Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure

Size: px
Start display at page:

Download "Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure"

Transcription

1 Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure Keith M. Martin Maura B. Paterson Information Security Group Royal Holloway, University of London 4 September 2009 Maura Paterson KPSs for linear WSNs 1/ 16

2 Outline Applications Requiring One-Dimensional WSNs Maura Paterson KPSs for linear WSNs 2/ 16

3 Traditional View of a WSN Maura Paterson KPSs for linear WSNs 3/ 16

4 Traditional View of a WSN Maura Paterson KPSs for linear WSNs 3/ 16

5 Traditional View of a WSN Maura Paterson KPSs for linear WSNs 3/ 16

6 Oil/Gas/Water Pipelines are Critical Infrastructure photo credit: Chris Sauerwald, Maura Paterson KPSs for linear WSNs 4/ 16

7 Pipeline Monitoring Pipelines are used to transport valuable resources over long distances through isolated areas. Maura Paterson KPSs for linear WSNs 5/ 16

8 Pipeline Monitoring Pipelines are used to transport valuable resources over long distances through isolated areas. Detection of leaks, measurement of seismic activity, detection of theft or sabotage... Maura Paterson KPSs for linear WSNs 5/ 16

9 Pipeline Monitoring Pipelines are used to transport valuable resources over long distances through isolated areas. Detection of leaks, measurement of seismic activity, detection of theft or sabotage... Also bridges, railway lines, roads... Maura Paterson KPSs for linear WSNs 5/ 16

10 Pipeline Monitoring Pipelines are used to transport valuable resources over long distances through isolated areas. Detection of leaks, measurement of seismic activity, detection of theft or sabotage... Also bridges, railway lines, roads... Perimeter surveillance requires sensors in a ring. Maura Paterson KPSs for linear WSNs 5/ 16

11 WSNs are Well-Suited to Monitoring Linear Infrastructure ease of deployment ease of maintenance increased reliability Maura Paterson KPSs for linear WSNs 6/ 16

12 WSNs are Well-Suited to Monitoring Linear Infrastructure ease of deployment ease of maintenance increased reliability Maura Paterson KPSs for linear WSNs 6/ 16

13 Characteristics of One-Dimensional WSNs We assume the network consists of an arbitrary number of nodes, each with communication range r. Restricted number of neighbours (proportional to r, rather than r 2 ) Location knowledge (In particular, the order of nodes along the pipe is known.) Density of node deployment (required to ensure adequate sensing coverage) Maura Paterson KPSs for linear WSNs 7/ 16

14 Key Predistribution {k 1, k 5, k 7 } {k 3, k 5, k 12 } k 5 key predistribution scheme (KPS) nodes are assigned keys before deployment nodes that share keys can communicate securely e.g. Eschenauer and Gligor: Each node draws m keys uniformly (without replacement) from a keypool K Maura Paterson KPSs for linear WSNs 8/ 16

15 Security Metrics for KPSs for Traditional WSNs Number of keys stored by each node. Connectivity: Pr 1 :=probability that two neighbouring nodes share a key Resilience: fail(s):=number of links between uncaptured nodes that are compromised when an adversary captures s nodes Maura Paterson KPSs for linear WSNs 9/ 16

16 Major Security Threat for One-Dimensional WSNs: Disconnection of the Network We need to prevent large sections of the network from becoming disconnected. Small numbers of isolated nodes are not a problem. Maura Paterson KPSs for linear WSNs 10/ 16

17 New Security Metric for One-Dimensional WSNs Definition A KPS for a one-dimensional network consisting of a set N of n nodes, where n is arbitrary, is s-fallible if Maura Paterson KPSs for linear WSNs 11/ 16

18 New Security Metric for One-Dimensional WSNs Definition A KPS for a one-dimensional network consisting of a set N of n nodes, where n is arbitrary, is s-fallible if 1. After the capture of any s 1 nodes, there exists a set E N of size at most O(1) such that N \ E is connected. Maura Paterson KPSs for linear WSNs 11/ 16

