minutes depending on the condition of the channel. Furthermore, channel 100
5 access times also depend on the intensity of the communication between the nodes in the network, which is application-specific Performance Evaluation We performed an empirical study to find out the delay variations over multiple hops in a typical sensor network. The results were obtained in simulations using the Avrora simulator [13]. Avrora provides a cycle-accurate simulation of the AVR microcontroller, allowing real programs to be run with precise timing. We use the same TinyOS code network stack, time stamping, etc. as in the previous section to obtain these results. Table summarizes the results for varying number of hops between the sender and receiver. The statistics were obtained from 1000 independent runs. Table : Statistics of the end-to-end delay over multiple hops Hop distance Maximum (μs) Minimu m (μs) Average (μs) (d avg ) M Standard deviation (μs) (σ M ) It can be observed from Table 1 and that the average delay and the standard deviation for the multi-hop case are significantly higher, by three orders of magnitude, than the corresponding numbers over a link (single hop). We observed that the end-to-end delay over multiple hops also follows a Gaussian distribution. Given this, the same analysis can be worked out for SOM as in SPS. The maximal delay should be set to d M * = (d avg ) M + 3σ M. The minimum synchronization precision and the maximum attacker impact will be given by 3σ M and 6σ M respectively. Figure 4 plots these two quantities for varying number of hops. Note that the values are significantly higher, by three orders of magnitude, than the SPS protocol. Time (in microseconds) 5.5 x Minimum Synchronization Precision Maximum Attacker Impact Number of hops Figure 4. Secure Opportunistic Multi-hop Synchronization We would like to point out that the values of (d avg ) M and σ M, as shown in Table, will change with changes in the network topology and the underlying communication traffic. The objective of this empirical study is to give representative numbers so that a meaningful relative comparison can be made with the other protocols. Even if SOM protocol provides very low synchronization accuracy, it can provide protection against external as well as internal attackers. This is because the intermediate nodes in SOM do not perform any processing on the packet. They simply receive the packet and forward it to the next hop node. Thereby, even if node D has been compromised and the attacker tries to modify the value of T, T3 at node D, it will result in a MAC verification failure at node A. In the following sections, we propose two protocols Secure Direct Multi-hop Synchronization (SDM) and Secure Transitive Multi-hop Synchronization (STM) that provide much better accuracy than SOM. However, both of them assume that intermediate nodes (C and D in the example) are trustworthy and hence, the protocols are not resilient to attacks from compromised nodes. 4. Secure Direct Multi-hop (SDM) The SDM protocol is executed as follows: Secure Direct Multi-hop Synchronisation (SDM) 1. A (T1) (T)C(T3) (T4)D(T5) (T6) B : A,B,N A,sync. B : m1={b,a,t6,t7,ack} : M 1 = MAC{K BD }[B, D, N A, m1] B (T7) (T8) D: B, D, N A, m1, M 1 3. D : m={b,d,a,t4,t9,(t6-t5),(t8-t7),ack} : M = MAC{K DC }[D, C, N A, m] D (T9) (T10) C: D, C, N A, m, M 4. C : m3={b,d,c,a,t,t11,(t4-t3),(t10-t9),(t6-t5),(t8- T7),ack} : M 3 = MAC{K CA }[C, A, N A, m3] C (T11) (T1) A: C, A, N A, m3, M 3 5. A : calculate {( T T1) + ( T 4 T 3) + ( T 6 T 5)} + {( T1 T11) + ( T10 T 9) + ( T 8 T 7)} d = if d < d T * then δ = {( T T1) + ( T 4 T 3) + ( T 6 T 5)} {( T1 T11) + ( T10 T 9) + ( T 8 T 7)} else abort Unlike SOM, both SDM and STM (proposed in the next section) require only neighboring nodes (A and C, C and D, D and B) to share pairwise secret keys. There is no need for A and B to share a secret key between them. To analyze this protocol, we first observe the communication between a pair of nodes, A and C, over the course of the protocol. A (T1) (T)C ; C (T11) (T1)A These four timestamps are interrelated as follows: T = T1 + δ AC + d AC ; T1 = T11 δ AC + d AC K(4) Note that we have added subscripts to both the offset and the endto-end delay for clarity. Similarly, if you observe the communication between the other two node-pairs, (C, D) and (D, B), the following relationships can be derived: T 4 = T3 + δ + d ; T10 = T9 δ + d K(5) CD CD T 6 = T5 + δ DB + d DB ; T8 = T 7 δ DB + d DB K(6) Adding the left hand and right hand side of equations (5) and (6), and introducing two new terms, δ AB and d AB, we can get the following two equations: CD CD 101
6 ( T T1) + ( T 4 T3) + ( T 6 T5) = δ + K(7) AB d AB ( T 1 T11) + ( T10 T9) + ( T8 T 7) = δ AB + d AB K(8) Here, δ AB = δ AC + δ CD + δ DB and d AB = d AC + d CD + d DB. The clock offset and the end-to-end delay can be calculated from equations (7) and (8) Performance Evaluation Just like SOM, the thresholding technique in SDM also requires the estimation of a new maximal delay d T *. However, an important and crucial difference is that the end-to-end delay in SDM is not corrupted by the mac access delays; all the time stamps from T1 to T1 are below the mac layer. In fact, the endto-end delay can be easily estimated knowing the number of hops. In the above example the end-to-end delay is equal to the cumulative sum of d AC, d CD and d DB. All these three delays, d AC, d CD and d DB, are equal to the end-to-end delay over a single link and hence, all of them follow the same Gaussian distribution calculated in Section 3..1, i.e., d AC = d CD = d DB N(d avg, σ). As a result, the end-to-end delay for SDM becomes a cumulative sum of independent Gaussian variables, i.e., d AB N(nd avg, σ n), where n is the number of hops. Given this, the maximal delay for an n hop network should be set to d T * = nd avg + 3σ n. The minimum synchronization precision and the maximum attacker impact will be given by 3σ n and 6σ n respectively. Note that σ is three orders of magnitude lower than σ M for any value of n and hence, the minimum synchronization precision as well as the maximum attacker impact in SDM is much lower, around three orders of magnitude, than SOM. However, the packet size of ack packets in SDM is larger than SOM resulting in an increased overhead. Every ack packet in SDM has to carry the state information (timestamps) about all the previous packets with it. For example, the acknowledgment packet from C to A contains 6 timestamps. In SOM, every acknowledgement packet has to just contain timestamps, the same as SPS. 4.3 Secure Transitive Multi-hop (STM) The STM protocol is executed as follows: Secure Transitive Multihop Synchronization (STM) 1. A C D B : A, B, N A, sync. B : m1={b, D, notify} : M 1 = MAC{K BD }[B, D, N A, m1] B D: B, D, N A, m1, M 1 3. D sync to B (SPS) D : m={b, D, C, notify} : M = MAC{K BD }[D, C, N A, m] D C: D, C, N A, m, M 4. C sync to D (SPS) C : m3={b, D, C, A, notify} : M 3 = MAC{K BD }[C, A, N A m3] C A: C, A, N A, m3, M 3 5. A sync to C (SPS) Secure transitive synchronization scheme is essentially performed as SPS synchronization along all the links in the path from the source to the destination. The proper scheduling of node synchronizations is achieved in this protocol through an explicit notification by the receiver node to its upstream neighbor (sender node). Authentication is achieved by attaching a MAC at the end of this notification packet Performance Evaluation Unlike SOM or SDM, STM does not require the estimation of any new maximal delay parameter. It runs the SPS protocol on every link and hence, the threshold verification gets divided into stages. Every link is evaluated separately using the same maximal delay, d *, as in Section This local verification has both advantages and disadvantages. Imagine an external attacker which can carry out pulse-delay attacks on the link joining C and D). In both SOM and SDM, the thresholding verification is done only when the acknowledgement reaches back to node A. Thus, the system will detect the malicious attack only after running the complete protocol, which in our example pertains to transmission and reception of two packets per node. In STM, only nodes C and D will need to resynchronize when the thresholding verification at node C will fail. In fact, other nodes A and B won t even come to know about this malicious attack. Thereby, the overhead of countering a malicious attack in STM is lower than both SOM and SDM. However, local verification gives extra freedom to the external attacker. It can introduce multiple pulse-delay attacks on every link simultaneously, thereby; the cumulative sum result of these attacks can be huge. Note that the pulse-delay factor introduced at every link can be at most 1σ as we run SPS on every link (refer Section 3..1). Thereby, the maximum attacker impact for an n hop network on STM can be 6σn, which is higher than the corresponding number for SDM, 6σ n. We note that both STM and SDM will achieve the same minimum synchronization precision, 3σ n. Also, STM requires one extra packet transfer per node - the notification packet. In the absence of any malicious behavior, SOM and SDM require a total of n packet transmissions for synchronizing two nodes that are n hops away. STM requires 3n packet transmissions. 