SlideShare a Scribd company logo
1 of 39
Download to read offline
@




                 @
mahsanmokhtari83@gmail.com
mahsanmokhtari83@gmail.com
>                         @       @

>           >               @        @>   >
                .   >                >        @

    .                           <         @
        @       >                >
                                                      .   >




                                                              2
>                          @                   @

.                    >       @               @ >               @        @

>                >           @                        >        @ >>             > @
    >        <           >           @                    >
     >                       >           >                 @       >              @     > @
                                             .                              >         @ >>

 >                                               <> > @
@                        >                       @        >            >.                   @
     >   >                                             > >                             @> >
                         >       <                       >     <                        @>
                                                        .                               >

                                                                                                    3
@                   @



           E           B
                   C       A
               D




                       Sensor nodes
       Sensor field


User                             4
@


>                         >                     @               @
    @   .         >                   >                     >
                      >>               @                         <
                 >>    >      >             <                   .        >
                                                        .

@   @                 @           >    <            @
             <                    >     >       >
    Parent
                                                                     .


                                                                             5
@

>>             @   >       @ >          >>
                                 .> >            >

> >       <>                            @>
      @                .         @
                                             .




                                                         6

          @        >
@


.       >           >       @ @                   @         >
    >                   >             >               »
                                              .                 «



            @   @                         >       @
.               >                                               .



    <               @       @>    >               @
                    .                                 > >           >

                                                                        7
@   >

                >
>       @            @
                    >

                        >

                    >



                         >
    @
            >
                             8
@                     @ @


                                                    >> >

                                                           >>

                                                            >>

                                                     @               >

                                                                 >


(Secure Range-In depended Localization) SeRLoc       >



                                           µTESLA                        9
@            >>

                   >

             Sybil

        Wormhole

Black hole/Sinkhole
                   >
                 >

                 >

                 >

       Hello Flood

     >>      @         10
(DOS)

>       >                     <    >.        @        >               >
                    >       @>     >              >        >               > >
                              >                                  .
                                                                      .>

                             >>             @ <                            >
                            > <@        @                            >.
    .           @                                         >@


                        >     <@   @         >                   <DoS >
            >                               @ >                 <
                                                               .>

                                                                                 11
DOS

          >       >                                   >

-   @ >       -           @           -

                      @           -               >

                                                      >
                                          >               >
                                                  >

                              @                   >

                                          @           >
     >    -                   -           >

              >       -           -

                                              @

                              (               )                     12
(DOS)

                     >           >   <                 @            >>
        >                >                             <                 >.
        .                    <           @           > >   >              > @

    .                                :>>         >    >    >                    >

                 >       >                                                              >
                                                               .>          >

>           @   >>                           <             >
                                                                     >              <

                                                                                            13
SYBIL


                        >                                     "        sybil
                                                             .>>         ">

      @        >                @                                      >
     > sybil       <            @      @                     . >
                            >       <@ @ < > >       <             @
                                                         .


                         sybil >     <       @   >@            @ >     >       @
      @                >       ><        .                     @ @
.>                                                            sybil        <
               .                                 >

                                                                                   14
SYBIL


        Sybil            > <ad hoc                 <
                                                                    .

                 @                       @       >           <>         @       >
                                     .       >                 @
             >                                >.           >    >
                                                       >            @
                                                                            .

@        >           >               >                              Sybil
    .            Sybil                       @               .                  >


                                                                                    15
SYBIL




    F                   Z



            Y
                                         B
                        A
E                       B
                        C


        X
                Sybil Node
                                             16
                                     C
SYBIL


                              <Sybil       >    >@
                 .                     >

    >   «   »    :> > >                >   @         >
        =       >

<                     >           «            » >
                          .   >




                                                         17
>                >       > >
    .            >                 @     @

                                   >          ><             >
                                                .

>                >           >         > <>         >    @
            .?       >             <            >       >




                                                                 18
.            >                          <       >>
          .                       <>                                  >

<                                      >       >>                                 @
    . >               >                                               >

@       @         <                                          >
        @     @                                               @                 >
                                                     .                        > @>

    >                         <                     >@       @            >
                  .                        >             <        @           >
                                                                                      19
BLACK HOLE/SINK HOLE


                                                                 >
                                                   .