19 New Security Metric for One-Dimensional WSNs Definition A KPS for a one-dimensional network consisting of a set N of n nodes, where n is arbitrary, is s-fallible if 1. After the capture of any s 1 nodes, there exists a set E N of size at most O(1) such that N \ E is connected. 2. It is possible to choose s nodes whose capture partitions the network into two (or more) isolated networks of size Ω(n). Maura Paterson KPSs for linear WSNs 11/ 16

20 Upper Bounds For s-fallibility Theorem If a KPS for a one-dimensional WSN in which the nodes have communication range r yields a connected network, then it is s-fallible for some 1 s r. Theorem Suppose a KPS that yields a connected network assigns keys to nodes such that the largest distance between two nodes that share a key is b. Then it is s-fallible for some 1 s b. Maura Paterson KPSs for linear WSNs 12/ 16

21 Basic Construction We assign keys to the nodes such that: all pairs of nodes at distance r share a key; all pairs of nodes at distance 1 share a key. e.g. r = 3 Maura Paterson KPSs for linear WSNs 13/ 16

22 The Basic Construction is r-fallible (sketch...) Label nodes sequentially 0, 1,..., n. Suppose r 1 nodes are captured. There exists x Z such that no node with a label equivalent to x (mod r) has been captured. Let Ψ 1, Ψ 2 be nodes at distance at least r + 1 from some captured node. We can find a secure path between them: Maura Paterson KPSs for linear WSNs 14/ 16

23 The Basic Construction is r-fallible (sketch...) Label nodes sequentially 0, 1,..., n. Suppose r 1 nodes are captured. There exists x Z such that no node with a label equivalent to x (mod r) has been captured. Let Ψ 1, Ψ 2 be nodes at distance at least r + 1 from some captured node. We can find a secure path between them: 1. Take hops of length 1 from Ψ 1 to Ψ 2 until a node with label equivalent to x (mod r) is reached. Maura Paterson KPSs for linear WSNs 14/ 16

24 The Basic Construction is r-fallible (sketch...) Label nodes sequentially 0, 1,..., n. Suppose r 1 nodes are captured. There exists x Z such that no node with a label equivalent to x (mod r) has been captured. Let Ψ 1, Ψ 2 be nodes at distance at least r + 1 from some captured node. We can find a secure path between them: 1. Take hops of length 1 from Ψ 1 to Ψ 2 until a node with label equivalent to x (mod r) is reached. 2. Take hops of length r towards Ψ 2 until a node at distance less than r from Ψ 2 is reached. Maura Paterson KPSs for linear WSNs 14/ 16

25 The Basic Construction is r-fallible (sketch...) Label nodes sequentially 0, 1,..., n. Suppose r 1 nodes are captured. There exists x Z such that no node with a label equivalent to x (mod r) has been captured. Let Ψ 1, Ψ 2 be nodes at distance at least r + 1 from some captured node. We can find a secure path between them: 1. Take hops of length 1 from Ψ 1 to Ψ 2 until a node with label equivalent to x (mod r) is reached. 2. Take hops of length r towards Ψ 2 until a node at distance less than r from Ψ 2 is reached. 3. Complete the path by hops of length 1. Maura Paterson KPSs for linear WSNs 14/ 16

26 Construction for Ring Topologies Maura Paterson KPSs for linear WSNs 15/ 16

27 thankyou Maura Paterson KPSs for linear WSNs 16/ 16

Secure routing in IoT networks with SISLOF

Secure routing in IoT networks with SISLOF Secure routing in IoT networks with SISLOF Ayman El Hajjar 1,, George Roussos 1, Maura Paterson 2 1 Department of Computer science and Information systems 2 Department of Economics, Mathematics and Statistics

More information

See discussions, stats, and author profiles for this publication at:

See discussions, stats, and author profiles for this publication at: See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/66083307 Application-specific hybrid symmetric design of key pre-distribution for wireless

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security Dr. Peng Ning CSC 774 Adv. Net. Security 1 Wireless Sensor Networks 1. Network protocol (e.g., routing) 2. Data management (e.g.,

More information

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide

More information

Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks

Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks 2009 International Conference on Computational Science and Engineering Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks Sushmita Ruj Applied Statistics Unit, Indian Statistical

More information

Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs

Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2014) Published online in Wiley Online Library (wileyonlinelibrary.com)..914 RESEARCH ARTICLE Key Predistribution Scheme for Clustered Hierarchical

