SECURE CONNECTIVITY THROUGH KEY PREDISTRIBUTION UNDER JAMMING ATTACKS IN AD HOC AND SENSOR NETWORKS by

نویسنده

  • Korporn Panyim
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security-Performance Tradeoffs of Resilient Inheritance based Key Predistribution for Wireless Sensor Networks

Key pre-distribution is a well-known technique for ensuring secure communication among sensors deployed in an ad-hoc manner to form a sensor network. Secure paths can be established between any two sensors, where adjacent sensors on the path share a (predistributed) secret key. Several results have been presented recently on random key predistribution schemes [6] and [2]. In this paper, we prop...

متن کامل

Security-Performance Tradeoffs of Inheritance based Key Predistribution for Wireless Sensor Networks

Key predistribution is a well-known technique for ensuring secure communication via encryption among sensors deployed in an ad-hoc manner to form a sensor network. In this paper, we propose a novel 2-Phase technique for key predistribution based on a combination of inherited and random key assignments from the given key pool to individual sensor nodes. We also develop an analytical framework fo...

متن کامل

Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies

In cloning attacks, an adversary captures a sensor node, reprograms it, makes multiple copies, and inserts these copies, into the network. Cloned nodes subvert sensor network processing from within. In a companion paper [2], we show how to detect and remove clones from sensor networks using random key predistribution security measures. Keys that are present on the cloned nodes are detected by u...

متن کامل

Jamming attack in MANET: A Selected Review

--A MANET is a collection of nodes that do not rely on a predefined infrastructure to keep the network connected Wireless sensor networks are being used in many applications like health monitoring, military purposes, and home automation. These networks are equipped with large number of sensors, which are spatially distributed. Wireless sensor networks are widely used in remote areas, defense an...

متن کامل

Predistribution and local collaboration-based group rekeying for wireless sensor networks

When a sensor network is deployed in a hostile environment, an adversary may launch such attacks as eavesdropping the communications and compromising sensor nodes. Using the compromised nodes, he may inject false sensing reports or modify the reports sent by other nodes. To defend against these attacks, researchers have proposed symmetric group key-based schemes. In these schemes, however, if a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010