Design Challenges and Practical Solutions for Securing Wireless Body Area Networks
|
|
- Theodora Hopkins
- 6 years ago
- Views:
Transcription
1 Design Challenges and Practical olutions for ecuring Wireless Body Area Networks Dr. Ming Li 10/16/2013 Assistant Professor, Dept. of Computer cience, Utah tate University
2 Outline Background on Body Area Networks (BAN) Main Design Challenges BANA: Body Area Network Authentication Exploiting Channel Characteristics AK-BAN: Authenticated ecret Key Extraction for BANs Conclusion and Future Work 2
3 Background Wireless Body Area Network (BAN) 3 [ource:
4 ecurity Issues in BAN Medical devices can also have actuators 4 Who has to die before ecurity is Increased in Wireless Enabled Medical Devices?
5 ecurity Issues in BAN (cont d) ystem and device-level security (authentication & integrity) Data must come from legitimate devices, and should not be modified. Affect safety! Invasion of privacy (data confidentiality) Why should we care? Availability (robustness) Against inadvertent or malicious Denial-of-ervice 5 Wearable ECG monitors Pulse Oximeter Glucose Monitors Cardiac Defibrillators
6 ecure Trust Initialization Bootstrap secure communication within a BAN Establish authenticated secret keys to protect BAN from attacks ecuring both one-to-one and group communication Attack model Can eavesdrop, modify, insert, delete information from the wireless channel May compromise devices afterwards General assumption 6 Devices share no secret information a priori
7 BAN ecurity Challenges Resource-constraint Battery power; Hardware (memory, speed, interfaces) etc. - lightweight ecurity & safety dilemma trict security is needed in normal cases But how about in an emergency? - fail safe Usability requirement Your grandma should be able to use it! - intuitive 7
8 Key pre-distribution Existing Approaches Requires physical contact or extra hardware Not easy to update keys E.g.: Resurrecting duckling [Andersen, 1999]; (wire, UB) Message-in-a-bottle, [enys 07], KALwEN (faraday cage). Biometrical measurements Extract keys from shared biometric signs; plug-and-play Require specialized sensing hardware E.g.: [Poon et al., IEEE Communication Magazine 2006; Venkatasubramanian et al., IEEE Transaction 2010; Venkatasubramanian et al., TON 2010; Xu et al., INFOCOM 2011] 8
9 Physical-layer ecurity Approaches Basic idea Non-cryptographic, use the characteristics of wireless channel Advantage: against key compromise, etc. Related work ecret key extraction from wireless channel [Mathur et. al. Mobicom 2008; Jana et. al. Mobicom 2009; Lai et. al. Allerton 2011] Vulnerable to Man-in-the-Middle (MitM) attack! Physical-layer authentication/proximity-based access control [Cai et al., ND 2011; Mathur et al., Mobiys 2011; Patwari et al., MobiCom 2007; Rasmussen et al., CC 2009; Zeng et al., Wireless Commun. 2010] Need advanced hardware: not compatible 9
10 Outline Background on Body Area Networks (BAN) Main Design Challenges BANA: Body Area Network Authentication Exploiting Channel Characteristics AK-BAN: Authenticated ecret Key Extraction for BANs Conclusion and Future Work 10
11 Problem tatement Can we achieve BAN device authentication without out-of-band channels and human interaction? (merely using wireless) Lu hi*, Ming Li #, hucheng Yu *, Jiawei Yuan, * ACM Wiec, Tucson, AZ,
12 Goal: Models and Assumptions CU differentiates on-body sensors from off-body sensors On-body sensors authenticate CU. Assumption Honest sensor nodes are on-body CU is on-body or near-body, relatively static to the body whether static or in motion during authentication. 12
