Security1. @
@
mahsanmokhtari83@gmail.com
mahsanmokhtari83@gmail.com
2. > @ @
> > @ @> >
. > > @
. < @
@ > >
. >
2
3. > @ @
. > @ @ > @ @
> > @ > @ >> > @
> < > @ >
> > > @ > @ > @
. > @ >>
> <> > @
@ > @ > >. @
> > > > @> >
> < > < @>
. >
3
4. @ @
E B
C A
D
Sensor nodes
Sensor field
User 4
5. @
> > @ @
@ . > > >
>> @ <
>> > > < . >
.
@ @ @ > < @
< > > >
Parent
.
5
6. @
>> @ > @ > >>
.> > >
> > <> @>
@ . @
.
6
@ >
7. @
. > > @ @ @ >
> > > »
. «
@ @ > @
. > .
< @ @> > @
. > > >
7
8. @ >
>
> @ @
>
>
>
>
@
>
8
9. @ @ @
>> >
>>
>>
@ >
>
(Secure Range-In depended Localization) SeRLoc >
µTESLA 9
10. @ >>
>
Sybil
Wormhole
Black hole/Sinkhole
>
>
>
>
Hello Flood
>> @ 10
11. (DOS)
> > < >. @ > >
> @> > > > > >
> .
.>
>> @ < >
> <@ @ >.
. @ >@
> <@ @ > <DoS >
> @ > <
.>
11
12. DOS
> > >
- @ > - @ -
@ - >
>
> >
>
@ >
@ >
> - - >
> - -
@
( ) 12
13. (DOS)
> > < @ >>
> > < >.
. < @ > > > > @
. :>> > > > >
> > >
.> >
> @ >> < >
> <
13
14. SYBIL
> " sybil
.>> ">
@ > @ >
> sybil < @ @ . >
> <@ @ < > > < @
.
sybil > < @ >@ @ > > @
@ > >< . @ @
.> sybil <
. >
14
15. SYBIL
Sybil > <ad hoc <
.
@ @ > <> @ >
. > @
> >. > >
> @
.
@ > > > Sybil
. Sybil @ . >
15
16. SYBIL
F Z
Y
B
A
E B
C
X
Sybil Node
16
C
17. SYBIL
<Sybil > >@
. >
> « » :> > > > @ >
= >
< > « » >
. >
17
18. > > > >
. > @ @
> >< >
.
> > > > <> > @
.? > < > >
18
19. . > < >>
. <> >
< > >> @
. > > >
@ @ < >
@ @ @ >
. > @>
> < >@ @ >
. > < @ >
19
22. < > > > @ @ >> >
.
> > @
@ > >. @
. @ @
> < @
@ >< . > > > > > >
> < >
. @
. > > > > > 22
24. > @ > @
. >
@ >
@ > >> <
. >
> > < > @> >
. >
24
25. HELLO FLOOD
@ > > @ > Hello @
. >
> > > > < >
> > @ @> Hello @
< . <
. >
@ < > > >
> > > <
.
25
26. > @ > < >
< >> >. >
. > @>
< > >
> < . > > ><
.>
< > @> @ > @ > @ >
> @ > > > @
. < >
26
27. WORMHOLE
> @ <wormhole
@ .> @ >
.> > >
<> @ @
> > > @
.> >
27
28. WORMHOLE
Attacker
B Z B Z
Wormhole link
Y Y
28
29. WORMHOLE
Hass <Dahill < ad hoc @ @ <wormhole >
> @ @ < > >@ . Hu
.
@ < @ > @ >> @
RF > . wormhole >
. watermarking
wormhole < @ > @ > @>
@ < > @ @ . @
. >>
>@ > @
. <
29
31. - >= @
DES,3DES,RC5,AES = @
>
@ @ >
LEAP
>
Elliptic Curve Cryptography(ECC) @ @
31
32. @
ECC RSA
@ > > @ @ <ECC 160 @
. > RSA 1024
. RSA > > ECC > @
32
33. - >@ >
Agree on E , G
Alice chooses random KA TA = KA * G Bob chooses random KB
TB = KB * G
Compute KB * TA
Compute KA * TB
Agree on G * KB * KA 33