5. GROUP SYNCHRONIZATION Several sensor network applications require all the nodes in a group to be time synchronized with each other. A few notable ones are (1) Object tracking: The size, shape, direction, location, velocity, or acceleration of objects is determined by fusing proximity detections, done at the same time, from sensors at different locations, () Consistent state updates: The current state of an object is most accurately determined by the node that has seen the object most recently. This requires all the nodes in the cluster to have the same notion of time, (3) Distributed beamforming: Beam-forming arrays can perform spatial filtering, receiving only signals arriving from a certain direction. This depends on the relative time offsets of the array s sensors, (4) Duplicate detection: The time of an event helps nodes in the cluster determine if they are seeing two distinct real-world events, or a single event seen from two vantage points. If they are indeed seeing the same event, they can further fuse their observations to get much meaningful information about the event. All these applications will function accurately only if the synchronization error between nodes in a group is bounded. In the following sections, we propose two group synchronization protocols Lightweight Secure Group Synchronization (L-SGS) 10
7 and Secure Group Synchronization (SGS). These protocols differ in their resilience to attacks and in the number of messages that the group nodes mutually exchange. Just like secure pairwise synchronization protocols, both L-SGS and SGS can detect the pulse-delay and packet modification attacks from external attackers. In addition, SGS can also detect the false timing reports by internal attackers but at the cost of a higher communication overhead. 5.1 System Model In this model, we assume that group membership is known to all group nodes and that group members can authenticate each other using pairwise secret keys. We further assume that all group nodes reside in each other s power ranges; we do show that the proposed solutions can be easily extended to groups in which nodes are multiple hops apart. Given this assumption, we propose L-SGS and SGS exploiting the broadcast property of the wireless communication medium. Thereby, a message broadcast by a node in the group can be received by all the nodes in the cluster (here we assume that sensors have omnidirectional antennas). We represent the sending time of the packet at node i by T i. T ij represents the time at which the packet broadcast by node i is received at j. Notice that, these times are measured by two different clocks. T i is measured in the local clock of node i (C i ) whereas T ij is measured by the local clock of node j (C j ). We represent the offset (or the difference between the local clocks) between the two nodes by δ ij. The delay for the packet transfer from i to j is represented by d ij. Although this delay is the same for every pair of nodes, we add the subscripts for clarity. 5. Lightweight Secure Group Synchronization (L-SGS) L-SGS is executed as follows: Lightweight Secure Group Synchronization (L-SGS) 1. G 1 * : G 1, sync. G i (T i ) (T i1 )G 1 : G i, N i 3. G 1 (T 1 ) : m = {T i1,n i, G i } i=,...,n : M = {MAC{K 1i }[G 1, T 1,ack, T i1,n i,g i ]} i=,...,n G 1 (T 1 ) (T 1i )*: G 1, T 1, ack, m, M 4. G i : compute d=((t i1 - T i )+(T 1i - T 1 ))/ If d d* then δ=((t i1 - T i )-(T 1i - T 1 ))/, else abort In this protocol, one of the group members (G 1 ) initiates the time synchronization (step 1) to which the rest of the group members reply with messages containing their ids and challenge nonces (step ). In step 3 of the protocol, G 1 replies with a single broadcast message to all other group nodes, containing MACs of the challenges and node ids. Note that the last protocol message (step 3) contains N-1 triples {T i1, N i, G i }, one for each G i, containing the receipt time of the challenge packet from G i (T i1 ), the nonce of G i and the node-id of G i respectively. It also contains N-1 MACs, one for each (G 1, G i ) pair, which enable each node G i to authenticate the packet broadcast by G 1. In the last protocol step G,...,G N synchronize to G 1. Note that this protocol does not need to be preceded