13) providing end-to-end secure communications in
DESCRIPTION
docTRANSCRIPT
7/18/2019 13) Providing End-To-End Secure Communications In
http://slidepdf.com/reader/full/13-providing-end-to-end-secure-communications-in 1/3
Providing End-to-End Secure Communications
in Wireless Sensor Networks
Abstract:
Providing desirable data security, that is, confidentiality, authenticity, and
availability, in wireless sensor networks (WSNs) is challenging, as a WSN usually
consists of a large number of resource constraint sensor nodes that are generally
deloyed in unattended!hostile environments and, hence, are e"osed to many
tyes of severe insider attacks due to node comromise# $"isting security designs
mostly rovide a ho%by%ho security aradigm and thus are vulnerable to such
attacks# &urthermore, e"isting security designs are also vulnerable to many tyes of
denial of service ('oS) attacks, such as reort disrution attacks and selective
forwarding attacks and thus ut data availability at stake# n this aer, we seek to
overcome these vulnerabilities for large%scale static WSNs# We come u with a
location%aware end%to%end security framework in which secret keys are bound to
geograhic locations and each node stores a few keys based on its own location#his location%aware roerty effectively limits the imact of comromised nodes
only to their vicinity without affecting end%to%end data security# he roosed
multifunctional key management framework assures both node%to%sink and node%
to%node authentication along the reort forwarding routes# *oreover, the roosed
data delivery aroach guarantees efficient en%route bogus data filtering and is
highly robust against 'oS attacks# he evaluation demonstrates that the roosed
design is highly resilient against an increasing number of comromised nodes and
effective in energy savings#
$"isting System:
7/18/2019 13) Providing End-To-End Secure Communications In
http://slidepdf.com/reader/full/13-providing-end-to-end-secure-communications-in 2/3
In many Wireless Sensor Networks (WSNs), providing end to end secure
communications etween sensors and t!e sink is important "or secure
network management# W!ile t!ere !ave een many works devoted to !op y
!op secure communications, t!e issue o" end to end secure communications
Is largely ignored
Proposed System$
In t!is paper, we design an end to end secure communication protocol in
randomly deployed WSNs#
Speci"ically, our protocol is ased on a met!odology called di""erentiated key
pre-distriution# %!e core idea is to distriute di""erent numer o" keys to
di""erent sensors to en!ance t!e
resilience o" certain links# %!is "eature is leveraged during routing, w!ere
nodes route t!roug! t!ose links wit! !ig!er resilience# &sing rigorous
t!eoretical analysis, we derive an e'pression "or t!e uality o" end to end
secure communications, and use it to determine optimum protocol
parameters# E'tensive per"ormance evaluation illustrates t!at our solutions
can provide !ig!ly secure communications etween sensor nodes and t!e sink
in randomly deployed WSNs# We also provide detailed discussion on a
potential attack (i#e# iased node capturing attack) to our
solutions, and propose several countermeasures to t!is attack# in WSNs, we
need to use ho by ho based encrytion!decrytion in roviding end to end secure
communications#
7/18/2019 13) Providing End-To-End Secure Communications In
http://slidepdf.com/reader/full/13-providing-end-to-end-secure-communications-in 3/3
*odules:
ClientServer
router(Sensor)
*+W*+E *N S.%W*+E +E/&I+E0EN%S
So"tware +euirements$
+anguage : -#N$
echnologies : *icrosoft#N$ &ramework,
A'.#N$'$ : /isual Studio 0112
3ackend : S4+ Server 0115
.erating System : *icrosoft Windows 6P SP0 or +ater /ersion
ardware +euirements$
Processor : ntel Pentium or more
7A* : 580 *3 ( Minimum)
9ard 'isk : 1 ;3