بی سیم بررسی امنیت شبکه های حسگر

Click here to load reader

Post on 24-May-2015

8.694 views

Category:

Education

11 download

Embed Size (px)

TRANSCRIPT

2.

  • .

3. . .2
4.

  • .

5. . 6. . .3
7.
Base station
B
E
Internet & satellite
C
A
D
Sensor nodes
Sensor field
Task manager node
User
4
8.

  • . . .

9. Parent .5
10.

  • .

11. . .

6
12.

. .

. .

.
7
13.

14. 15. 16. 17. 18. 19. 20. 21. 22. 8
23.

24. 25. 26. 27. 28. 29. SeRLoc(Secure Range-In depended Localization) 30. 31. TESLA9
32.

33. Sybil 34. Wormhole 35. Black hole/Sinkhole 36. 37. 38. 39. 40. Hello Flood 41. 10
42. (DoS)

  • . . .

43. . . 44. DoS .11
45. DoS
12
46. (DoS)

  • . .

47. : . 48. . 49. 13
50. sybil

  • sybil " " .

51. . sybil . 52. sybil . sybil . .14
53. sybil

  • ad hoc Sybil .

54. . . . 55. Sybil . Sybil. 15
56. sybil
Z
F
Y
B
E
A
B
C
X
Sybil Node

C
16
57. sybil

  • Sybil .

58. : 59. .17
60.

  • .

61. . 62. .18
63.

  • . .

64. . 65. . 66. .19
67. black hole/sink hole

  • .

68. . . 69. .20
70. black hole
B
Attacker
Base Station
21
71.

  • .

72. . . 73. . . 74. .22
75.

76. . . 77. 78. . 79. 80. . .23
81.

  • .

82. . 83. .24
84. hello flood

  • Hello .

85. Hello . . 86. .25
87.

  • . .

88. . . 89. .26
90. wormhole

  • wormhole . .

91. .27
92. wormhole
Attacker
B
Z
Z
B
Wormholelink
Y
Y


28
93. wormhole

  • wormhole ad hoc Dahill Hass Hu . .

94. wormhole . RF watermarking . 95. wormhole . . 96. .29
97. wormhole

  • wormhole

98. 30
99.

100. - 101. DES,3DES,RC5,AES 102. 103. 104. LEAP 105. 106. Elliptic Curve Cryptography(ECC)31
107.

108. RSA ECC 109. 160 ECC 1024 RSA . 110. ECC RSA .32
111. -
33
AgreeonE , G
TA = KA * G
Alice chooses randomKA
Bob chooses random KB
TB = KB * G
ComputeKB * TA
ComputeKA * TB
Agree onG* KB*KA
112. Broadcasting & multicasting

113. 114. 115. 116. 34
117.
35
118.
36
119.
37

Multicasting
120.
38

Broadcasting
121. 39
...