首页> 外文学位 >Defense against node compromise in sensor network security.
【24h】

Defense against node compromise in sensor network security.

机译:防御传感器网络安全中的节点危害。

获取原文
获取原文并翻译 | 示例

摘要

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise.;Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.
机译:电子和计算机技术的最新进展导致无线传感器网络(WSN)的广泛部署。 WSN具有广泛的应用,包括军事传感和跟踪,环境监视,智能环境等。许多WSN都有关键任务任务,例如军事应用。因此,无线传感器网络中的安全问题一直处于研究领域的前列。与其他无线网络(例如ad hoc和蜂窝网络)相比,由于传感器节点的功能和部署属性(例如大规模,恶劣的环境等)的限制,WSN的安全性更加复杂。安全问题主要是从攻击。通常,WSN中的攻击可分为外部攻击和内部攻击。在外部攻击中,攻击节点不是传感器网络的授权参与者。密码学和其他安全方法可以防止某些外部攻击。但是,导致内部攻击的主要且独特的问题-节点破坏将消除所有预防攻击的努力。知道节点损坏的可能性将有助于系统检测并防御它。尽管有一些方法可以用来检测和防御节点损坏,但很少有方法能够估计节点损坏的可能性。因此,我们为节点开发了基本均匀,基本梯度,智能均匀和智能梯度模型使用概率论来折衷分配以适应不同的应用环境。这些模型使系统可以估计节点受损的可能性。在系统安全设计中应用这些模型可以提高系统安全性,并几乎减少了每个安全领域的开销。此外,基于这些模型,我们设计了一种新颖的安全路由算法,以防御来自已经受到攻击但未被节点攻击检测机制检测到的节点的路由安全问题。我们算法中的路由路径会绕过那些已被检测为受感染节点或具有较大受感染概率的节点。仿真结果表明,无论是否检测到,我们的算法都能有效地保护路由路径免受节点损害。

著录项

  • 作者

    Chen, Xiangqian.;

  • 作者单位

    Florida International University.;

  • 授予单位 Florida International University.;
  • 学科 Engineering Electronics and Electrical.
  • 学位 Ph.D.
  • 年度 2007
  • 页码 104 p.
  • 总页数 104
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号