登录 注册
当前位置:主页 > 资源下载 > 9 > Security in Wireless Ad Hoc and Sensor Networks.pdf下载

Security in Wireless Ad Hoc and Sensor Networks.pdf下载

  • 更新:2024-08-06 21:16:20
  • 大小:5.13MB
  • 推荐:★★★★★
  • 来源:网友上传分享
  • 类别:其它 - 开发技术
  • 格式:PDF

资源介绍

Contents AbouttheAuthors xiii Preface xv Acknowledgements xvii ListofAcronyms xix PartOne WirelessAdHoc,SensorandMeshNetworking 1 1Introduction 3 1.1 InformationSecurity 4 1.1.1 ComputerSecurity 4 1.1.2 CommunicationsSecurity 5 1.2 ScopeoftheBook 5 1.3 StructureoftheBook 6 1.4 ElectronicResourcesfortheBook 7 1.5 ReviewQuestions 7 2WirelessAdHoc,SensorandMeshNetworks 9 2.1 AdHocNetworksandApplications 10 2.1.1 ApplicationExamples 10 2.1.2 Challenges 11 2.2 SensorandActuatorNetworks 13 2.2.1 ApplicationExamples 14 2.2.2 Challenges 15 2.3 MeshNetworks 17 2.3.1 ApplicationExamples 18 2.3.2 Challenges 19 2.4 TacticalCommunicationsandNetworks 19 2.4.1 BlueForceTrackingSystem 22 2.5 FactorsInfluencingtheDesignofWirelessAdHoc,SensorandMesh Networks 23 2.5.1 WirelessMedium 24 2.5.2 NetworkingRegime 25 viii Contents 2.5.3 NatureofTraffic 26 2.5.4 QualityofServiceRequirements 26 2.5.5 Mobility 26 2.5.6 FaultTolerance 27 2.5.7 OperatingEnvironment 27 2.5.8 PowerEfficiencyRequirements 27 2.5.9 Scalability 27 2.5.10 HardwareRequirementsandProductionCost 27 2.6 ReviewQuestions 28 3TheWirelessMedium 29 3.1 WirelessChannelFundamentalsandSecurity 29 3.1.1 Capacity 31 3.1.2 ElectromagneticSpectrum 32 3.1.3 PathLossandAttenuation 35 3.1.4 OtherTransmissionImpairmentsandJamming 36 3.1.5 ModulationandDemodulation 38 3.1.6 ManchesterEncoding 41 3.1.7 MultiplexingandDuplexing 42 3.2 AdvancedRadioTechnologies 43 3.2.1 DirectionalandSmartAntennas 43 3.2.2 SoftwareRadios 44 3.2.3 CognitiveRadios 44 3.2.4 Multiradio/MultichannelSystems 45 3.2.5 MIMOSystems 45 3.3 ReviewQuestions 45 4MediumAccessandErrorControl 47 4.1 MediumAccessControl 47 4.1.1 GenericMACProtocols 47 4.1.2 MACProtocolsforWirelessAdHoc,SensorandMesh Networks 51 4.2 ErrorControl 53 4.2.1 ErrorCorrection 54 4.2.2 ErrorDetection 56 4.3 WirelessMetropolitanAreaNetworks 58 4.3.1 IEEE802.16 58 4.3.2 WiMAX 58 4.4 WirelessLocalAreaNetworks 59 4.4.1 IEEE802.11 59 4.4.2 Wi-Fi 60 4.5 WirelessPersonalAreaNetworks 60 4.5.1 IEEE802.15.1 60 4.5.2 Bluetooth 61 4.5.3 IEEE802.15.4 62 Contents ix 4.5.4 ZigBee 62 4.5.5 WiMedia 63 4.6 ReviewQuestions 64 5Routing 65 5.1 InternetProtocolandMobileIP 65 5.1.1 IPv4,IPv6andSecurityinIP 65 5.1.2 DistanceVectorandLinkStateAlgorithms 68 5.1.3 Internetworking 70 5.1.4 Multicasting,Geocasting,Anycastingand Broadcasting 71 5.1.5 MobileIP 71 5.2 RoutinginWirelessAdHocNetworks 72 5.2.1 FloodingandGossiping 73 5.2.2 AdHocOn-demandDistanceVectorRouting(AODV) 73 5.2.3 DynamicSourceRouting 74 5.3 RoutinginWirelessSensorandActuatorNetworks 75 5.3.1 DirectedDiffusion 75 5.3.2 SensorProtocolsforInformationviaNegotiation (SPIN) 76 5.3.3 Low-EnergyAdaptiveClusteringHierarchy (LEACH) 76 5.3.4 Power-AwareMany-to-ManyRouting(PAMR) 77 5.4 ReviewQuestions 79 6Reliability,FlowandCongestionControl 81 6.1 Reliability 81 6.1.1 Non-Acknowledgement-BasedSchemes 83 6.1.2 Acknowledgement-BasedSchemes 84 6.2 FlowandCongestionControl 85 6.3 ReviewQuestions 88 7OtherChallengesandSecurityAspects 89 7.1 LocalizationandPositioning 89 7.2 TimeSynchronization 93 7.3 Addressing 95 7.4 DataAggregationandFusion 96 7.5 DataQuerying 97 7.5.1 DatabaseApproach 97 7.5.2 TaskSets 99 7.5.3 OtherData-QueryingSchemes 99 7.6 Coverage 100 7.7 MobilityManagement 101 