13 Models and Assumptions (cont d) ystem Model Multiple COT sensors and one CU. CU is not compromised. No additional hardware or out-of-band channel. Attack Model One or more attackers, physically away from body. Eavesdropping, message injection, changing transmission power. Jamming or Do attacks are not considered. 13
14 Exploit Unique Channel Characteristics Observation 1: RI variations for on-body channels are greatly different from RI variations between off-body channels, under artificially introduced motions or channel disturbance. RI variations can be used as an indicator of channel stability. 14
15 15 Experiment Evidence
16 Theoretical Explanation On-body Channel: effect of human body is negligible for onbody devices which are very close and relative static to each other; direct path effect is the dominant factor. Off-body Channel: motions introduce Doppler shift; multipath effect is the dominant factor. 16
17 BANA Protocol The metric to differentiate between on-body sensors and off-body sensors? Average RI variations (ARV) ARV i = um i /NT, while um i = Σ RI k -RI K-1 How to deal with ARVs for final decision? Classification: [ accept ], [ reject ] 17
18 18 BANA Protocol
19 ensor deployment: Experiment etup 7 on-body; chest, arm, waist, thigh. 6 off-body. Experiment locations: (WxLxH, m) mall room: 2.8x3.3x2.7 Medium room: 4.5x5.5x2.7 Corridor: 4.5x40x2.7 19
20 Experiment Testing Plans Involve 2 males and 1 female as patients. Patient movements: walking, sitting & rotating, sitting & rolling. Attacker Placement: inside, next door, far away. Attacker movements: static, following. Each experiment duration: 2 min. 20
21 ARV measurements in 5 Test Plans ARVs of 34/35 on-body sensors are less than 4dB. ARVs of on-body sensors are relatively small. Utilize K-means clustering to partition ARVs into two groups. 21
22 Effectiveness False positive rates and false negative rates are calculated based on 15 sets of data under different settings. 22
23 ecurity Against trategic Attackers Attacker strategy 1: deploy a large number of attacker nodes to deviate classification result. expensive & easily detected. 23
24 ecurity Against trategic Attackers Attacker strategy 2: statistically predict the communication channel between on-body sensors and CU. Predict the channel and change transmission power or refer to historical measurements Channel is dynamic with short coherence time Both CU and on-body sensors are more than half wavelength away from off-body attackers. Beam-Forming Attacks Raise suspicion due to large size. Difficult to perform in NLO scenarios. 24
25 Efficiency Authentication time is up to 12 second. Computation and communication cost is negligible for sensor nodes. 25
26 ummary Discovered a new type of channel characteristics in BAN environment. Proposed BANA: lightweight, commercial off-the-shelf, non-cryptographic without prior-trust, fail-safe. Experiments show effectiveness and efficiency of BANA. 26
27 Outline Background on Body Area Networks (BAN) Main Design Challenges BANA: Body Area Network Authentication Exploiting Channel Characteristics AK-BAN: Authenticated ecret Key Extraction for BANs Conclusion and Future Work 27
28 Problem tatement Can we achieve authenticated secret key extraction in BAN using merely wireless communication? Lu hi*, Jiawei Yuan *, hucheng Yu *, Ming Li #, ACM Wiec, Budapest, Hungary, April
29 The Challenge: A Dilemma Rate is the critical issue for key generation Higher key generation rate requires dynamic channel. Device authentication via BANA requires the opposite Utilizes stability of on-body channel How to solve this tension? 30
