Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

Robust Networking Architecture and Secure communication scheme for Heterogeneous wireless sensor Networks McKenzie mcneal ll Ph. D Candidate for Computer Information Systems Engineering Advisor: dr. Wei chen College of Engineering, Technology, and Computer Science March 15th 2012
Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks McKenzie McNeal III Ph.D. Candidate for Computer & Information Systems Engineering Advisor: Dr. Wei Chen College of Engineering, Technology, and Computer Science March 15th, 2012 1

Outline o Research Background and challenges 口 Problem statement a Research Goal and objectives 口 Key related Work a Conceptual and Preliminary Design a Detailed Design and Implementation Robust networking architecture Secure communication scheme a System Evaluation and Test results Evaluation of robust networking architecture Analysis of secure communication scheme 口 Benchmarking o Conclusion recommendations
Outline ❑ Research Background and Challenges ❑ Problem Statement ❑ Research Goal and Objectives ❑ Key Related Work ❑ Conceptual and Preliminary Design ❑ Detailed Design and Implementation ➢ Robust networking architecture ➢ Secure communication scheme ❑ System Evaluation and Test Results ➢ Evaluation of robust networking architecture ➢ Analysis of secure communication scheme ❑ Benchmarking ❑ Conclusion & Recommendations 2

Research Background Wireless Sensor Networks(WSNS a Large collection of small wireless devices with the ability to sense, process, and transmit data Low-end node L-node ow cost solution to distributed applications Milita CiⅤ ilian Limited resources 88=2(: Power 9: Storage Processing H-node Communication Unreliable communication Unattended operation Operate autonomously Heterogerkhousoyaneleas Sisde Nesermsdr NEWSk O Homogeneous or Heterogeneous
Research Background – Wireless Sensor Networks (WSNs) ❑ Large collection of small wireless devices with the ability to sense, process, and transmit data. ➢ Low cost solution to distributed applications • Military • Civilian ➢ Limited resources • Power • Storage • Processing • Communication ➢ Unreliable communication ➢ Unattended operation • Operate autonomously ❑ Homogeneous or Heterogeneous 3 Low-end node (L-node) Homogeneous Wireless Sensor Network H H H High-end node (H-node) Low-end node (L-node) Heterogeneous Wireless Sensor Network (HWSN)

Research Background Security concerns for WsNs a General security concerns for communication networks Data needs to be protected Unauthorized access Protection against various attacks a Specific security concerns for WSNs Resource constraints do not support traditional security methods Attacks can drain network resources Uncontrollable/hostile environment
❑ General security concerns for communication networks ➢ Data needs to be protected ➢ Unauthorized access ➢ Protection against various attacks ❑ Specific security concerns for WSNs ➢ Resource constraints do not support traditional security methods ➢ Attacks can drain network resources ➢ Uncontrollable/hostile environment 4 Research Background – Security Concerns for WSNs

Research Challenges a Network Infrastructure Reliability and availability High performance Leverage security tasks a Secured data communication Data confidentiality, integrity, freshness authentication WSNS do not support traditional security methods Function in presence of node compromise
Research Challenges ❑ Network Infrastructure ➢ Reliability and availability ➢ High performance ➢ Leverage security tasks ❑ Secured Data Communication ➢ Data confidentiality, integrity, freshness & authentication ➢ WSNs do not support traditional security methods ➢ Function in presence of node compromise 5