7.8 Cross-layerDesign 102 7.9 ReviewQuestions 103 x Contents PartTwo SecurityinWirelessAdHoc,SensorandMeshNetworking 105 8SecurityAttacksinAdHoc,SensorandMeshNetworks 107 8.1 SecurityAttacks 107 8.1.1 PassiveAttacks 107 8.1.2 ActiveAttacks 109 8.2 Attackers 117 8.3 SecurityGoals 119 8.4 ReviewQuestions 119 9Cryptography 121 9.1 SymmetricEncryption 121 9.2 AsymmetricEncryption 127 9.3 HashFunctionsandMessageAuthenticationCode 131 9.4 CascadingHashing 136 9.4.1 HashChains 137 9.4.2 HashTrees 137 9.4.3 TESLA 138 9.5 ReviewQuestions 140 10ChallengesandSolutions:BasicIssues 143 10.1BootstrappingSecurityinAdHocNetworks 144 10.2BootstrappingSecurityinSensorNetworks 145 10.3KeyDistribution,ExchangeandManagement 146 10.3.1 Standards 147 10.3.2 ClassificationofKeyManagementSchemes 147 10.3.3 ContributorySchemes 148 10.3.4 DistributiveSchemes 153 10.4AuthenticationIssues 171 10.5Integrity 171 10.6ReviewQuestions 172 11ChallengesandSolutions:Protection 173 11.1PrivacyandAnonymity 173 11.2IntrusionDetection 174 11.2.1 ArchitecturesforIDSinWirelessAdHocNetworks 175 11.3DefenseAgainstTrafficAnalysis 177 11.4AccessControlandSecureHuman–ComputerInteraction 177 11.5Software-BasedAnti-TamperTechniques 179 11.5.1 EncryptionWrappers 180 11.5.2 CodeObfuscation 181 11.5.3 SoftwareWatermarkingandFingerprinting 181 11.5.4 Guarding 182 11.6TamperResilience:HardwareProtection 183 11.7AvailabilityandPlausibility 184 11.8ReviewQuestions 185 Contents xi 12SecureRouting 187 12.1DefenseAgainstSecurityAttacksinAdHocRouting 187 12.1.1 TechniquesAgainstWormholeAttacks 188 12.1.2 TechniquesAgainstSybilAttacks 189 12.1.3 TechniquesAgainstSelectiveForwarding 189 12.1.4 SecureRoutinginSensorNetworks 190 12.1.5 RoutingSchemesThatEnhanceSecurity 191 12.2SecureAdHocRoutingProtocols 192 12.2.1 Intrusion-TolerantRoutinginWirelessSensorNetworks (INSENS) 193 12.2.2 AuthenticatedRoutingforAdHocNetworking(ARAN) 195 12.2.3 On-DemandSecureAdHocRouting(ARIADNE) 197 12.2.4 WatchdogPathrater 199 12.2.5 SecureAdHocOn-DemandDistanceVector(SAODV) 199 12.2.6 SecureLinkStateRoutingProtocol(SLSP) 200 12.3FurtherReading 201 12.4ReviewQuestions 202 13SpecificChallengesandSolutions 203 13.1SPINS:SecurityProtocolsforSensorNetworks 203 13.1.1 SNEP 204 13.1.2 μTESLA 205 13.2QuarantineRegionSchemeforSpamAttacks 205 13.3SecureChargingandRewardingScheme 209 13.3.1 EstablishingaSession 210 13.3.2 PacketDelivery 211 13.3.3 AcknowledgingDelivery 212 13.3.4 TerminatingaSession 212 13.4SecureNodeLocalization 213 13.4.1 DetectionofMaliciousBeaconNodesandReplayedBeacon Signals 213 13.4.2 Attack-ResistantLocationEstimation 215 13.5SecureTimeSynchronization 216 13.6SecureEventandEventBoundaryDetection 217 13.6.1 Stage1:DetectionofFaultyNodes 217 13.6.2 Stage2:DetectionofEventBoundaryNodes 219 13.6.3 Stage3:ImprovementofEventBoundaryNode Detection 220 13.7ReviewQuestions 220 14InformationOperationsandElectronicWarfare 221 14.1ElectronicSupport 223 14.2ElectronicAttack 224 14.3ElectronicProtection 225 14.4ReviewQuestions 225 xii Contents 15Standards 227 15.1X.800andRFC2828 227 15.1.1 SecurityThreatsandAttacks 227 15.1.2 SecurityServices 228 15.1.3 SecurityMechanisms 230 15.1.4 RelationshipsbetweenSecurityServicesandMechanisms 231 15.1.5 PlacementsofSecurityServicesandMechanisms 231 15.2WiredEquivalentPrivacy(WEP) 231 15.2.1 HowDoesWEPWork? 231 15.2.2 WEPWeaknesses 236 15.3Wi-FiProtectedAccess(WPA) 239 15.3.1 HowDoesWPAWork? 239 15.3.2 WEPandWPAComparison 242 15.3.3 WPA2 242 References 245 Index