  @ @         >            <                           >
                  >            >               @           . >
                                       .

      <   >       @                >       >
. >                   >@               @       >@ <




                                                                     20
BLACK HOLE

     B
               Attacker
Base Station




                                       21
<       >            >           >           @                        @ >>                         >
                                     .

            >                    >           @
                                                 @                >                          >.        @
                                                                 .                   @            @

                             >       <                                                            @
@               ><       .       >           >                            >       > >              >
                     >                               <       >
                                                                      .       @


    .       >                                            >                           >   >                 >   22
> >
    .
        .



.




                    @

                .
            .
                          23
>               @                   >           @
                                  .    >

                        @ >
@                   >             >>        <
                          .                     >

    >   >       <             >        @>   >
            .                     >




                                                        24
HELLO FLOOD


@       >   >               @ >                Hello @
                                                   .            >

    >           >                   > >                    <            >
    >                       >          @   @>              Hello @
                        <            .      <
                                                   .                    >

                        @       <          >                        >   >
            >       >                             >         <
                                                       .


                                                                            25
>           @         >                    <                    >
    <                      >>                                         >.       >
                                                          . >                          @>


                           <                                    >          >
>           <      .                    >             >          ><
                                                     .>


            <   > @>                @           > @ >                      @                >
        >              @                                   >               > >     @
                                                 .                            <                 >




                                                                                                    26
WORMHOLE


 >                 @                   <wormhole
@     .>   @   >
                   .>         >             >

     <>                  @        @
                   >    >          >                @
                             .>                 >




                                                        27
WORMHOLE

                   Attacker




B       Z    B                   Z
                 Wormhole link



    Y                  Y



                                     28
WORMHOLE


Hass <Dahill             <            ad hoc @                @      <wormhole >
    > @              @                    <                       > >@ .         Hu
                                                                   .

     @           <                               @                >     @ >> @
RF       >   .                   wormhole            >
                             .                                         watermarking

     wormhole <                   @         >         @       >                @>
                     @                     < >       @         @        .     @
                                                                             . >>
                                                 >@                     >      @
                                       .                  <
                                                                                      29
WORMHOLE



    wormhole

>          >




               30
- >=        @
                DES,3DES,RC5,AES =      @

                                            >

                              @       @ >
                                     LEAP

                                            >
Elliptic Curve Cryptography(ECC) @      @
                                                31
@

                                   ECC    RSA

@          >    > @   @    <ECC   160 @
                       . >      RSA     1024

    .   RSA >   >           ECC > @




                                                32
- >@                  >


                             Agree on E , G


Alice chooses random KA        TA = KA * G       Bob chooses random KB




                                TB = KB * G

                                                   Compute KB * TA
  Compute KA * TB
                          Agree on G * KB * KA                    33
BROADCASTING & MULTICASTING

               @   @




                          34
35
36
37
Multicasting
38
Broadcasting
...




      39

More Related Content

Viewers also liked (6)

Firewall
FirewallFirewall
Firewall
 
تئوری آنتن های ماهوره ای
تئوری آنتن های ماهوره ایتئوری آنتن های ماهوره ای
تئوری آنتن های ماهوره ای
 
مسیریابی در شبکه حسگر بی سیم
مسیریابی در شبکه حسگر بی سیممسیریابی در شبکه حسگر بی سیم
مسیریابی در شبکه حسگر بی سیم
 
امنیت شبکه های مخابراتی
امنیت شبکه های مخابراتیامنیت شبکه های مخابراتی
امنیت شبکه های مخابراتی
 
امنیت شبکه
امنیت شبکهامنیت شبکه
امنیت شبکه
 
آشنایی با شبکه های سلولی GSM
آشنایی با شبکه های سلولی GSMآشنایی با شبکه های سلولی GSM
آشنایی با شبکه های سلولی GSM
 

Similar to Security (11)