Key Related Work Reference Network Security Model Limitations Arc hitecture LIGER Flat hws Hybrid key management scheme .Large numbers of (LIGER) keys stored and key .Unbalanced key distribution exchanges LION-standalone key mgmt Increased node .TIGER-KDC based key mgmt compromise with increased key storas Kejie lu Flat hWsn 2 key management schemes Large numbers of Random key pool-based pre keys stored and key distribution exchanges Polynomial-based pre-distribution enei Du-Scheme Hierarchical Key management scheme .Location dependent egion-based .C-neighbor concept network architecture HWSN ECC supports exchange of symmetric No energy analysis for secure routing
Key Related Work 6 Reference Network Architecture Security Model Limitations LIGER Flat HWSN Hybrid key management scheme (LIGER) •Unbalanced key distribution •LION-standalone key mgmt. •TIGER-KDC based key mgmt. •Large numbers of keys stored and key exchanges •Increased node compromise with increased key storage Kejie Lu Flat HWSN 2 key management schemes •Random key pool-based predistribution •Polynomial-based pre-distribution •Large numbers of keys strored and key exchanges •No analysis for energy usage Du-Scheme Hierarchical Region-based HWSN Key management scheme •C-neighbor concept •ECC supports exchange of symmetric key •Location dependent network architecture •No energy analysis for secure routing

Key Related Work(cont d) Summary of limitations a No security oriented network hierarchy a Random key pre-distribution schemes encounter the key exchange Issue Large storage of pre-loaded keys Large number of key exchanges O Localization information needed for establishing network architecture O No energy analysis for secure routing a Resilience against node compromise w/o tamper resistant hardware
Key Related Work (cont’d) Summary of Limitations ❑ No security oriented network hierarchy ❑ Random key pre-distribution schemes encounter the key exchange issue ➢ Large storage of pre-loaded keys ➢ Large number of key exchanges ❑ Localization information needed for establishing network architecture ❑ No energy analysis for secure routing ❑ Resilience against node compromise w/o tamper resistant hardware 7

Problem statement Novel security methods and models are needed for hwsns to function in the presence of an attack. Heterogeneity provides hierarchy that leverages resource efficient security tasks This dissertation research focuses on developing a robust networking architecture and secure communication scheme with an efficient key management system and secure routing protocol
Problem Statement Novel security methods and models are needed for HWSNs to function in the presence of an attack. Heterogeneity provides hierarchy that leverages resource efficient security tasks. This dissertation research focuses on developing a robust networking architecture and secure communication scheme with an efficient key management system and secure routing protocol. 8

Research Goal and obiectives Goal Address security challenges and develop a robust networking architecture and secure communication scheme for HWSNS with resource saving key management system and provide secure data communication and resilience against node compromise Obiectives a Define and develop robust hierarchical heterogeneous networking architecture a Design secure communication scheme based on the defined hierarchical hws Key management system Cryptographic algorithms Secure and efficient routing protocol a Test and evaluate robust networking architecture and secure communication scheme
Research Goal and Objectives Goal Address security challenges and develop a robust networking architecture and secure communication scheme for HWSNs with resource saving key management system and provide secure data communication and resilience against node compromise. Objectives ❑ Define and develop robust hierarchical heterogeneous networking architecture ❑ Design secure communication scheme based on the defined hierarchical HWSN ➢ Key management system ➢ Cryptographic algorithms ➢ Secure and efficient routing protocol ❑ Test and evaluate robust networking architecture and secure communication scheme 9