by any explicit leader election algorithm. The initiating node G 1 does not need to be elected by other group members, but it can simply be the node that first broadcasts the sync packet after sensing a particular event. Therefore, L-SGS does not require any explicit scheduling in the group Performance Evaluation We can observe L-SGS as an extension of the SPS protocol. In SPS, a single receiver synchronizes to a single sender; in L-SGS, multiple receivers synchronize to a single sender. L-SGS makes use of the broadcast property of the wireless channel. The total number of messages transmitted in an n-node cluster over the course of L-SGS is n+1. We note, however, that the last protocol message is significantly larger than other messages. As L-SGS relies on the same primitives as SPS, the resistance of L-SGS to external attacks is the same as with SPS, which means that L-SGS is resilient to pulse-delay and message modification attacks. The minimum synchronization precision and the maximum attacker impact of L-SGS is the same as SPS, equal to 10μs (3σ) and 0μs (6σ) respectively. However, L-SGS is not resilient to internal attacks. If node G 1 is malicious, it can produce a set of messages containing false times T 1 and T i1 for each node i and therefore have these nodes mutually desynchronized, while these nodes would believe to be synchronized. 5.. Implementation Step 3 of L-SGS requires G 1 to calculate N-1 MACs on-the-fly. Clearly, this won t be feasible for large values of N. Given this, we briefly mention some of the alternative design options that we plan to explore in detail in the future. First, the broadcast message in Step 3 can be replaced by multiple unicast messages, one to every node in the cluster. This unicast message to node j will contain the MAC generated using the secret key shared between nodes G 1 and j. This will incur a significant communication overhead on G 1. Second, we can use public key signatures [14], which would make sure that a single signature (MAC) by node G 1 can be verified by all group nodes. This is assuming that all the nodes are aware of the public key of G 1, This will; however, incur a significant computational cost at G 1. Instead we can first establish a symmetric group key shared by all the nodes in the cluster. Node G 1 can then attach a single MAC in the ack packet, which is generated using this symmetric group key. This looks the most promising solution as the cost of establishing the symmetric group key can be amortized over multiple time synchronization events. 5.3 Secure Group Synchronization (SGS) In this section, we propose a secure group synchronization protocol that also provides resiliency to internal adversaries; however, as we show, this protocol requires higher communication overhead than L-SGS. We start the section by proposing a simple consistency check that is the basic building block of the protocol Triangle Consistency Consider a set of 3 nodes, [i, j, k], that have successfully established pairwise offsets with each other. Imagine a triangle connecting these three nodes such that the link weight on every edge is equal to the offset between them. We refer to the traversal of such a triangle starting and ending at the same node as making a cycle. As we traverse in a cycle, we keep on accumulating the link weight. For example, a valid cycle starting from node i will be [i->j, j->k, k->i]. The final accumulated weight at the end of the 103
8 cycle will be δ ij + δ jk + δ ki. It can be easily observed that this should be equal to 0. Corollary: If the result of any cycle is not 0, there exists an internal adversary in the set. We note that the result of a cycle might not be exactly zero because of the drift and skew error. In practice, we will use a simple threshold based policy to account for this Protocol SGS is executed as follows: Secure Group Synchronisation (SGS) 1. G i (T i ) (T ij )* : G i,n i, sync; (i=1,...,n),j i. G i (T i ) : m={t ji, N j, G j } j=1,...,n;j i : M={MAC{K ij }[G i,t i,ack,t ji,n j, G j ]} j=1,...,n;j i G i (T i ) (T ij )* : G i,t i, ack, m, M; (i=1,...,n),j i 3. G i : compute {d ij =((T ij - T i )+(T ji T j ))/} j=1,...,n;j i If all d ij d* then O i ={δ ij =((T ij - T i )-(T ji T j ))/} j=1,...,n;j i else abort 4. G i : M={MAC{K ij }[ G i,o i ]} j=1,...,n;j i G i * : G i,o i, M; (i=1,...,n),j i 5. G i : check triangle consistencies : if all triangles are consistent, synchronize to the fastest clock In this protocol, every group member (G i ) broadcasts a packet containing