TAILIEUCHUNG - SPINS: Security Protocols for Sensor Networks

As noted earlier, network security design requires that corporations determine the level of implementation investment and the total cost of intrusion they can withstand. Then corporationsmust decide how to allocate their available network security budgets to adequately secure their networks. To ensure the most comprehensive level of protection possible, every network should include security components that address the following five aspects of network security. Identity Identity is the accurate and positive identification of network users, hosts, applications, services and resources. Identity mechanisms are important because they ensure that authorized users gain access to the enterprise computing resources they need, while unauthorized users are denied access. . | SPINS Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler J. D. Tygar Department of Electrical Engineering and Computer Sciences University of California Berkeley perrig szewczyk vwen culler tygar @ ABSTRACT As sensor networks edge closer towards wide-spread deployment security issues become a central concern. So far much research has focused on making sensor networks feasible and useful and has not concentrated on security. We present a suite of security building blocks optimized for resource-constrained environments and wireless communication. SPINS has two secure building blocks SNEP and ÍTESLA. SNEP provides the following important baseline security primitives Data confidentiality two-party data authentication and data freshness. A particularly hard problem is to provide efficient broadcast authentication which is an important mechanism for sensor networks. p TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols and show that they are practical even on minimal hardware the performance of the protocol suite easily matches the data rate of our network. Additionally we demonstrate that the suite can be used for building higher level protocols. 1. INTRODUCTION We envision a future where thousands to millions of small sensors form self-organizing wireless networks. How can we provide security for these sensor networks Security is not easy compared with conventional desktop computers severe challenges exist these sensors will have limited processing power storage bandwidth and energy. Despite the challenges security is important for these devices. As we describe below we are deploying prototype wireless net- We gratefully acknowledge funding support for this research. This research was sponsored in part the United States Postal Service contract USPS 102592-01-Z-0236 by the United States Defense Advanced Research Projects

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.