Conceptual Design Security system that integrates a robust networking architecture an d secure communication scheme for hwsns Securit System for HWSNS Robust Secure Networking Communication Architecture Scheme
Conceptual Design Security system that integrates a robust networking architecture and secure communication scheme for HWSNs 10 Security System for HWSNs Secure Communication Scheme Robust Networking Architecture
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 中国科学技术大学:《算法基础》课程教学资源(PPT课件讲稿)第五讲 概率分析与随机算法.pptx
- 同济大学:《大数据分析与数据挖掘 Big Data Analysis and Mining》课程教学资源(PPT课件讲稿)Data Preprocessing.ppt
- 《编译原理与技术》课程教学资源(PPT课件讲稿)运行环境.ppt
- 华南理工大学:神经计算的生理和动力学指标(PPT讲稿).ppt
- 中国科学技术大学:《嵌入式操作系统 Embedded Operating Systems》课程教学资源(PPT课件讲稿)第七讲 存储器管理.ppt
- 中国科学技术大学:《网络信息安全 NETWORK SECURITY》课程教学资源(PPT课件讲稿)Windows 操作系统.ppt
- 《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第四章 Java图形用户界面设计 4.3 事件处理.pptx
- 南京航空航天大学:《C++》课程电子教案(PPT课件讲稿)第2章 文件操作.pptx
- MSC Software Corporation:Dynamic System Modeling, Simulation, and Analysis Using MSC.EASY5(Introductory Class).ppt
- 南京大学:《面向对象技术 OOT》课程教学资源(PPT课件讲稿)构件化软件 Component Software.ppt
- 新乡学院:《PHP动态网站开发》课程教学资源(教学大纲).pdf
- 《Android 程序设计基础》课程教学资源(PPT课件讲稿)第8章 数据存储和访问.ppt
- 《高级软件工程》课程教学大纲 Advanced Software Engineering.doc
- 南京大学:《计算机图形学》课程教学资源(PPT课件讲稿)第6讲 图形观察与几何变换.pptx
- 《数据结构》课程教学资源(PPT课件讲稿)第六章 树与二叉树.ppt
- 烟台大学:《C语言程序设计》课程电子教案(PPT课件讲稿)第五章 数组、字符串、指针(主讲:荆蕾).ppt
- 《模式识别》课程教学资源(PPT讲稿)Learning with information of features.ppt
- 合肥工业大学:使用大数据进行计算建模(PPT讲稿)Computing/Modeling with Big Data(主讲:吴信东).pptx
- 人工神经网络(ANN)方法简介(PPT课件讲稿).ppt
- 清华大学:《数据中心网络 Data Center Networking》课程教学资源(PPT课件讲稿).pptx
- 《数据结构》课程教学资源(PPT讲稿)二叉树和二叉搜索树 Trees, Binary Trees, and Binary Search Trees.ppt
- 《网页设计与制作》课程PPT教学课件(Fireworks Mx 2004)第九章 Firework图像处理.ppt
- 西安交通大学:《微机原理与接口技术》课程教学资源(PPT课件讲稿)第4章 存储器系统接口.ppt
- 《计算机网络基础》课程PPT教学课件(讲稿)第4章 IP协议.ppt
- 大连理工大学:《计算机网络》课程教学资源(PPT课件讲稿)Chapter 1 Introduction(roadmap,主讲:孙伟峰).ppt
- 《数据库系统概论》课程教学资源(PPT课件讲稿)数据结构实用教程(共十章).ppt
- 上海交通大学:《程序设计》课程教学资源(PPT课件讲稿)第7章 间接访问——指针.ppt
- 编译程序构造 COMPILER CONSTRUCTION(PPT讲稿)原理与实践 Principles and Practice.ppt
- 《3ds Max 9》教学资源(PPT课件)第8章 灯光、摄影机、渲染输出.ppt
- 《运筹学与最优化方法》课程教学资源(PPT课件讲稿)第十章 智能优化计算简介.ppt
- 东北大学:《可信计算基础》课程教学资源(PPT课件讲稿)第五讲 分布式系统的安全(主讲:周福才).ppt
- 《电脑组装与维护实例教程》教学资源(PPT课件讲稿)第14章 系统的维护.ppt
- 《PHP程序设计》教学资源(PPT课件讲稿)项目七 Ajax商品发布.ppt
- 《计算机网络》课程教学资源(PPT课件讲稿)第六章 传输层.ppt
- 《计算机系统安全》课程PPT教学课件(信息安全与管理)第九章 防火墙.ppt
- 同济大学:《大数据分析与数据挖掘 Big Data Analysis and Mining》课程教学资源(PPT课件讲稿)Getting to Know Your Data.ppt
- 香港浸会大学:Computer Security(PPT课件讲稿)Cryptography Chapter 1 Symmetric Ciphers.ppt
- 《计算机文化基础》课程教学资源(PPT课件讲稿)第九章 多媒体技术基础.ppt
- 数据挖掘10大算法产生过程(PPT讲稿).ppt
- 清华大学:高校信息化建设理论与规划(PPT讲稿).ppt