their ids and challenge nonces (step 1). In step of the protocol, every member (G i ) broadcasts another packet containing the response to the challenges issued by all the other nodes in the first step. This packet contains N-1 triples {T ji, N j, G j }, one for each G j, containing the receipt time of the challenge packet from G j (T ji ), the nonce of G j and the node-id of G j respectively. It also contains N-1 MACs, one for each (G i, G j ) pair, which enables each receiver node G j to authenticate the packet broadcasted by G i in the second step. Note that the sending node G i also includes the sending time (T i ) in the response packet. The first two steps are reminiscent of sender-receiver synchronization; we are now establishing pairwise relationships between multiple senders and multiple receivers simultaneously using the broadcast property of the wireless communication medium. In the next step, each node G i performs threshold verification on all the computed delays, d ij, corresponding to the challenge-response with node G j. This provides the resiliency to pulse-delay modifications from external attackers. If this step is successful, G i will be able to construct a set O i, containing clock offsets with other nodes in the group. Step 4 and 5 provide the resiliency to SGS against internal attackers. As mentioned earlier, a simple triangle consistency check can be used to detect an internal attacker in a set of three nodes. Imagine a set of 3 nodes [G i, G j, G k ]. After step 3, G i has the offsets with both G j and G k but it does not know the offset between G j and G k to perform the triangle consistency check. Step 4 of the protocol provides G i with this information. In this step every node G i broadcasts its offset set, O i. This packet also contains N-1 MACs, one corresponding to every other node in the group, so that the contents of the packet can be authenticated at every receiver node. Following this, each node performs multiple triangle consistency checks. If this step is successful, G i increments its clock by the largest offset, max{0,max{o i }}. As a result, G i (and all the other nodes in the group) will get implicitly synchronized to the fastest clock in the group Performance Evaluation The number of messages transmitted in an n-node cluster over the course of SGS is 3n. SGS can also be viewed as an extension of the SPS protocol, whereby multiple nodes establish the pairwise clock relationships simultaneously. We note that the ack packet size in SGS (step ) is significantly larger than other messages. Moreover, the computation of N-1 on-the-fly MACs opens up the same design challenges as in L-SGS (refer Section 5..). As SGS is based on the same primitives as SPS, the minimum synchronization precision and the maximum attacker impact of SGS is the same as L-SGS and SPS, equal to 10μs (3σ) and 0μs (6σ) respectively. Just like L-SGS and SPS, it can counter external pulse-delay and message modification attacks. However, in addition SGS is resilient to internal attackers Resiliency to Internal Adversaries In SGS, there is no fixed node to which the nodes in the group will synchronize. Synchronization is implicitly done to the fastest clock in the cluster. The identity of the node with the fastest clock does not get revealed till the end of the protocol. This removes the vulnerability of the protocol to a single point of failure such as G 1 in L-SGS. Furthermore, if an internal attacker tries to create inconsistencies in the running of the protocol, the triangle consistency check will fail and the process will be aborted. Let us illustrate this by an example. Consider nodes 1-7 lying in the neighborhood of each other. Without any loss of generality, let us assume that node 1 is malicious and node 7 has the fastest clock. Node 1 can easily project itself as the fastest clock by creating a fictitious clock. At the end of the protocol, all the nodes will be synchronized to node 1 rather than node 7. Note that this is not a valid attack. Although all the nodes are synchronized to some fictitious clock, they are consistently wrong. The relative error between them is still bounded. Having realized this, the aim of node 1 will be to introduce inconsistencies in the system by portraying itself as the fastest clock to only a few subsets of nodes. Node 1 has full control over the values of the receipt times, T j1 for j= {, 3,.., 7}, that it reports in the response packet (step ). It can report arbitrary values creating inconsistent offset values at