More information

A Broadcast-enhanced Key Predistribution Schemes

A Broadcast-enhanced Key Predistribution Schemes A Broadcast-enhanced Key Predistribution Schemes Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson We present a formalisation of a category of schemes which we call

More information

Chord-based Key Establishment Schemes for Sensor Networks

Chord-based Key Establishment Schemes for Sensor Networks Chord-based Key Establishment Schemes for Sensor Networks Fan Zhang, Zhijie Jerry Shi, Bing Wang Department of Computer Science and Engineering, University of Connecticut, Storrs, CT 06269 Abstract Because

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 20, 2011 Class #4 Broadcast information security Agenda Broadcast information security Broadcast authentication and encryption Key management

More information

Key establishment in sensor networks

Key establishment in sensor networks Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks

More information

A Key-Management Scheme for Distributed Sensor Networks

A Key-Management Scheme for Distributed Sensor Networks A Key-Management Scheme for Distributed Sensor Networks Stratimir Doichev April 23, 2003 CSC 774 Network Security 1 Paper Overview A Key-Management Scheme for Distributed Sensor Networks, Laurent Eschenauer,

More information

Re-examining Probabilistic Versus Deterministic Key Management

Re-examining Probabilistic Versus Deterministic Key Management Re-examining Probabilistic Versus Deterministic Key Management Dahai Xu Jianwei Huang Jeffrey Dwosin Mung Chiang Ruby Lee {dahaixu, jianweih, jdwosin, chiangm, rblee}@princeton.edu Department of Electrical

More information

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal * Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal * SCOE, Pune University Prof. J. B. Kulkarni SCOE, Pune University Abstract Security is the main issue while setting

More information

Chapter I INTRODUCTION. and potential, previous deployments and engineering issues that concern them, and the security

Chapter I INTRODUCTION. and potential, previous deployments and engineering issues that concern them, and the security Chapter I INTRODUCTION This thesis provides an introduction to wireless sensor network [47-51], their history and potential, previous deployments and engineering issues that concern them, and the security

More information

Forward-secure Key Evolution in Wireless Sensor Networks

Forward-secure Key Evolution in Wireless Sensor Networks Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski 1 Mirosław Kutyłowski 1 Michał Ren 2 Katarzyna Rybarczyk 2 1 Wrocław University of Technology Wrocław, Poland 2 Adam Mickiewicz

More information

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks ISSN (e): 2250 3005 Vol, 05 Issue, 01 January 2015 International Journal of Computational Engineering Research (IJCER) Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks Si-Gwan

More information

Secure Multi-Hop Infrastructure Access

Secure Multi-Hop Infrastructure Access Secure Multi-Hop Infrastructure Access presented by Reza Curtmola (joint work with B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens) 600.647 Advanced Topics in Wireless Networks Wireless Infrastructure

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

A General Probabilistic Model for Improving Key Assignment in Wireless Networks

A General Probabilistic Model for Improving Key Assignment in Wireless Networks A General Probabilistic Model for Improving Key Assignment in Wireless etworks Patrick Tague and Radha Poovendran etwork Security Lab (SL, Department of Electrical Engineering University of Washington,

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Towards more robust internetworks:

Towards more robust internetworks: Towards more robust internetworks: an application of graph theory Authors Jamie Greenwood, MSc (Royal Holloway, 2016) Stephen Wolthusen, ISG, Royal Holloway Abstract As networks become increasingly connected

More information

Network-on-chip (NOC) Topologies

Network-on-chip (NOC) Topologies Network-on-chip (NOC) Topologies 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and performance

More information

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer

More information

Light-weight Contour Tracking in Wireless Sensor Networks

Light-weight Contour Tracking in Wireless Sensor Networks Light-weight Contour Tracking in Wireless Sensor Networks Xianjin Zhu Rik Sarkar Jie Gao Joseph S. B. Mitchell INFOCOM 08 1 Motivation Sensor network: sense and monitor the physical world (temperature,

More information

Course Introduction / Review of Fundamentals of Graph Theory

Course Introduction / Review of Fundamentals of Graph Theory Course Introduction / Review of Fundamentals of Graph Theory Hiroki Sayama sayama@binghamton.edu Rise of Network Science (From Barabasi 2010) 2 Network models Many discrete parts involved Classic mean-field