30 Unique Channel Characteristics Observation II: On-Body channels exhibit obviously different RI variations Channels between Line-of-sight on-body devices tend to be much more stable than devices in Non-line-of-sight locations (e.g. front-to-back). Can deploy auxiliary sensor to create both channels 31 Wiec 2013
31 R (dbm) R (dbm) Experimental Evidence Channels between CU and 1 to 5 Front View Back View CU amples (per 200 ms) 0 1 Channels between 5 4 and 1, 2, 3, On-body ensors (a) (b) amples (per 200 ms)
32 Theoretical Explanation Line-of-sight channels: the direct path effect is the dominant factor between closely placed devices. table fading if relatively static. Non-line-of-sight channels: affected by the device placement, body movements, human tissue and body surface. Unpredictable fading. 33 Wiec 2013
33 Basic Idea Use stable channels for authentication How to authenticate on-body devices with unstable NLO channels? Exploit multi-hop authentication and transitive trust! Use dynamic channels for key generation How to achieve high key generation rate for LO devices? Exploit node cooperation (multi-hop relay) modeled as a max-flow problem! Needs to achieve key authenticity and secrecy simultaneously 34
34 1. Pairwise Key Generation AK-BAN Protocol k k 1CU k 2CU k 15 k 14 C U k 13 k 25 k 24 k 3CU k 4CU k 5CU 5 k 35 k 45 4 For each node i and CU: Adopt Adaptive ecret Bit Generation (ABG) to build initial shared secret key from R measurements. Generate (n + 1) 2 pairwise keys among n + 1 nodes including CU. 35 k 23 k 34 3
35 2. Initial Authentication AK-BAN Protocol After 1 mm 27 x After + t r1 t /1000 ms sec After 2 x After + t r2 2t /1000 sec ms 36 M m 16 mm 38 C U 3 CU All the broadcasts nodes, including a hello CU, M m 510 message: measure channels. M = (x, t 0, t) tr: a random number M 5 x: a t r1 random < t r2 < number < t m r5 49 After After 5t t 0 : total response time x ms + t t: time interval of each r5 /1000 response Response sec message broadcasting message repeats every t ms, After 4 lasts for t x + t r4 /1000 sec 0 sec. After 4t ms After 3t x ms + t r3 /1000 sec
36 AK-BAN Protocol 2. Initial Authentication 1 ARV cu, ARV 2, ARV 3, ARV 4, ARV 5 C U ARV 1, ARV 2, ARV 3, ARV 4, ARV 5 5 ARV cu, ARV 1, ARV 2, ARV 3, ARV 4 For each node i and CU: Calculates ARV by ARV = um of [R k - R k+1 ] Classifies ARV values into two groups ARV cu, ARV 1, ARV 3, ARV 4, ARV 5 3 ARV cu, ARV 1, ARV 2, ARV 4, ARV 5 4 Accepts nodes whose ARV belongs to the small value group, records as ( j, T). Otherwise, rejects and records as ( j, F). Constructs a trust table.
37 AK-BAN Protocol 3. Authenticated ecret Capacity Broadcast tores M 31 Measures TG={ 2, R CU} 1 tores M 32 Measures R 2 TG={ 1, CU} M 31 M 32 C tores TG={ For each node i and CU: 1 M, 3CU 2, U Measures 3 } R TG={ Broadcasts a secret 4 } capacity message: M 5 ij = (ID i, ID j, T/F, C ij ) M 3CU tores M 35 Computes ARVs and performs Measures R classification on ARVs. Adds M 35 valid j and trusted neighbors of j into Trust Group. 4 Constructs a security M 34 TG={ tores 3, M 34 capacity topology Measures 5 } R 3 TG={CU, 4 } 38
38 4. Deciding Maximum Entropy AK-BAN Protocol C U For i : Based on the capacity topology, runs the max-flow algorithm to find the path(s) to CU that can transmit maximized entropy of key information. 39 3
39 AK-BAN Protocol 5. Key Aggregation Broadcast Between i and CU: K 23 k Broadcasts k 23 k 25 C U 3 max-flow paths between 3 and CU: CU, 3 5 CU. k 23 k 5CU k 5cu k 23 Broadcas ts k 5CU k K 5C U k 25 Each j on the max-flow path broadcasts the XORed value of keys between it and its two neighbors respectively. i and CU obtain each other s pairwise key shared with neighbor along the max-flow path, pick one as the final key between i and CU. Multiple max-flow paths: Concatenation of the keys from individual max-flow paths.