different nodes. We note that the thresholding verification in step 3 will provide some resiliency against arbitrary values reported by node 1 but it alone cannot guarantee safeguard against all possible malicious attacks. For example, imagine the scenario where node 1 just targets node. It reports a faulty value of the sending time T 1 from the fictitious clock. It also reports the value of T 1 from the same fictitious clock but reports an arbitrary value of receipt times for rest of the nodes, T j1 for j= {3,.., 7}. As a result, the thresholding mechanism on d j1 will fail at nodes j={3,.., 7} and hence, they will abort SGS. The thresholding mechanism will pass at node and it will update its clock so that it synchronizes to the fictitious clock by node 1. Thereby, in absence of steps 4 and 5, node will be out of sync with rest of the nodes in the group. In SGS, when nodes exchange their offset sets, nodes 3-7 will not have valid pairwise offsets with node 1. As a result, the triangle consistency check will fail at node. Thereby, node will also detect the 104
9 presence of malicious behavior in the system and will also abort SGS Extension to Multiple Hops SGS is extendible to the scenario when group nodes are multiple hops away from each other. In this case, the steps 1 to 3 of the protocol will have to be changed. Currently we use the broadcast property of the wireless communication medium to establish pairwise offsets between the nodes in the group. If group nodes are multiple hops away, we would have to use any of the three protocols proposed in Section 3.3 for establishing these pairwise offsets. Steps 4 and 5 of the protocol will remain unchanged. 6. NETWORK SYNCHRONIZATION Network-wide synchronization is achieved in two stages (1) Hierarchical tree is established in the network with a reference node as the root, () Pairwise synchronization is performed along the edges of this tree using SPS. Every node synchronizes its clock to its parent in the tree. As a result, eventually all nodes in the network get synchronized to the reference node, which is the root of the hierarchical tree. Using SPS to perform pairwise synchronization provides resiliency against external attackers. However, the more challenging problem is to achieve secure network-wide synchronization when a few nodes in the network have been compromised. In this scenario, a compromised node can mislead all the nodes in its sub-tree to a different notion of time than the rest of the network. In general, the problem of network-wide synchronization can be viewed as a composition of several multi-hop synchronizations between the reference node and rest of the nodes in the network. However the solutions for secure multi-hop synchronization rely on the assumption that all the intermediate nodes are trustworthy. Clearly, even one compromised node in the path can bring detrimental effects to the functionality of SDM or STM. A possible solution for countering compromised nodes is to use redundancy by using disjoint multiple paths to synchronize nodes. The protocols can be modified to be resistant to as many internal attackers as independent routes can be found. This will require that pair wise keys are established between all nodes in the network, or that some broadcast authentication mechanisms are in place, (e.g., Tesla[15]). To get an idea of how protocols can resist to internal attackers through independent routes, we refer the reader to a rich literature on security of routing protocols in multihop wireless networks [16], [17], [18]. We note that on a networklevel this means that the reference node needs to maintain multiple trees simultaneously. 7. CONCLUSIONS Existing solutions for time synchronization in sensor networks are not resilient to malicious behavior from external attackers or internally compromised nodes. We showcase the feasibility of a pulse-delay attack, whereby an attacker can introduce arbitrarily long delays in the packet propagation time directly affecting the achieved synchronization precision. We then propose a suite of protocols for secure pairwise and group synchronization of nodes that lie in each other s power ranges and of nodes that are separated by multiple hops. Table 3 summarizes the key aspects of these protocols. These protocols offer different points of operation in the energy-accuracy subspace and the choice of the specific protocol should be made by the network designer depending on his application needs. We believe that we have just scratched the surface in the solution space of secure time synchronization for sensor networks. Our future work includes investigation of secure network-wide synchronization schemes in the presence of multiple compromised nodes. In parallel, we are also developing better remedial actions against the malicious attacks than a simple abort of the protocol. 