TAILIEUCHUNG - SPINS: Security Protocols for Sensor Networks

The BACnet protocol currently uses the connectionless User Datagram Protocol (UDP) for both Annex H and BACnet/IP communications. However, it is possible that Trans- mission Control Protocol (TCP) transport will be utilized for some service in the future, and so threats specific to TCP have been included. Even if TCP/IP is never used as part of the BACnet protocol, it still can be used to gain access to the building control system web servers, get access through the corporate firewall, and be used for denial of service attacks on the external network on which the BCS may depend. The class. | Wireless Networks 8 521-534 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. SPINS Security Protocols for Sensor Networks ADRIAN PERRIG ROBERT SZEWCZYK . TYGAR VICTOR WEN and DAVID E. CULLER Department of Electrical Engineering and Computer Sciences University of California Berkeley 387 Soda Hall Berkeley CA 94720 USA Abstract. Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful security has received little attention. We present a suite of security protocols optimized for sensor networks SPINS. SPINS has two secure building blocks SNEP and TESLA. SNEP includes data confidentiality two-party data authentication and evidence of data freshness. TESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols and show that they are practical even on minimal hardware the performance of the protocol suite easily matches the data rate of our network. Additionally we demonstrate that the suite can be used for building higher level protocols. Keywords secure communication protocols sensor networks mobile ad hoc networks MANET authentication of wireless communication secrecy and confidentiality cryptography 1. Introduction We envision a future where thousands to millions of small sensors form self-organizing wireless networks. How can we provide security for these sensor networks Security is not easy compared with conventional desktop computers severe challenges exist - these sensors will have limited processing power storage bandwidth and energy. We need to surmount these challenges because security is so important. Sensor networks will expand to fill all aspects of our lives. Here are some typical applications Emergency response information sensor networks will collect information about the status of buildings people and transportation pathways. Sensor information must be collected and passed on in .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.