More information

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 24 A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang

More information

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely

More information

A Review on Various Routing Attacks on Wireless. Sensor Network

A Review on Various Routing Attacks on Wireless. Sensor Network A Review on Various Routing Attacks on Wireless Sensor Network Rani Patel 1, Prof. Rakesh Pandit 2 Pursuing M.Tech 1, Ass. Profesor 2 Patel Group Of Institutions, Indore 1,2 rani.patel1225@gmail.com, rakesh.pandit@patelcollege.com

More information

A Joint Performance-Vulnerability Metric Framework for Designing Ad Hoc Routing Protocols

A Joint Performance-Vulnerability Metric Framework for Designing Ad Hoc Routing Protocols The 2010 Military Communications Conference - Unclassified rogram - Cyber Security and Network Management A Joint erformance-vulnerability Metric Framework for Designing Ad Hoc Routing rotocols Andrew

More information

Key establishment in sensor networks

Key establishment in sensor networks Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Λέων-Χαράλαμπος Σταματάρης

Λέων-Χαράλαμπος Σταματάρης Λέων-Χαράλαμπος Σταματάρης INTRODUCTION Two classical problems of information dissemination in computer networks: The broadcasting problem: Distributing a particular message from a distinguished source

More information

By: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili

By: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks By: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili W. Du, J. Deng, Y. S. Han, P. K. Varshney,

More information

Sensor Network Architectures. Objectives

Sensor Network Architectures. Objectives Sensor Network Architectures muse Objectives Be familiar with how application needs impact deployment strategies t Understand key benefits/costs associated with different topologies. Understand key benefits/costs

More information

Duplicate Node Detection Using Distributed Protocols (3D-NUP) in WSN

Duplicate Node Detection Using Distributed Protocols (3D-NUP) in WSN Duplicate Node Detection Using Distributed Protocols (3D-NUP) in WSN Saravanan.D 1, Jeba Moses.T 2, Arthibala.A 3 1,2 Assistant Professor, 3 Senior Lecturer Dept of Information Technology, IFET College

More information

On Pairwise Connectivity of Wireless Multihop Networks

On Pairwise Connectivity of Wireless Multihop Networks On Pairwise Connectivity of Wireless Multihop Networks Fangting Sun and Mark Shayman Department of Electrical and Computer Engineering University of Maryland, College Park, MD 2742 {ftsun, shayman}@eng.umd.edu

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

Quality of service in wireless sensor networks: mechanisms for a new concept? Holger Karl

Quality of service in wireless sensor networks: mechanisms for a new concept? Holger Karl Quality of service in wireless sensor networks: mechanisms for a new concept? Holger Karl hkarl@ieee.org Telecommunication Technische Universität Berlin Overview Services and their quality in WSN? How

More information

Computing Aggregate Functions in Sensor Networks

Computing Aggregate Functions in Sensor Networks Computing Aggregate Functions in Sensor Networks Antonio Fernández Anta 1 Miguel A. Mosteiro 1,2 Christopher Thraves 3 1 LADyR, GSyC,Universidad Rey Juan Carlos 2 Dept. of Computer Science, Rutgers University

More information

MIDDLEWARE IN WIRELESS SENSOR NETWORKS (WSNS)

MIDDLEWARE IN WIRELESS SENSOR NETWORKS (WSNS) MIDDLEWARE IN WIRELESS SENSOR NETWORKS (WSNS) By: Haitham Amar 1 Jun-12 2010 OUTLINES Introduction The Major Components of WSN-Middleware Reference model for Middleware in WSN Middleware common services

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security Computer Science CSC 774 Advanced Network Security Topic 4.3 Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks 1 Wireless Sensor Networks (WSN) A WSN consists of a potentially

More information

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks University of Cambridge Computer Laboratory 22nd IFIP TC-11 International Information Security Conference Sandton,

More information

Wireless Sensor Networks --- Concepts and Challenges

Wireless Sensor Networks --- Concepts and Challenges Outline Wireless Sensor Networks --- Concepts and Challenges Basic Concepts Applications Characteristics and Challenges 2 Traditional Sensing Method Basic Concepts Signal analysis Wired/Wireless Object