8. ACKNOWLEDGMENTS This material is based on research supported in part by the Center for Embedded Networked Sensing (CENS), a NSF Science & Technology Centre, and by the Office of Naval Research (ONR) under the AINS Program. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the CENS or the ONR. Secure Synchronization Table 3: Summary of Secure Time Synchronization Protocols Neighboring nodes Multihop synchronization over n hops (Representative numbers for n=5) Group synchronization of n nodes in a cluster Protocols SPS SOM SDM STM L-SGS SGS Minimum Synchronization Precision 3σ ( 10μs) 3σ M ( 5ms) 3σ n ( 5μs) 3σ n ( 5μs) 3σ ( 10μs) 3σ ( 10μs) Maximum external attacker impact 6σ ( 0μs) 6σ M ( 50ms) 6σ n ( 50μs) 6σn ( 10μs) 6σ ( 0μs) 6σ ( 0μs) Resiliency to internal attackers - Yes No No No Yes Total number of transmitted messages n n 3n n+1 3n Ack Packet size 3 - Same Large Same Large Large 3 Comparison with respect to the packet size in SPS. 105
10 9. REFERENCES [1] Sundararaman, B., Buy, U., Kshemkalyani, D.. Clock synchronization for wireless sensor networks: A Survey. Ad-hoc Networks, 3(3): 81-33, May 005. [] Elson, J., Girod, L., Estrin D.. Fine-grained network time synchronization using reference broadcasts. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA, December 00. [3] Ganeriwal, S., Kumar, R., Srivastava, M. B.. Timing-sync protocol for sensor networks. In Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, November 003. [4] Maroti, M., Kusy, B., Simon, G., Ledeczi, A.. The flooding time synchronization protocol. In Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys), November 004. [5] Greumen. J. V., Rabaey, J.. Lightweight time synchronization for sensor networks. In Proceedings of the Second ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), San Diego, CA, 003. [6] Sichitiu, M. L., Veerarittiphan, C.. Simple, accurate time synchronization for wireless sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), 003. [7] Zhu, S., Setia, S., Jajodia, S.. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the Tenth ACM Conference on Compute and Communications Security (CCS), Washington, D. C., October 003. [8] Eschenauer, L., Gligor, V. D.. A key-management scheme for distributed sensor networks. In Proceedings of the Ninth ACM Conference on Compute and Communications Security (CCS), Washington, D. C., October 00. [9] Chan, H., Song, D., Perrig, A.. Random key predistribution scheme for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy, 003. [10] Xu, W., Trappe, W., Zhang, Y.. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the Sixth ACM International Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc), 005. [11] Deb, B., Bhatnagar, S., Nath, B.. A topology discovery algorithm for sensor networks with applications to network management. In Proceedings of the IEEE CAS Workshop, September 00. [1] Deng, J., Han, R., Misra, S.. The performance evaluation of intusion-tolerant routing in wireless sensor networks. In Proceedings of Information Processing in Sensor Networks (IPSN), April 003. [13] Titzer, B., Lee, D., Palsberg, J.. Avrora: Scalable sensor network simulation with precise timing. In Proceedings of the IPSN Track on Sensor Platform, Tools and Design Methods for Networked Embedded Systems (SPOTS), Los Angeles, CA, April 005. [14] Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.. TinyPK: Securing sensor networks with public key technology. In Proceedings of the ACM Workshop on Security in Ad-hoc and Sensor Networks (SASN), Washington, D. C., October 005. [15] Perrig, A., Canetti, R., Song, D., Tygar, D. The TESLA broadcast authentication protocol. In RSA Cryptobytes, Summer 00. [16] Yaar, A., Perrig, A., Song, D.. Pi: A path identification mechanism to defend against DDoS attacks. In Proceedings of the IEEE Symposium on Security and Privacy, 003. [17] Chun, Y., Perrig, A., Johnson, D.. Ariadne: A secure ondemand routing protocol for ad hoc networks. In Proceedings of the Eighth Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCom), Atlanta, GA, September 00. [18] Papadimitratos, P., Haas, Z. J., Sirer, E.G.. Path Set Selection in Mobile Ad Hoc Networks. In Proceedings of the Third ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc), Lausanne, Switzerland, June 9-11, 00. [19] Karlof, C., Sastry, N., Wagner, D.. TinySec: A link layer security architecture for sensor networks. In Proceedings of the Second ACM Conference on Embedded networked Sensor Systems (SenSys), November 004. [0] Polastre, J., Szewczyk, R., Culler, D.. Telos: Enabling ultra-low power wireless research. In Proceedings of the Fourth International Conference on Information Processing in Sensor Networks; Special track on Platform Tools and Design Methods for Network Embedded Sensors (SPOTS), Los Angeles, CA, April