40 5. Key Aggregation Broadcast AK-BAN Protocol Max-flow multi-path merging/splitting: No overlapped bits are used in the XORed value sent from the same node. The broadcast message includes the bit segment starting position of each key used by the XOR operation. 1 CU 5 K25' K35' 5 K5cu' 2 4 K5cu 3 K25' K35' 41 (a) (b)
41 Node Authentication ecurity Analysis Legitimate nodes: successful authentication probability increases Attacker: does not get more chances to be authenticated Man-In-The-Middle attacks are prevented ecrecy of the Extracted Key Attacker channels are uncorrelated to on-body channels. Attackers cannot derive secret key bits generated by on-body nodes. 42
42 ensor deployment Experiment etup 8 on-body: chest, arm, waist, thigh, back. 1 CU. 1 off-body. Room locations unchanged ubjects: 2 males, 1 female. Body movements: itting-and-rotating itting-and-rolling Walking Test plans: Different combinations of sensor deployment, location, subject, and body movement. 43
43 Effectiveness: Authentication False negative rate under different on-body to off-body node ratios remains 0. False positive rate comparison AK-BAN BANA mall 2.38% 38.10% Medium 2.70% 37.84% Corridor 0.00% 37.14% itting-and-rotating 0.00% 34.29% itting-and-rolling 0.00% 37.14% Walking 4.55% 40.91% ubject % 31.25% ubject % 40.91% ubject % 39.47% Overall 1.75% 37.72% 44
44 Key Genration Rate (bps) Efficiency: Key Generation Rate 10 t = 6 ms, mall Room Direct Generation One hop Relay AK BAN t = 6 ms, Corridor t = 5 ms, mall Room ensors
45 Conclusions and Future Work Body area network introduce big challenges in security & privacy research We proposed two trust initialization schemes exploiting channel characteristics that are low-cost, usable, and fail-safe Ongoing and future work Authenticated key extraction. Against other attacks. Robustness against interference and jamming. More 46
46 47 Related Publications Ming Li, Wenjing Lou, Kui Ren, Data ecurity and Privacy for Wireless Body Area Networks, IEEE Wireless Communications Magazine, Feb (citation: ~100) Ming Li, hucheng Yu, Joshua. D. Guttman, Kui Ren, Wenjing Lou, ACM Transactions on ensor Networks (TON), May Lu hi, Ming Li, hucheng Yu and Jiawei Yuan, "BANA: Body Area Network Authentication Exploiting Channel Characteristics'', IEEE Journal of elected Areas on Communications (JAC), ept Ming Li, hucheng Yu, Kui Ren, Wenjing Lou, "Group Device Pairing based ecure ensor Association and Key Management for Body Area Networks, IEEE INFOCOM, an Diego, CA, Mar Lu hi*, Ming Li #, hucheng Yu *, Jiawei Yuan, * "BANA: Body Area Network Authentication Exploiting Channel Characteristics'', ACM Wiec, Tucson, AZ, Apr Yantian Hou, Ming Li, and Joshua. D. Guttman, "Chorus: calable In-band Trust Establishment for Multiple Constrained Devices over the Insecure Wireless Channel'', ACM Wiec, Budapest, Hungary, April 17-19, Lu hi, Jiawei Yuan, hucheng Yu, and Ming Li, "AK-BAN: Authenticated ecret Key Extraction Utilizing Channel Characteristics for Body Area Networks", ACM Wiec, Budapest, Hungary, April 17-19, 2013.
