首页> 外文学位 >Security schemes for wireless sensor networks with mobile sink.
【24h】

Security schemes for wireless sensor networks with mobile sink.

机译:具有移动接收器的无线传感器网络的安全性方案。

获取原文
获取原文并翻译 | 示例

摘要

Mobile sinks are vital in many wireless sensor applications for efficient data collection, data querying, and localized sensor reprogramming. Mobile sinks prolong the lifetime of a sensor network. However, when sensor networks with mobile sinks are deployed in a hostile environment, security became a critical issue. They become exposed to varieties of malicious attacks. Thus, anti threats schemes and security services, such as mobile sink's authentication and pairwise key establishment, are essential components for the secure operation of such networks.;Due to the sensors, limited resources designing efficient security schemes with low communication overhead to secure communication links between sensors and MS (Mobile Sink) is not a trivial task. In addition to the sensors limited resources, sink mobility required frequent exchange of cryptography information between the sensors and MS each time the MS updates its location which imposes extra communication overhead on the sensors.;In this dissertation, we consider a number of security schemes for WSN (wireless sensor network) with MS. The schemes offer high network's resiliency and low communication overhead against nodes capture, MS replication and wormhole attacks.;We propose two schemes based on the polynomial pool scheme for tolerating nodes capture: the probabilistic generation key pre-distribution scheme combined with polynomial pool scheme, and the Q-composite generation key scheme combined with polynomial pool scheme. The schemes ensure low communication overhead and high resiliency.;For anti MS replication attack scheme, we propose the multiple polynomial pools scheme that provide much higher resiliency to MS replication attack as compared to the single polynomial pool approach.;Furthermore, to improve the network resiliency against wormhole attack, two defensive mechanisms were developed according to the MS mobility type. In the first technique, MS uses controlled mobility. We investigate the problem of using a single authentication code by sensors network to verify the source of MS beacons, and then we develop a defensive approach that divide the sensor network into different authentication code's grids. In the second technique, random mobility is used by MS. We explore the use of different communication channels available in the sensor hardware combined with polynomial pool scheme.
机译:移动接收器在许多无线传感器应用中对于有效的数据收集,数据查询和本地化传感器重新编程至关重要。移动接收器可延长传感器网络的寿命。但是,当将具有移动接收器的传感器网络部署在恶劣的环境中时,安全性成为一个关键问题。他们变得容易受到各种恶意攻击。因此,诸如移动宿的身份验证和成对密钥建立之类的反威胁方案和安全服务是此类网络安全运行的必要组成部分。;由于传感器的原因,有限的资源设计了低通信开销的有效安全方案以保护通信链路传感器与MS(移动接收器)之间的连接不是一件容易的事。除了传感器有限的资源外,每次MS更新其位置时,宿移动性都需要在传感器和MS之间频繁交换密码信息,这给传感器带来了额外的通信开销。带MS的WSN(无线传感器网络)。该方案针对节点捕获,MS复制和虫洞攻击提供了较高的网络弹性和较低的通信开销。我们基于容忍节点捕获的多项式池方案,提出了两种方案:概率生成密钥预分配方案与多项式池方案相结合; Q复合生成密钥方案结合多项式池方案。该方案确保了较低的通信开销和较高的弹性。对于反MS复制攻击方案,我们提出了多项多项式池方案,与单多项式池方法相比,该方案为MS复制攻击提供了更高的弹性。抵御虫洞攻击的灵活性,根据MS的移动性类型开发了两种防御机制。在第一种技术中,MS使用受控的移动性。我们调查了传感器网络使用单个身份验证代码来验证MS信标源的问题,然后我们开发了一种防御方法,将传感器网络划分为不同的身份验证代码的网格。在第二种技术中,MS使用随机移动性。我们探索了结合多项式池方案在传感器硬件中可用的不同通信通道的使用。

著录项

  • 作者

    Rasheed, Amar Adnan.;

  • 作者单位

    Texas A&M University.;

  • 授予单位 Texas A&M University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 144 p.
  • 总页数 144
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:37:34

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号