首页> 外文学位 >Simulation and evaluation of security and intrusion detection in IEEE 802.15.4 network.
【24h】

Simulation and evaluation of security and intrusion detection in IEEE 802.15.4 network.

机译:IEEE 802.15.4网络中安全性和入侵检测的仿真和评估。

获取原文
获取原文并翻译 | 示例

摘要

With the fast growth of wireless sensor technology, the idea of using Wireless Sensor Networks (WSNs) in more critical applications of real life is becoming popular. WSNs are restricted in energy, memory and bandwidth which makes them particularly vulnerable against intrusions. Security is important and needs to be considered for any WSN. The standard specification of IEEE 802.15.4; as one technology of such networks, introduces many constraints which makes the application of security even harder. In addition, WSNs are vulnerable to an intruder's malicious attacks because of their characteristics and the nature of applications they are used for. In this thesis, I describe a secure data exchange protocol including a key exchange mechanism based on the ZigBee specification and built on top of IEEE 802.15.4 link layer. All nodes will apply power management technique based on the constant event sensing reliability required by the coordinator. Power management generates random sleep times by every node which on average fairly distributes the sensing load among the nodes. Key exchange is initiated by cluster coordinator after some given number of sensing packets have been received by the coordinator. On the other hand cheap devices and accessibility of these sensors, encourage adversaries to launch physical attacks. This can be done by compromising a node inside the network or introducing an extra malicious node to the network. I have simulated key exchange and power management technique into an IEEE 802.15.4 cluster's reliable sensing function. I evaluate the impact of security function and its periodicity on cluster performance. I have also simulated attacks in which sensor nodes are compromised and could be accessed by intruders to maliciously fool the network. I have proposed and simulated intrusion detection mechanisms utilized to detect such attacks. The results show high completeness of detection and suggest parameter selection values to keep high level of performance.
机译:随着无线传感器技术的快速发展,在现实生活中更重要的应用中使用无线传感器网络(WSN)的想法正变得越来越流行。 WSN在能量,内存和带宽方面受到限制,这使其特别容易受到入侵的影响。安全性很重要,任何WSN都需要考虑安全性。 IEEE 802.15.4的标准规范;作为这种网络的一种技术,引入了许多限制,这使得安全性的应用更加困难。此外,由于其特征和所使用的应用程序的性质,WSN容易受到入侵者的恶意攻击。在本文中,我描述了一种安全数据交换协议,该协议包括基于ZigBee规范并建立在IEEE 802.15.4链路层之上的密钥交换机制。所有节点都将基于协调器所需的恒定事件感测可靠性来应用电源管理技术。电源管理通过每个节点生成随机的睡眠时间,平均而言,平均会在节点之间平均分配检测负载。在协调器已接收到一定数量的感知数据包之后,群集协调器将启动密钥交换。另一方面,廉价的设备和这些传感器的可访问性,鼓励对手发起物理攻击。这可以通过破坏网络内部的节点或向网络引入额外的恶意节点来实现。我已经将密钥交换和电源管理技术仿真到了IEEE 802.15.4群集的可靠传感功能中。我评估了安全功能及其周期性对集群性能的影响。我还模拟了攻击,其中传感器节点受到攻击,入侵者可能会对其进行攻击以恶意欺骗网络。我已经提出并模拟了用于检测此类攻击的入侵检测机制。结果表明检测的高度完整性,并建议参数选择值以保持较高的性能水平。

著录项

  • 作者

    Amini, Fereshteh.;

  • 作者单位

    University of Manitoba (Canada).;

  • 授予单位 University of Manitoba (Canada).;
  • 学科 Computer Science.
  • 学位 M.Sc.
  • 年度 2008
  • 页码 107 p.
  • 总页数 107
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号