More information

Topologies. Maurizio Palesi. Maurizio Palesi 1

Topologies. Maurizio Palesi. Maurizio Palesi 1 Topologies Maurizio Palesi Maurizio Palesi 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

Detection of Node Clone in Wireless Sensor Networks

Detection of Node Clone in Wireless Sensor Networks Detection of Node Clone in Wireless Sensor Networks Amaresh Chavali P.G. Scholar, Dept. of CSE, Narasaraopet Engineering College, Narasaraopet. Abstract: Wireless sensor networks are vulnerable to the

More information

WIRELESS sensor networks (WSNs) have been

WIRELESS sensor networks (WSNs) have been IEEE SENSORS JOURNAL, VOL. 15, NO. 9, SEPTEMBER 2015 5103 Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks Lein Harn and Ching-Fang Hsu Abstract Special designs are needed

More information

HERO: Hierarchical key management protocol for heterogeneous wireless sensor networks

HERO: Hierarchical key management protocol for heterogeneous wireless sensor networks HERO: Hierarchical key management protocol for heterogeneous wireless sensor networks Boushra Maala and Yacine Challal and Abdelmadjid Bouabdallah Universite de Technologie de Compiegne, UMR CNRS 6599

More information

A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks

A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks A Set-Covering Approach for Modeling Attacks on Key redistribution in Wireless Sensor Networks atrick Tague Network Security Lab NSL) Dept. of Electrical Engineering University of Washington Seattle, Washington,

More information

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Goals of this chapter ad hoc & sensor networks are good What their intended application areas are Commonalities and differences

More information

The Best Keying Protocol for Sensor Networks

The Best Keying Protocol for Sensor Networks The Best Keying Protocol for Sensor Networks Taehwan Choi Department of Computer Science The University of Texas at Austin Email: ctlight@cs.utexas.edu H. B. Acharya Department of Computer Science The

More information

Emerging Connected Vehicle based

Emerging Connected Vehicle based Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu Presented by Sezana Fahmida Outline Introduction

More information

ForSinglePrintOnly. Networking: ZigBee. Commissioning a wireless sensor and control system. By Jason Choong and Zachary Smith

ForSinglePrintOnly. Networking: ZigBee. Commissioning a wireless sensor and control system. By Jason Choong and Zachary Smith Networking: ZigBee Commissioning a wireless sensor and control system By Jason Choong and Zachary Smith ZigBee sensors are quite easy to install individually, but correctly designing and installing a large

More information

5G vision and D2D communications

5G vision and D2D communications 5G vision and D2D communications Aleksandr Ometov aleksandr.ometov@tut.fi ELT Department What is 5G? The fifth generation of mobile technology (5G) is positioned to address the demands and business contexts

More information

Wireless Sensor Networks --- Concepts and Challenges

Wireless Sensor Networks --- Concepts and Challenges Wireless Sensor Networks --- Concepts and Challenges Outline Basic Concepts Applications Characteristics and Challenges 2 1 Basic Concepts Traditional Sensing Method Wired/Wireless Object Signal analysis

More information

Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks Sensors 21, 1, 1251-1278; doi:1.339/s121251 OPEN ACCESS sensors ISSN 1424-822 www.mdpi.com/journal/sensors Article Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks Ching-Tsung Hsueh,

More information

COMP Online Algorithms. k-server Problem & Advice. Shahin Kamali. Lecture 13 - Oct. 24, 2017 University of Manitoba

COMP Online Algorithms. k-server Problem & Advice. Shahin Kamali. Lecture 13 - Oct. 24, 2017 University of Manitoba COMP 7720 - Online Algorithms k-server Problem & Advice Shahin Kamali Lecture 13 - Oct. 24, 2017 University of Manitoba COMP 7720 - Online Algorithms k-server Problem & Advice 1 / 20 Review & Plan COMP

More information

Backbone Discovery In Thick Wireless Linear Sensor Netorks

Backbone Discovery In Thick Wireless Linear Sensor Netorks Backbone Discovery In Thick Wireless Linear Sensor Netorks October 28, 2014 Imad Jawhar1, Xin Li2, Jie Wu3, and Nader Mohamed1 1 College of Information Technology, United Arab Emirates University, Al Ain,