How To Create A Time Synchronization Protocol With Low Latency Data Collection
Time Synchronization for Predictable and Secure Data Collection in Wireless Sensor Networks Shujuan Chen, Adam Dunkels, Fredrik Österlind, Thiemo Voigt Swedish Institute of Computer Science {shujuan,adam,fros,thiemo}@sics.se
CSC 774 Advanced Network Security. Outline. Related Work
CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time
Synchronization in. Distributed Systems. Cooperation and Coordination in. Distributed Systems. Kinds of Synchronization.
Cooperation and Coordination in Distributed Systems Communication Mechanisms for the communication between processes Naming for searching communication partners Synchronization in Distributed Systems But...
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Security & Trust in Wireless Sensor Networks
Security & Trust in Wireless Sensor Networks Theodore Zahariadis Ultra-wide-band Sensor Node Ultra small sensor node The smallest UW sensor node in the world: 10mm 10mm 10mm On board temperature sensor
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
How To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Vikram Gupta +, Srikanth Krishnamurthy, and Michalis Faloutsos Abstract Department of Computer Science and Engineering, UC Riverside,
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
Selfish MAC Layer Misbehavior in Wireless Networks
1 Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur + and Nitin H. Vaidya This research was supported in part by UIUC Campus Research Board. This research was published in part at International
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks
J Inf Process Syst, Vol.10, No.2, pp.300~313, June 2014 http://dx.doi.org/10.3745/jips.03.0006 pissn 1976-913X eissn 2092-805X Power Consumption Analysis of Prominent Time Synchronization Protocols for
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
NEW applications of wireless multi-hop networks, such
870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
A Simulation Game for Teaching Secure Data Communications Protocols
A Simulation Game for Teaching Secure Data Communications Protocols Leonard G. C. Hamey Department of Computing, Macquarie University, Sydney, Australia ABSTRACT With the widespread commercial use of the
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction
Chapter 5 Simple Ad hoc Key Management 5.1 Introduction One of the most important consequences of the nature of the MANET networks is that one cannot assume that a node that is part of a network will be
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
Denial of Service in Sensor Networks
Denial of Service in Sensor Networks Authors : From: Anthony D. Wood John A. Stankovic University of Virginia Presented by: Luba Sakharuk Agenda for the DOS in Sensor Networks Abstract Theory and Application
UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY
EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY This document introduces some basic security concepts, including network layer security, trust centers, and application support layer security features.
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
The ABCs of Spanning Tree Protocol
The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,
Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements
Motion Sensing without Sensors: Information Harvesting from Signal Strength Measurements D. Puccinelli and M. Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana,
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2
On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Propsim enabled Mobile Ad-hoc Network Testing
www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile
A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks
A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks Ioannis Krontiris Athens Information Technology P.O.Box 68, 19.5 km Markopoulo Ave. GR- 19002, Peania, Athens, Greece
