Security for Wireless Sensor Networks (Advances in Information Security)
โ Scribed by Donggang Liu, Peng Ning
- Publisher
- Springer
- Year
- 2006
- Tongue
- English
- Leaves
- 214
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition in hazardous environments, and includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. The book assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain. ย
โฆ Table of Contents
0387327231......Page 1
Contents......Page 9
1.1 Wireless Sensor Network......Page 12
1.2 Design Challenges......Page 13
1.3 Security Issues in Sensor Networks......Page 14
1.3.1 Broadcast Authentication......Page 15
1.3.2 Pairwise Key Establishment......Page 16
1.3.3 Security in Localization......Page 17
1.4 Orgnization of the Book......Page 18
2 Broadcast Authentication......Page 19
2.1 ยตTESLA Broadcast Authentication......Page 20
2.2 Multi-Level ยตTESLA......Page 22
2.2.1 Scheme I: Predetermined Key Chain Commitment......Page 23
2.2.2 Scheme II: Naive Two-Level ยตTESLA......Page 24
2.2.3 Scheme III: Fault Tolerant Two-Level ยตTESLA......Page 27
2.2.4 Scheme IV: DOS-Tolerant Two-Level ยตTESLA......Page 29
2.2.5 Scheme V: DOS-Resistant Two-Level ยตTESLA......Page 36
2.2.6 Scheme VI: Multi-Level ยตTESLA......Page 39
2.2.7 Experimental Results......Page 47
2.3 Tree-Based ยตTESLA......Page 52
2.3.1 The Basic Approach......Page 53
2.3.2 A Scheme for Long-Lived Senders......Page 55
2.3.3 Distributing Parameter Certificates......Page 58
2.3.4 Revoking ยตTESLA Instances......Page 59
2.3.5 Implementation and Evaluation......Page 62
2.4 Summary......Page 67
3 Pairwise Key Establishment......Page 68
3.1.1 Polynomial-Based Key Pre-Distribution......Page 69
3.1.2 Probabilistic Key Pre-Distribution......Page 70
3.2 Polynomial Pool-Based Key Pre-Distribution......Page 72
3.2.1 Phase 1: Setup......Page 73
3.2.2 Phase 2: Direct Key Establishment......Page 74
3.2.3 Phase 3: Path Key Establishment......Page 75
3.3 Key Pre-Distribution Using Random Subset Assignment......Page 76
3.3.1 The Random Subset Assignment Scheme......Page 77
3.3.3 Overheads......Page 78
3.3.4 Security Analysis......Page 79
3.3.5 Comparison with Previous Schemes......Page 82
3.4.1 The Hypercube-Based Scheme......Page 86
3.4.2 Dynamic Key Path Discovery......Page 89
3.4.3 Performance......Page 91
3.4.4 Overhead......Page 92
3.4.5 Security Analysis......Page 94
3.4.6 Comparison with Previous Schemes......Page 98
3.5 Implementation and Evaluation......Page 101
3.5.1 Optimization of Polynomial Evaluation......Page 102
3.5.2 Evaluation......Page 104
3.6 Summary......Page 105
4 Improving Pairwise Key Establishment Using Deployment Knowledge......Page 107
4.1.1 A Location-Aware Deployment Model......Page 108
4.1.2 Closest Pairwise Keys Scheme......Page 109
4.1.3 Closest Polynomials Pre-Distribution Scheme......Page 118
4.2 Improving Key Pre-Distribution with Post Deployment Knowledge......Page 128
4.2.1 Key Prioritization Using Post Deployment Knowledge......Page 129
4.2.2 Improving Random Subset Assignment Scheme with Deployment Locations......Page 130
4.3 Improving Key Pre-Distribution with Group Deployment Knowledge......Page 137
4.3.1 Group-Based Deployment Model......Page 138
4.3.2 A General Framework......Page 139
4.3.3 Performance Analysis......Page 142
4.3.4 Security Analysis......Page 148
4.4 Summary......Page 156
5 Secure Localization......Page 157
5.1 Localization in Sensor Networks......Page 158
5.2 Pitfalls of Current Localization Schemes under Attacks......Page 159
5.3.1 Assumptions......Page 161
5.3.2 Attack-Resistant Minimum Mean Square Estimation (MMSE)......Page 162
5.3.3 Voting-Based Location Estimation......Page 168
5.3.4 Security Analysis......Page 173
5.3.5 Simulation Evaluation......Page 174
5.3.6 Implementation and Field Experiments......Page 180
5.4 A Detector for Malicious Beacon Nodes......Page 183
5.4.1 Detecting Malicious Beacon Signals......Page 185
5.4.2 Filtering Replayed Beacon Signals......Page 186
5.4.3 Revoking Malicious Beacon Nodes......Page 193
5.4.4 Simulation Evaluation......Page 199
5.5 Summary......Page 202
6.1 Summary......Page 204
6.2 Future Work......Page 205
References......Page 207
I......Page 212
T......Page 213
W......Page 214
๐ SIMILAR VOLUMES
<p><P>Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations.</P><P><STRONG>Security for Wireless Sensor Networks</STRONG> discusses fundamental security issues in wireless sensor networks, techniques for the prote
<p>This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts a
<p><span>Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversaryโs
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not on
The book I order was 'new', wrapped in plastic cover. It was delivered in less than one week with UPS and in great condition. I am very pleased with it.