More information

Outline. Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Localisation and Positioning. Localisation and Positioning properties

Outline. Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Localisation and Positioning. Localisation and Positioning properties Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Outline Localisation and Positioning Topology Control Routing Summary WS 2009/2010 Prof. Dr. Dieter Hogrefe/Prof. Dr. Xiaoming Fu Dr. Omar

More information

Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)

Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree) International Journal of Networked and Distributed Computing, Vol. 2, No. 3 (August 2014), 148-155 Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree) Lifford

More information

Wireless Sensor Networking Support to Military Operations on Urban Terrain. A. Grilo, R. Silva, P. Nunes, J. Martins, M. Nunes

Wireless Sensor Networking Support to Military Operations on Urban Terrain. A. Grilo, R. Silva, P. Nunes, J. Martins, M. Nunes Wireless Sensor Networking Support to Military Operations on Urban Terrain A. Grilo, R. Silva, P. Nunes, J. Martins, M. Nunes Layout Motivation Overview of Project UbiSec&Sens MOUT WSN Architecture Networking

More information

Abstract. 1. Introduction

Abstract. 1. Introduction SOOAWSN: A complete framework for Wireless Sensor Networks Graduate Student Paper Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela,

More information

AN EFFICIENT DETECTION AND PREVENTION OF DDoS ATTACK IN WSN

AN EFFICIENT DETECTION AND PREVENTION OF DDoS ATTACK IN WSN AN EFFICIENT DETECTION AND PREVENTION OF DDoS ATTACK IN WSN R.Vijayarajeswari #1, S.Priya *2 #1 Vivekanandha college of technology for women *2 Vivekanandha college of technology for women Abstract--In

More information

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 35 (2014 ) 1352 1359 18 th International Conference in Knowledge Based and Intelligent Information & Engineering Systems

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

Opportunistic Application Flows in Sensor-based Pervasive Environments

Opportunistic Application Flows in Sensor-based Pervasive Environments Opportunistic Application Flows in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian, and Manish Parashar ICPS 2004 1 Outline Introduction to pervasive sensor-based

More information

Network Decoupling: A Methodology for Secure

Network Decoupling: A Methodology for Secure Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Abstract Many wireless sensor network (WSN) applications demand

More information

A Game-Theoretic Framework for Congestion Control in General Topology Networks

A Game-Theoretic Framework for Congestion Control in General Topology Networks A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control

More information

Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks

Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks DONGGANG LIU and PENG NING North Carolina State University Pairwise key establishment is a fundamental security service

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Metric and metrizable spaces

Metric and metrizable spaces Metric and metrizable spaces These notes discuss the same topic as Sections 20 and 2 of Munkres book; some notions (Symmetric, -metric, Ψ-spaces...) are not discussed in Munkres book.. Symmetric, -metric,

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://kth.instructure.com/courses/293 Lecture 1 Introduction to WSNs Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/

More information

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 2 A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang Kevin

More information

Copyright 2016 EMC Corporation. All rights reserved.

Copyright 2016 EMC Corporation. All rights reserved. 1 BUILDING BUSINESS RESILIENCY Isolated Recovery Services NAZIR VELLANI (ERNST & YOUNG) & DAVID EDBORG (EMC GLOBAL SERVICES) 2 PRESENTERS Nazir Vellani (EY) Senior Manager Tel: +1 214 596 8985 Email: nazir.vellani@ey.com

More information

A Generalized Coverage-Preserving Scheduling in WSNs. a Case Study in Structural Health Monitoring

A Generalized Coverage-Preserving Scheduling in WSNs. a Case Study in Structural Health Monitoring A Generalized Coverage-Preserving Scheduling in WSNs a Case Study in Structural Health Monitoring March 29,2017 Sensor Web Architecture and Protocols Fereshteh Mahdavi Outline Backgraound Scope of this

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks K. Seada, M.Zuniga, A. Helmy and B. Krishnamachari Department of Electrical Engineering University of Southern

