首页> 外文OA文献 >Secure Connectivity Through Key Predistribution Under Jamming Attacks In Ad Hoc and Sensor Networks
【2h】

Secure Connectivity Through Key Predistribution Under Jamming Attacks In Ad Hoc and Sensor Networks

机译:在Ad hoc和传感器网络的干扰攻击下,通过密钥预分配来实现安全连接

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Wireless ad hoc and sensor networks have received attention from research communities over the last several years. The ability to operate without a fixed infrastructure is suitable for a wide range of applications which in many cases require protection from security attacks. One of the first steps to provide security is to distribute cryptographic keys among nodes for bootstrapping security. The unique characteristics of ad hoc networks create a challenge in distributing keys among limited resource devices. In this dissertation we study the impact on secure connectivity achieved through key pre-distribution, of jamming attacks which form one of the easiest but efficient means for disruption of network connectivity. In response to jamming, networks can undertake different coping strategies (e.g., using power adaptation, spatial retreats, and directional antennas). Such coping techniques have impact in terms of the changing the initial secure connectivity created by secure links through key predistribution. The objective is to explore how whether predistribution techniques are robust enough for ad hoc/sensor networks that employ various techniques to cope with jamming attacks by taking into account challenges that arise with key predistribution when strategies for coping with jamming attacks are employed. In the first part of this dissertation we propose a hybrid key predistribution scheme that supports ad hoc/sensor networks that use mobility to cope with jamming attacks. In the presence of jamming attacks, this hybrid scheme provides high key connectivity while reducing the number of isolated nodes (after coping with jamming using spatial retreats). The hybrid scheme is a combination of random key predistribution and deployment-based key predistribution schemes that have complementary useful features for secure connectivity. In the second part we study performance of these key predistribution schemes under other jamming coping techniques namely power adaptation and directional antennas. We show that the combination of the hybrid key predistribution and coping techniques can help networks in maintaining secure connectivity even under jamming attacks.
机译:在过去的几年中,无线自组织网络和传感器网络受到了研究界的关注。在没有固定基础结构的情况下进行操作的能力适用于多种应用,这些应用在许多情况下都需要防御安全攻击。提供安全性的第一步之一是在节点之间分配加密密钥以引导安全性。自组织网络的独特特性给在有限资源设备之间分配密钥带来了挑战。在这篇论文中,我们研究了通过密钥预分发实现的对安全连接的影响,即干扰攻击构成了破坏网络连接的最简单但有效的手段之一。响应于干扰,网络可以采取不同的应对策略(例如,使用功率自适应,空间撤退和定向天线)。这样的应对技术在改变由通过密钥预分配的安全链接创建的初始安全连接方面具有影响。目的是通过在采用应对干扰攻击的策略时考虑到关键预分配所带来的挑战,来探索预分发技术对于采用各种技术来应对干扰攻击的自组织/传感器网络是否足够健壮。在本文的第一部分,我们提出了一种混合密钥预分配方案,该方案支持使用移动性来应对干扰攻击的自组织/传感器网络。在存在干扰攻击的情况下,此混合方案可提供高键连接性,同时减少隔离节点的数量(在使用空间撤退应对干扰之后)。混合方案是随机密钥预分配方案和基于部署的密钥预分配方案的组合,这些方案具有用于安全连接的互补有用功能。在第二部分中,我们研究了在其他干扰应对技术(即功率自适应和定向天线)下这些关键预分配方案的性能。我们证明了混合密钥预分配和应对技术的结合可以帮助网络即使在干扰攻击下也能维持安全的连接性。

著录项

  • 作者

    Panyim Korporn;

  • 作者单位
  • 年度 2010
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号