1 / 241
文档名称:

Security mechanisms for wireless works.pdf

格式:pdf   页数:241
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Security mechanisms for wireless works.pdf

上传人:bolee65 2014/7/2 文件大小:0 KB

下载得到文件列表

Security mechanisms for wireless works.pdf

文档介绍

文档介绍:ABSTRACT
LIU, DONGGANG. Security Mechanisms for Wireless works. (Under
the direction of Assistant Professor Peng Ning).
Wireless works have received a lot of attention recently due to their
wide applications in military and civilian operations. Example applications include target
tracking, scientific exploration, and data acquisition in hazardous environments. Security
es one of the main concerns when there are malicious attacks against work.
However, providing security services in works turns out to be a challenging task
due to the resource constraints on sensor nodes and the promise attacks. These
features and challenges motivate the research on security mechanisms for wireless sensor
networks.
This dissertation includes three studies on security mechanisms for wireless sensor
networks. The first study extends the capabilities of µTESLA, a broadcast authentication
technique for wireless works, so that it can cover a long time period and support
a large number of sensor nodes as well as potential senders in work.
The second study addresses how to establish pairwise keys between sensor nodes in
a wireless work. A key pre-distribution framework based on bivariate polynomial
pool is developed for this purpose. Two efficient instantiations of this framework are also
provided: a random subset assignment scheme and a hypercube-based key pre-distribution
scheme. To further improve the pairwise key establishment in static works, prior
deployment knowledge, post deployment knowledge and group-based deployment knowledge
are used to facilitate key pre-distribution.
The third study investigates how to enhance the security of location discovery in
works. An attack-resistant MMSE method and a voting-based method are de-
veloped to tolerate malicious attacks against location discovery. Both methods can survive
malicious attacks even if the attacks bypass traditional cryptographic protections such as
authentication, as long as the benign beacon signals c