47 Thanks for your attention! Q & A [ 48
ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks
ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks Lu Shi, Jiawei Yuan, Shucheng Yu Department of Computer Science University of Arkansas at Little Rock
More informationA Novel Collaborative Secret Key Generation and Device Authentication Scheme for Securing Intra Wireless Body Area Network
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X A Novel Collaborative Secret Key Generation and Device Authentication Scheme for Securing
More informationLightweight Detection of On-body Sensor Impersonator in Body Area Networks
Lightweight Detection of On-body Sensor Impersonator in Body Area Networks Liping Xie School of Computer Electronic, and Information, Guangxi University, Nanning, Guangxi, China Email: xie5012@mail.gxu.cn
More informationKey establishment in sensor networks
Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks
More informationBody Sensor Network Security
1 Body Sensor Network Security Close coupling of BSNs and security why network security is important information is sensitive, what it takes to protect it, how its different from WSNs how encryption is
More informationChongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.
2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 3.134 ISSN (Online): 2348-4470 ISSN (Print) : 2348-6406 International Journal of Advance Engineering and Research Development Volume 1, Issue 11, November -2014
More informationKey establishment in sensor networks
Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;
More informationA METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS
A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication
More informationDefending MANET against Blackhole Attackusing Modified AODV
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student
More informationIntroduction and Statement of the Problem
Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network
More informationEffective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report
Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini
More informationEnergy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication
Vol. 9, No. 12, 218 Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication Ye Lim Kang 1, Tae Ho Cho *2 Department of Electrical and Computer
More informationSleep/Wake Aware Local Monitoring (SLAM)
Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and
More informationReliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications
Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications Octav Chipara University of Iowa https://cs.uiowa.edu/~ochipara 1 Detecting clinical deterioration at low cost Clinical
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:
Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.
More information00 Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks
00 Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks MING LI, Utah State University SHUCHENG YU, University of Arkansas at Little Rock JOSHUA. D. GUTTMAN, Worcester Polytechnic
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationMPBCA: Mobility Prediction Based Clustering Algorithm for MANET
MPBCA: Mobility Prediction Based Clustering Algorithm for MANET Rani.V.G Associate Professor Research and Development Center Bharathiar University Coimbatore, India ranikhans@gmail.com Dr.M.Punithavalli
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationAnalysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs
Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationEfficient Secret Key Delivery Using Heartbeats
Efficient Secret Key Delivery Using Heartbeats Kwantae Cho 1,*, and Byungho Chung 2 1, 2 Information Security Research Division, Electronics and Telecommunications Research Institute, Republic of Korea
More informationLIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2
More informationConnectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks
Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University
More informationDetection of Wormhole Attacks in Wireless Sensor Networks
Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationCost Based Efficient Routing for Wireless Body Area Networks
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,
More informationMobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks
Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,
More informationMobile ad hoc networks Various problems and some solutions
Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk Main Focus Problems
More informationRouting Scheme in Energy efficient based Protocols for Wireless Sensor Networks
Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF
More informationSensor Based Time Series Classification of Body Movement
Sensor Based Time Series Classification of Body Movement Swapna Philip, Yu Cao*, and Ming Li Department of Computer Science California State University, Fresno Fresno, CA, U.S.A swapna.philip@gmail.com,
More informationOn Demand secure routing protocol resilient to Byzantine failures
On Demand secure routing protocol resilient to Byzantine failures Primary Reference: B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures,
More informationWireless Sensor Networks: Security Issues, Challenges and Solutions
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 859-868 International Research Publications House http://www. irphouse.com Wireless Sensor Networks:
More informationLocation Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System
Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing ystem Chen Jixiong, Li Guohui, Xu Huajie, Cai Xia*, Yang Bing chool of Computer cience & Technology,
More informationSMITE: A Stochastic Compressive Data Collection. Sensor Networks
SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data
More informationCASER Protocol Using DCFN Mechanism in Wireless Sensor Network
Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly
More informationTDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1
, pp.40-46 http://dx.doi.org/10.14257/astl.2016.142.07 TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 Hae Young Lee and Hyung-Jong Kim Department of Information Security
