TAILIEUCHUNG - Security for Sensor Networks

The Secretary faces a number of threats. Physical threats include poisoning from radiation, chemical or bi- ological toxins. These threats are in addition to threats from explosives and individuals utilizing small arms or other military ordinance. More insidious threats are posed by collection efforts aimed at both the substance of the Secretary’s agenda and those aimed at analyzing security controls in order to compromise them in order to harm the Secretary at some later time. Such perimeter security applications represent a vast class of “monitoring and responding” type applications for which sensor networks will be used. We believe that a solution designed to mitigate the aforementioned. | Security for Sensor Networks Jeffery Undercoffer Sasikanth Avancha Anupam Joshi and John Pinkston Department of Computer Science and Electrical Engineering University of Maryland Baltimore County Baltimore MD 21250 junder2 savanc1 joshi pinkston @ Abstract Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense. We motivate the security problems that sensor networks face by developing a scenario representative of a large application class where these networks would be used in the future. We identify threats to this application class and propose a new lightweight security protocol that operates in the base station mode of sensor communication where the security protocol is mindful of the resource constraints of sensor networks. Our application class requires mitigation against traffic analysis hence we do not use any routing mechanisms relying solely on broadcasts of end-to-end encrypted packets. Our protocol extends the broadcast range of the base station model by utilizing nodes adjacent to the base station as an intermediary hop. Additionally our protocol detects and corrects some classes of aberrant node behavior. We have simulated our protocol and present simulation results. 1 INTRODUCTION Improvements in wireless networking and micro-electro-mechanical systems MEMS are contributing to the formation of a new computing domain - distributed sensor networks. These ad-hoc networks of small fully programmable sensors will be used in a variety of applications on the battlefield as medical devices in equipment maintenance and in perimeter security systems 4 6 . These distributed sensor networks are characterized by limited power supplies low bandwidth small memory sizes and a different traffic model. The traffic model of mobile ad-hoc networks is typically many-to-many whereas the traffic model of a sensor network is more of a hierarchical model and or many to one. Generally MEMS are .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.