Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Security Threats and Solutions in Wireless Ad-Hoc Sensor Networks: A Review, Papers of Computer Science

This paper review by toni farley discusses the communication security threats in wireless sensor networks (wsns) and proposes solutions based on data sensitivity levels. The authors assess common threats, identify three security levels, and introduce a location-based scheme for efficient resource management. However, the proposal faces challenges such as the need for exact node synchronization and the impracticality of knowing exact node locations for level ii security.

Typology: Papers

Pre 2010

Uploaded on 09/02/2009

koofers-user-7e6-1
koofers-user-7e6-1 🇺🇸

10 documents

1 / 1

Toggle sidebar

Related documents


Partial preview of the text

Download Security Threats and Solutions in Wireless Ad-Hoc Sensor Networks: A Review and more Papers Computer Science in PDF only on Docsity! Toni Farley CSE591 – Wireless Sensor Networks Paper Review On Communication Security in Wireless Ad-Hoc Sensor Networks Objectives of work 1. Assess communication security threats in SN 2. Separate security based on sensitivity level of data -> efficient resource management 3. Location-based scheme protects rest of network when parts are compromised Assessment of objectives 1. The authors identify common threats on a sensor network. 2. They identify three potential security levels and example data communication to be supported at each level: a. Level I (mobile code) b. Level II (location information messages) c. Level III (application specific messages) I believe the idea here is that data at the first two levels have associated threats which can allow an adversary to destroy or gain control of a sensor network. For the third level, the only threat is confidentiality (I suppose this is valid, although confidentiality is critical in some applications: military, etc.) 3. The location based scheme separates the network into hexagonal “cells” and introduces a security key based on which cell a node is in. In this way, nodes in different cells have different keys, thus if a node in one cell is compromised, the others are not. Issues I had with proposal: 1. Gaining control of one node grants access to all 3 things needed for accessing the network: Set of master keys, pseudorandom number generator and seed. 2. Node synchronization must be exact to change master keys 3. Knowledge of exact location needed for Level II is not practical if nodes are mobile 4. Since the authors state that nearly all communication messages will contain location information, the addition of Level III seems pointless. Most messages will require Level II or higher security.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved