首页> 外文学位 >Data security in unattended wireless sensor networks.
【24h】

Data security in unattended wireless sensor networks.

机译:无人值守的无线传感器网络中的数据安全性。

获取原文
获取原文并翻译 | 示例

摘要

Wireless Sensor Networks (WSNs) encompass a multitude of small autonomous devices that monitor the deployment area and process acquired information. They are usually managed by an on-line trusted entity called a sink. However, some emerging WSNs scenarios preclude constant presence of an on-line sink. In such a disconnected or unattended settings, sensors must accumulate sensed data until it can be off-loaded to an itinerant sink. Furthermore, if the operating environment is hostile, there is a very real threat of sensor and data compromise.;In this thesis we define Unattended Wireless Sensor Networks (UWSNs), characterized by a sporadic presence of the sink. Sensors can remain unattended for a long time and must retain their measurements until the next sink visit. The UWSN model motivates a new and powerful mobile adversary that can compromise up to a certain number of sensors within a particular time interval. This interval can be much shorter than the time between successive sink visits. Given enough such intervals, the adversary can subvert the entire network as it moves through sets of compromised sensors, gradually undermining security.;Lack of an on-line trusted sink and the compromise power of the adversary, make security techniques in prior WSN security literature unsuitable for the UWSN setting. We provide novel solutions to secure data in UWSNs against an adversary that aims to learn, modify or delete collected data. Proposed protocols take advantage of sensor collaboration to obtain a surprising degree of resilience in the presence of a mobile adversary.
机译:无线传感器网络(WSN)包含大量小型自治设备,用于监视部署区域并处理获取的信息。它们通常由称为接收器的在线受信实体管理。但是,某些新兴的WSN场景排除了在线接收器的持续存在。在这种断开连接或无人值守的设置中,传感器必须累积检测到的数据,直到可以将其卸载到巡回接收器上为止。此外,如果操作环境恶劣,则存在传感器和数据泄露的非常真实的威胁。;在本文中,我们定义了无人值守的无线传感器网络(UWSN),其特征是偶尔出现接收器。传感器可以长时间无人值守,并且必须保留其测量值,直到下一次水槽访问为止。 UWSN模型激发了一个新的强大的移动对手,该对手可以在特定的时间间隔内破坏多达一定数量的传感器。此间隔可以比连续接收访问之间的时间短得多。给定足够的间隔时间,攻击者可以在整个网络中穿越被破坏的传感器,从而破坏整个网络,从而逐渐破坏安全性。缺少在线受信任的接收器和攻击者的破坏能力,会使安全技术成为以前的WSN安全文献所用。不适合UWSN设置。我们提供了新颖的解决方案,以针对旨在学习,修改或删除收集的数据的对手,保护UWSN中的数据安全。提议的协议利用传感器协作在移动对手存在的情况下获得惊人程度的弹性。

著录项

  • 作者

    Soriente, Claudio.;

  • 作者单位

    University of California, Irvine.;

  • 授予单位 University of California, Irvine.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2009
  • 页码 126 p.
  • 总页数 126
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

  • 入库时间 2022-08-17 11:38:25

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号