首页> 外文学位 >Security of wireless sensor networks in the presence of captured nodes.
【24h】

Security of wireless sensor networks in the presence of captured nodes.

机译:存在捕获的节点时无线传感器网络的安全性。

获取原文
获取原文并翻译 | 示例

摘要

Wireless sensor networks (WSNs) pose unique security challenges due to the fact that their nodes operate in an unattended manner in potentially hostile environments. A particularly difficult problem not addressed to date is the handling of node capture by an adversary. A key goal for solving this problem is that of limiting the damage caused by captured nodes. This is important since node capture cannot be prevented: by definition, there is no practical physical mechanism that could keep an adversary from physically accessing a sensor node discovered in an unattended area. Hence, the presence of the adversary within a WSN must be detected, and of course, the earlier the better. Adversary detection is predicated on the fact that access to a captured node's internal state, which includes secrets such as cryptographic keys, incurs a nonzero time delay. This suggests that adversary detection be divided into two phases: (i) in-capture detection, namely detection before the adversary completes the capture process and gets a chance to access a node's internal state and do any network damage, and (ii) post-capture detection, namely detection after the adversary already accessed and possibly used a node's internal state and secrets. Since the adversary is already active in the network in the latter case, it is important to determine the overall network resiliency; i.e., the ability of the network to operate in the presence of an active adversary. In this work we focus on the former case in which we try to identify the presence of the adversary prior to completion of a node capture.;To address the problem of in-capture adversary detection, we propose two probabilistic schemes called the pairwise pinging scheme and quorum pinging scheme, whereby the network continuously monitors itself in a distributed and self-organizing manner. We investigate the trade-offs between the network cost-performance and security of these schemes via a Markov Chain model, and present analytical solutions which allow us to choose appropriate performance parameters, such as the expected residual time-to-false-alarm, and security, such as the probability of a missed detection. We show that the quorum pinging is superior to pairwise pinging in terms of both cost-performance and security. Furthermore, we will show that both schemes are scalable with network size and their complexities are linearly proportional to the average node degree of the network.;We also analyze the optimum strategy for an adversary to deploy its agents over a sensor network; i.e., the strategy that enables the adversary to achieve the maximum capture ratio with fixed number of agents. The order of node capture, distribution, and location of agents are investigated and an analytical model is provided that describes the optimum path for deploying of agents to target nodes. Numerical data are presented to compare different scenarios for deploying agents and the corresponding performance of each deployment strategy. The proposed optimum strategy validates the physical interpretation under practical scenarios and demonstrates the feasibility of our capture strategy in practice. Finally, the resiliency of the underlying quorum pinging scheme for detecting adversary agents is investigated despite collusion among agents via optimum capture strategy.
机译:无线传感器网络(WSN)的节点在潜在的敌对环境中以无人值守的方式运行,这一事实带来了独特的安全挑战。迄今为止尚未解决的一个特别困难的问题是对手对节点捕获的处理。解决此问题的关键目标是限制捕获的节点造成的损坏。这很重要,因为无法防止节点捕获:按照定义,没有实际的物理机制可以阻止对手物理访问在无人值守区域发现的传感器节点。因此,必须检测WSN中对手的存在,当然,越早越好。攻击者检测基于以下事实:访问捕获的节点的内部状态(包括诸如加密密钥之类的秘密)会导致非零时间延迟。这表明将对手检测分为两个阶段:(i)捕获中检测,即在对手完成捕获过程并有机会访问节点内部状态并造成任何网络破坏之前的检测;以及(ii)捕获检测,即在对手已经访问并可能使用了节点的内部状态和机密之后进行的检测。由于在后一种情况下,对手已经在网络中活跃了,因此确定整体网络弹性非常重要。即网络在活动对手在场的情况下进行操作的能力。在这项工作中,我们专注于前一种情况,在这种情况下,我们尝试在完成节点捕获之前识别对手的存在。;为解决捕获中对手检测的问题,我们提出了两种称为成对ping方案的概率方案和仲裁ping方案,从而网络以分布式和自组织的方式连续监视自身。我们通过马尔可夫链模型研究了这些方案的网络成本性能和安全性之间的权衡,并提出了分析解决方案,使我们能够选择适当的性能参数,例如预期的剩余虚假警报时间,以及安全性,例如错过检测的概率。我们显示,在成本性能和安全性方面,仲裁ping优于成对ping。此外,我们将证明这两种方案都可以随着网络规模进行扩展,并且其复杂度与网络的平均节点程度呈线性比例。;我们还分析了在敌人的传感器网络上部署其代理的最佳策略;即使敌人能够在固定数量的特工情况下实现最大捕获率的策略。研究了节点捕获,分布和代理位置的顺序,并提供了一个分析模型,该模型描述了将代理部署到目标节点的最佳路径。提供了数值数据,以比较不同的部署代理方案和每种部署策略的相应性能。提出的最佳策略验证了实际情况下的物理解释,并证明了我们的捕获策略在实践中的可行性。最后,尽管通过最佳捕获策略在代理之间进行了勾结,但仍调查了用于检测敌方代理的基本定额轮询方案的弹性。

著录项

  • 作者

    Bahari, Seyed Farshad.;

  • 作者单位

    University of Maryland, College Park.;

  • 授予单位 University of Maryland, College Park.;
  • 学科 Engineering Electronics and Electrical.
  • 学位 Ph.D.
  • 年度 2008
  • 页码 132 p.
  • 总页数 132
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号