Towards Provable Security for Data Transmission Protocols in Sensor Network

نویسندگان

  • Mi Wen
  • Ling Dong
  • Yanfei Zheng
  • Kefei Chen
چکیده

This paper presents a framework to analyze the security of data transmission protocols in wireless sensor network. This framework defines three attack models in terms of the adversary’s attacking ability, and provides an ideal model to verify whether a given protocol is secure or not under these three different attack models. Furthermore, we give a formal security definition under different attack models for data transmission protocols. A security checking model is also presented, which describes the detailed steps of how to use the security definition to weigh the security level of a given protocol in the ideal model. A “secure” directed diffusion protocol is analyzed to demonstrate the effectiveness of the security checking model. This is the first time that the notion of provable security is applied in wireless sensor networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks

Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...

متن کامل

درخت تجمیع داده براساس الگوریتم پویای شکل گیری رودخانه درشبکه حسگر بی سیم

One of the main challenges in Wireless Sensor Networks is the limited energy of nodes which can cause to reduce the lifetime of nodes and whole network respectively. Transmissions between the nodes consumes most of the nodes' energy so minimization of unnecessary transmissions can led to reduction of energy consumption. Therefor routing protocols designed based on optimal energy consumption are...

متن کامل

Designing a Secure Label-switching Routing Protocol for Wireless Sensor Networks

Although a multitude of routing protocols exist for wireless sensor networks developed for various application domains, secure sensor network routing protocols do not exhibit such variety. In addition, those few sensor network routing protocols that were developed with security in mind still lack a formal proof of their security properties. In order to remedy this situation, in this paper, we p...

متن کامل

Cryptographic Protocols, Sensor Network Key Management, and RFID Authentication

This thesis includes my research on efficient cryptographic protocols, sensor network key management, and radio frequency identification (RFID) authentication protocols. Key exchange, identification, and public key encryption are among the fundamental protocols studied in cryptography. There are two important requirements for these protocols: efficiency and security. Efficiency is evaluated usi...

متن کامل

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2009