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

Network Working Group. Category: Informational Bay Networks Inc. September 1997

Network Working Group. Category: Informational Bay Networks Inc. September 1997 Network Working Group Request for Comments: 2185 Category: Informational R. Callon Cascade Communications Co. D. Haskin Bay Networks Inc. September 1997 Routing Aspects Of IPv6 Transition Status of this

More information

An Online Threshold Key Distribution Scheme for Symmetric Key Management

An Online Threshold Key Distribution Scheme for Symmetric Key Management An Online Threshold Key Distribution Scheme for Symmetric Key Management Alireza T. Boloorchi, M. H. Samadzadeh, and T. Chen Computer Science Department, Oklahoma State University Stillwater, OK, USA Abstract

More information

SECURED CLUSTERING IN WIRELESS SENSOR NETWORKS SAMIR GOKHALE. Bachelor of Engineering DAVV. Indore, India

SECURED CLUSTERING IN WIRELESS SENSOR NETWORKS SAMIR GOKHALE. Bachelor of Engineering DAVV. Indore, India SECURED CLUSTERING IN WIRELESS SENSOR NETWORKS BY SAMIR GOKHALE Bachelor of Engineering DAVV Indore, India 2002 Submitted to the faculty of the Graduate College of the Oklahoma State University in partial

More information

Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks

Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks Sushmita Ruj and Bimal Roy Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India {sush

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, second floor Credits: 6 Ouline 1. WS(A)Ns Introduction 2. Applications 3. Energy Efficiency Section

More information

Topologies. Maurizio Palesi. Maurizio Palesi 1

Topologies. Maurizio Palesi. Maurizio Palesi 1 Topologies Maurizio Palesi Maurizio Palesi 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to

2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to 2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to be connected if it is not disconnected. A subset of

More information

Applicability of TSN to 5G services Tongtong Wang, Xinyuan Wang Huawei Technologies

Applicability of TSN to 5G services Tongtong Wang, Xinyuan Wang Huawei Technologies Applicability of TSN to 5G services Tongtong Wang, Xinyuan Wang Huawei Technologies HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN Chicago, March 2018 Background Conclusion from ITU-T/IEEE joint workshop,

More information

Network Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications

Network Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications Network Design for QoS under IEEE 802.15.4 ( Zigbee ) CSMA/CA for Internet of Things Applications EECS Symposium Abhijit Bhattacharya Advisor: Prof. Anurag Kumar Dept. of ECE, IISc, Bangalore April 28,

More information

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks WENLIANG DU Syracuse University JING DENG University of New Orleans YUNGHSIANG S. HAN National Taipei University, Taiwan PRAMOD K. VARSHNEY

More information

We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing?

We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing? Geographical routing in practice We noticed that the trouble is due to face routing. Is greedy routing robust to localization noise? Can we ignore the real coordinates and use virtual coordinates for routing?

More information

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis Part I: Introduction to Wireless Sensor Networks Xenofon Fafoutis Sensors 2 DTU Informatics, Technical University of Denmark Wireless Sensor Networks Sink Sensor Sensed Area 3 DTU Informatics,

More information

CompTIA Security+ Study Guide (SY0-501)

CompTIA Security+ Study Guide (SY0-501) CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 1 Introduction to WSNs Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/

More information

Design and Analysis of Efficient Anonymous Communication Protocols

Design and Analysis of Efficient Anonymous Communication Protocols Design and Analysis of Efficient Anonymous Communication Protocols Thesis Defense Aaron Johnson Department of Computer Science Yale University 7/1/2009 1 Acknowledgements Joan Feigenbaum Paul Syverson

More information

Mobility Control for Complete Coverage in Wireless Sensor Networks

Mobility Control for Complete Coverage in Wireless Sensor Networks Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida

More information

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Wireless Sensor Networks (WSN) Tanyar Pooyeh 2pooyeh@informatik.uni-hamburg.de Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Outline Multi-hop Wireless Networks MANETs, VANETs, WSNs Routing

More information

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas Vin de Silva Li Zhang Stanford University HP Labs Point-to-Point Routing in Sensornets Routing

More information

A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution

A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution Anupam Pattanayak, B. Majhi Computer Science & Engineering Department, National Institute of Technology, Rourkela,

More information