Improvement of Dependability against Node Capture Attacks for Wireless Sensor Networks
スポンサーリンク
概要
- 論文の詳細を見る
A Wireless Sensor Network has sensor nodes which have limited computational power and memory size. Due to the nature of the network, the data is vulnerable to attacks. Thus, maintaining confidentiality is an important issue. To compensate for this problem, there are many countermeasures which utilize common or public key cryptosystems that have been proposed. However, these methods have problems with establishing keys between the source and the destination nodes. When these two nodes try to establish new keys, they must exchange information several times. Also, the routes of the Wireless Sensor Networks can change frequently due to an unstable wireless connection and batteries running out on sensor nodes. These problems of security and failure become more serious as the number of nodes in the network increases. In this paper, we propose a new data distribution method to compensate for vulnerability and failure based on the Secret Sharing Scheme. In addition, we will confirm the effect of our method through experiments. Concerning security, we compare our method with the existing TinySec, which is the major security architecture of Wireless Sensor Networks.
- 2011-01-01
著者
-
Kakuda Yoshiaki
Graduate School Of Information Science Hiroshima City University
-
Ohta Tomoyuki
Graduate School Of Information Science Hiroshima City University
-
Aida Masaki
Graduate School Of System Design Tokyo Metropolitan University
-
KOHNO Eitaro
Graduate School of Information Sciences, Hiroshima City University
-
Kohno Eitaro
Graduate School Of Information Sciences Hiroshima City University
関連論文
- Service Discovery Using Self-Regulating Agents in Ad Hoc Networks
- Service Discovery Using Self-Regulating Agents in Ad Hoc Networks
- Service Discovery Using Self-Regulating Agents in Ad Hoc Networks
- Development of a Topology Controllable Testing Environment for Mobile Ad Hoc Network Software
- An Equivalent Division Method for Reducing Test Cases in State Transition Testing of MANET Protocols
- A Study of Control Plane Stability with Retry Traffic : Comparison of Hard- and Soft-State Protocols
- New Safety Support System for Children on School Routes Using Mobile Ad Hoc Networks
- Improvement of Dependability against Node Capture Attacks for Wireless Sensor Networks
- A Hierarchical Geographical Routing with Alternative Paths Using Autonomous Clustering for Mobile Ad Hoc Networks
- A Hybrid Greedy Routing with Location Information for Mobile Ad Hoc Networks
- An Autonomous Clustering-Based Hierarchical Multicast Routing for Mobile Ad Hoc Networks
- Route-Split Routing Resilient to Simultaneous Failure for Mobile Ad Hoc Networks
- A Hierarchical Multicast Routing Using Inter-Cluster Group Mesh Structure for Mobile Ad Hoc Networks
- Diffusion-Type Autonomous Decentralized Flow Control for Multiple Flows(Network)
- Parameter Design for Diffusion-Type Autonomous Decentralized Flow Control
- Mutual Complementarity between Diffusion-Type Flow Control and TCP(Network)
- Using a Renormalization Group to Create Ideal Hierarchical Network Architecture with Time Scale Dependency
- Adaptive Timer-Based Countermeasures against TCP SYN Flood Attacks
- A Self-Organized Routing ID Group-Based Multipath Routing for Ad Hoc Networks
- On Optimal Magnitude of Fluctuations in Probe Packet Arrival Intervals
- BS-7-11 How to Visualize Mobile Ad hoc NETworks - Experiment in Hiroshima Confectionery Exhibition