Đang chuẩn bị liên kết để tải về tài liệu:
Security for Sensor Networks
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
The Secretary faces a number of threats. Physical threats include poisoning from radiation, chemical or bi- ological toxins. These threats are in addition to threats from explosives and individuals utilizing small arms or other military ordinance. More insidious threats are posed by collection efforts aimed at both the substance of the Secretary’s agenda and those aimed at analyzing security controls in order to compromise them in order to harm the Secretary at some later time. Such perimeter security applications represent a vast class of “monitoring and responding” type applications for which sensor networks will be used. We believe that a solution designed to mitigate the aforementioned. | Security for Sensor Networks Jeffery Undercoffer Sasikanth Avancha Anupam Joshi and John Pinkston Department of Computer Science and Electrical Engineering University of Maryland Baltimore County Baltimore MD 21250 junder2 savanc1 joshi pinkston @cs.umbc.edu Abstract Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense. We motivate the security problems that sensor networks face by developing a scenario representative of a large application class where these networks would be used in the future. We identify threats to this application class and propose a new lightweight security protocol that operates in the base station mode of sensor communication where the security protocol is mindful of the resource constraints of sensor networks. Our application class requires mitigation against traffic analysis hence we do not use any routing mechanisms relying solely on broadcasts of end-to-end encrypted packets. Our protocol extends the broadcast range of the base station model by utilizing nodes adjacent to the base station as an intermediary hop. Additionally our protocol detects and corrects some classes of aberrant node behavior. We have simulated our protocol and present simulation results. 1 INTRODUCTION Improvements in wireless networking and micro-electro-mechanical systems MEMS are contributing to the formation of a new computing domain - distributed sensor networks. These ad-hoc networks of small fully programmable sensors will be used in a variety of applications on the battlefield as medical devices in equipment maintenance and in perimeter security systems 4 6 . These distributed sensor networks are characterized by limited power supplies low bandwidth small memory sizes and a different traffic model. The traffic model of mobile ad-hoc networks is typically many-to-many whereas the traffic model of a sensor network is more of a hierarchical model and or many to one. Generally MEMS are .