More informationCooperative Communications and Wireless Body Area Networks. Xigang Huang
Cooperative Communications and Wireless Body Area Networks Xigang Huang Contents Wireless Body Area Networks Applications Network architecture of WBANs MAC and Route Protocols Interworking Cooperative
More informationEfficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks
Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks K.Sivakumar 1, P.Murugapriya 2 II-M.TECH, Department of IT, Sasurie College of Engineering, Vijayamangalam, Tirupur,
More informationDefenses against Wormhole Attack
Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes
More informationDETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM
DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department
More informationClustering Based Certificate Revocation Scheme for Malicious Nodes in MANET
International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationPacket-Level Diversity From Theory to Practice: An based Experimental Investigation
Packet-Level Diversity From Theory to Practice: An 802.11- based Experimental Investigation E. Vergetis, E. Pierce, M. Blanco and R. Guérin University of Pennsylvania Department of Electrical & Systems
More informationWireless Sensor Networks CS742
Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture
More informationMOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationAN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK
www.arpapress.com/volumes/vol9issue2/ijrras_9_2_09.pdf AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK Ashish Bagwari 1, Danish Quamar 2, Noor Mohd 3 &
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,
More informationCSC 774 Advanced Network Security
CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security Dr. Peng Ning CSC 774 Adv. Net. Security 1 Wireless Sensor Networks 1. Network protocol (e.g., routing) 2. Data management (e.g.,
More informationFigure 1. Clustering in MANET.
Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More informationSecurity Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning
Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B
More informationVolume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient
More informationBlue Point Engineering
ensor Adapter Board Pointing the Way to olutions! Description: This board was designed to allow the control of a solid state relay with a sensor. When the is activated, the onboard micro relay will come
More informationTopology and Power Control
Topology and Power Control Octav Chipara Motivation Energy and capacity are limited resources in wireless sensor networks Answer: Topology and Power Control maintain a topology with certain properties
More informationPerformance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack
Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)
More informationAbstract of the Book
Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the
More informationSpoofing Attacks in wireless Sensor Networks
Spoofing Attacks in wireless Sensor Networks V Bharath Srinivas, Dr Syed Umar Department of ECM, KL University, A.P., INDIA. Abstract Wireless networks are vulnerable to spoofing attacks, which allows
More informationAN ad-hoc network is a group of nodes without requiring
240 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 2, JUNE 2007 Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis Wei
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationA Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks
A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks An efficient intrusion detection framework in cluster-based wireless sensor networks Paper: A lightweight hybrid security framework
More informationSynthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)
Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Problem Definition Solution Approach Benefits to End User Talk Overview Metrics Summary of Results to Date Lessons Learned & Future Work
More informationDISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:
More informationKEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting
KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting Never Stand Still Faculty of Engineering Computer Science and Engineering Weitao Xu 2,3, Guohao Lan 1,3, Qi
More informationAn overview of Trust, Naming and Addressing and Establishment of security associations
Security and Cooperation in Wireless Networks Georg-August University Göttingen An overview of Trust, Naming and Addressing and Establishment of security associations trust assumptions; attacker models;
More informationWeVe: When Smart Wearables Meet Intelligent Vehicles
WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet
More informationWireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile
More informationOutline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space
Outline Lecture 16: Wireless Networking Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -
More informationDetecting Sybil Nodes in Wireless Networks. *: SIS Dept., UNC Charlotte **: ECE Dept., WPI
Detecting Sybil Nodes in Wireless Networks with Physical Layer Network Coding Weichao Wang*, DiPu**, and Alex Wyglinski** *: SIS Dept., UNC Charlotte **: ECE Dept., WPI Motivation Network coding technique
More informationMobile Ad Hoc Networks: Basic Concepts and Research Issues
Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full
More informationAnalysis of Worm-Hole Attack in MANET using AODV Routing Protocol
Analysis of Worm-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary, Dr Sudhir Agrawal Truba College of Engineering & Technology, Indore, INDIA Abstract MANET is an infrastructure less, dynamic,
More informationSELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC Su Man Nam and Tae Ho Cho College of Information and Communication Engineering,
More informationJ. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering
Auburn Information Assurance Laboratory J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering 107 Dunstan Hall Auburn
More informationDetection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1.
Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN U.Kavitha 1 1 PG Student, Department of ECE, CK College of Engineering & Technology, Cuddalore, Tamil Nadu, India Abstract Wireless
More informationReal-Time and Low-Power Wireless Communication with Sensors and Actuators
THE KNOWLEDGE FOUNDATION S SENSORS GLOBAL SUMMIT 2015 November 10-11, 2015 San Diego Marriott La Jolla La Jolla, CA Real-Time and Low-Power Wireless Communication with Sensors and Actuators Behnam Dezfouli
More informationResearch Directions in Low-Power Wireless Networks
Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,
More information[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
More informationWARD: A Wearable Action Recognition Database
WARD: A Wearable Action Recognition Database Allen Y. Yang Department of EECS University of California Berkeley, CA 94720 USA yang@eecs.berkeley.edu Philip Kuryloski Department of ECE Cornell University
More informationOn Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University Outline Introduction
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity
More informationViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing
ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,
More informationOutline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -
Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?
More informationDETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN
DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor
More informationAd hoc and Sensor Networks Topology control
Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling
More informationProficient ID Allocation for MANETs
Proficient ID Allocation for MANETs S. Rajeswari Associate Professor, ECE, Saranathan College of Engineering, Trichy, India. rajeswaris-ece@saranathan.ac.in Abstract A Mobile Adhoc Network (MANETs) is
More informationA Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy
More informationComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network
Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 3 Version 1.0 March 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
More informationWiMAX Security: Problems & Solutions
(JCSCR) - ISSN 2227-328X WiMAX Security: Problems & Solutions Paul Semaan LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon Abstract This paper is a
More informationEvaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian
Evaluation of Power Aware Routing Protocols Mohammad Mahmud Wireless Networks Professor: Dr. Lijun Qian Power Aware Routing In a typical network, the route of a packet will be determined by calculating
More informationRandom Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
ISSN (e): 2250 3005 Vol, 05 Issue, 01 January 2015 International Journal of Computational Engineering Research (IJCER) Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks Si-Gwan
More informationEvent-based sampling for wireless network control systems with QoS
21 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July 2, 21 WeC8.3 Event-based sampling for wireless network control systems with QoS Adrian D. McKernan and George W. Irwin
More informationA Scalable Secured Approach in Wireless Sensor Networks
A Scalable Secured Approach in Wireless Sensor Networks Devika Bandyopadhya, Sangita Nath, D. Sheela, and Dr. G. Mahadevan Abstract Security is crucial for wireless sensor networks deployed in hostile
More informationUse of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks
Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable
More informationTemporal Key Integrity Protocol: TKIP. Tim Fielder University of Tulsa Tulsa, Oklahoma
Temporal Key Integrity Protocol: TKIP Tim Fielder University of Tulsa Tulsa, Oklahoma History IEEE released the first 802.11 specification back in 1997 The Wired Equivalent Privacy (WEP) authentication/encryption
More informationInternational Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:
Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The
More informationSecurity Analysis of Emerging Remote Obstetrics Monitoring Systems
Security Analysis of Emerging Remote Obstetrics Monitoring Systems C. C. Tan*, L. Bai^, D. S. Mastrogiannis, J. Wu* *Dept. of Computer and Information Sciences, Temple University ^ Dept. of Electrical
More informationOutline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid
Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks Experimental methodology Empirical study in homes Spectrum study of existing wireless signals
More informationVoiceprint-based Access Control for Wireless Insulin Pump Systems
Voiceprint-based Access Control for Wireless Insulin Pump Systems Presenter: Xiaojiang Du Bin Hao, Xiali Hei, Yazhou Tu, Xiaojiang Du, and Jie Wu School of Computing and Informatics, University of Louisiana
More information