tailieunhanh - SECURITY IN WIRELESS SENSOR NETWORKS – IMPROVING THE LEAP PROTOCOL

The Process Control settings allow you to enable additional Outpost security technologies such as Component Control, Hidden Process Control and Open Process Control. This protection is disabled by default, but if you consider your users experienced enough to manage the enormous number of network access request messages, you can enable it. Component Control monitors the components of each application to make sure they are not fake or malicious. You can set the desired Component Control level using the corresponding drop- down list. . | International Journal of Computer Science Engineering Survey IJCSES June 2012 Security in Wireless Sensor Networks -improving the leap Protocol Delan Alsoufi1 Khaled Elleithy1 Tariq Abuzaghleh2 and Ahmad Nassar1 department of Computer Engineering University of Bridgeport CT 06604 dalsoufi@ elleithy@ anassar@ 2Department of Electrical Engineering University of Bridgeport CT 06604 tabuzagh@ Abstract Wireless sensor networks are becoming significantly vital to many applications and they were initially used by the military for surveillance purposes. One of the biggest concerns of WSNs is that they are very defenceless to security threats. Due to the fact that these networks are susceptible to hackers it is possible for one to enter and render a network. For example such networks may be hacked into in the military using the system to attack friendly forces. Leap protocol offers many security benefits to WSNs. However with much research it became apparent that LEAP only employs one base station and always assumes that it is trustworthy. It does not consist of defence against hacked or compromised base stations. In this paper intensive research was undertaken on LEAP protocols finding out its security drawbacks and limitations. A solution has been proposed in order to overcome the security issues faced in implementing this protocol whilst employing more than one base station. The performance of the proposed solution has been evaluated and simulated to provide a better network performance. Keywords Network Protocols Wireless Sensor Network WSN LEAP protocol Security compromised nodes 1. Introduction Wireless technology has propagated the use of sensor networks in many applications. Sensor networks join small sized sensors and actuators with general purpose computing components 1 . Such networks comprise of hundreds and sometimes thousands of self-functioning low power inexpensive wireless nodes to observe .

TỪ KHÓA LIÊN QUAN