Đang chuẩn bị liên kết để tải về tài liệu:
SPINS: Security Protocols for Sensor Networks
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
The BACnet protocol currently uses the connectionless User Datagram Protocol (UDP) for both Annex H and BACnet/IP communications. However, it is possible that Trans- mission Control Protocol (TCP) transport will be utilized for some service in the future, and so threats specific to TCP have been included. Even if TCP/IP is never used as part of the BACnet protocol, it still can be used to gain access to the building control system web servers, get access through the corporate firewall, and be used for denial of service attacks on the external network on which the BCS may depend. The class. | Wireless Networks 8 521-534 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. SPINS Security Protocols for Sensor Networks ADRIAN PERRIG ROBERT SZEWCZYK J.D. TYGAR VICTOR WEN and DAVID E. CULLER Department of Electrical Engineering and Computer Sciences University of California Berkeley 387 Soda Hall Berkeley CA 94720 USA Abstract. Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful security has received little attention. We present a suite of security protocols optimized for sensor networks SPINS. SPINS has two secure building blocks SNEP and TESLA. SNEP includes data confidentiality two-party data authentication and evidence of data freshness. TESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols and show that they are practical even on minimal hardware the performance of the protocol suite easily matches the data rate of our network. Additionally we demonstrate that the suite can be used for building higher level protocols. Keywords secure communication protocols sensor networks mobile ad hoc networks MANET authentication of wireless communication secrecy and confidentiality cryptography 1. Introduction We envision a future where thousands to millions of small sensors form self-organizing wireless networks. How can we provide security for these sensor networks Security is not easy compared with conventional desktop computers severe challenges exist - these sensors will have limited processing power storage bandwidth and energy. We need to surmount these challenges because security is so important. Sensor networks will expand to fill all aspects of our lives. Here are some typical applications Emergency response information sensor networks will collect information about the status of buildings people and transportation pathways. Sensor information must be collected and passed on in .