Smart token
Smart tokenSmart token
Smart token
 
Email Security
Email SecurityEmail Security
Email Security
 
Email Security
Email SecurityEmail Security
Email Security
 
سوالات اقتصاد
سوالات اقتصادسوالات اقتصاد
سوالات اقتصاد
 
20101109 regulations carbonated soft drink iran
20101109 regulations carbonated soft drink iran20101109 regulations carbonated soft drink iran
20101109 regulations carbonated soft drink iran
 
20101109 regulations carbonated soft drink iran
20101109 regulations carbonated soft drink iran20101109 regulations carbonated soft drink iran
20101109 regulations carbonated soft drink iran
 
Proxy
ProxyProxy
Proxy
 
Ghani Khan as an Artist
Ghani Khan as an Artist Ghani Khan as an Artist
Ghani Khan as an Artist
 
دروغ پردازی های کیهان و مافیای کیهانیسم
دروغ پردازی های کیهان و مافیای کیهانیسمدروغ پردازی های کیهان و مافیای کیهانیسم
دروغ پردازی های کیهان و مافیای کیهانیسم
 
Installation method
Installation methodInstallation method
Installation method
 
Fa rahnama tasviry_ashnaey_ba_eslam الدليل المصور الموجز لفهم الإسلام فارسي
Fa rahnama tasviry_ashnaey_ba_eslam   الدليل المصور الموجز لفهم الإسلام  فارسيFa rahnama tasviry_ashnaey_ba_eslam   الدليل المصور الموجز لفهم الإسلام  فارسي
Fa rahnama tasviry_ashnaey_ba_eslam الدليل المصور الموجز لفهم الإسلام فارسي
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Security

  • 1. @ @ mahsanmokhtari83@gmail.com mahsanmokhtari83@gmail.com
  • 2. > @ @ > > @ @> > . > > @ . < @ @ > > . > 2
  • 3. > @ @ . > @ @ > @ @ > > @ > @ >> > @ > < > @ > > > > @ > @ > @ . > @ >> > <> > @ @ > @ > >. @ > > > > @> > > < > < @> . > 3
  • 4. @ @ E B C A D Sensor nodes Sensor field User 4
  • 5. @ > > @ @ @ . > > > >> @ < >> > > < . > . @ @ @ > < @ < > > > Parent . 5
  • 6. @ >> @ > @ > >> .> > > > > <> @> @ . @ . 6 @ >
  • 7. @ . > > @ @ @ > > > > » . « @ @ > @ . > . < @ @> > @ . > > > 7
  • 8. @ > > > @ @ > > > > @ > 8
  • 9. @ @ @ >> > >> >> @ > > (Secure Range-In depended Localization) SeRLoc > µTESLA 9
  • 10. @ >> > Sybil Wormhole Black hole/Sinkhole > > > > Hello Flood >> @ 10
  • 11. (DOS) > > < >. @ > > > @> > > > > > > . .> >> @ < > > <@ @ >. . @ >@ > <@ @ > <DoS > > @ > < .> 11
  • 12. DOS > > > - @ > - @ - @ - > > > > > @ > @ > > - - > > - - @ ( ) 12
  • 13. (DOS) > > < @ >> > > < >. . < @ > > > > @ . :>> > > > > > > > .> > > @ >> < > > < 13
  • 14. SYBIL > " sybil .>> "> @ > @ > > sybil < @ @ . > > <@ @ < > > < @ . sybil > < @ >@ @ > > @ @ > >< . @ @ .> sybil < . > 14
  • 15. SYBIL Sybil > <ad hoc < . @ @ > <> @ > . > @ > >. > > > @ . @ > > > Sybil . Sybil @ . > 15
  • 16. SYBIL F Z Y B A E B C X Sybil Node 16 C
  • 17. SYBIL <Sybil > >@ . > > « » :> > > > @ > = > < > « » > . > 17
  • 18. > > > > . > @ @ > >< > . > > > > <> > @ .? > < > > 18
  • 19. . > < >> . <> > < > >> @ . > > > @ @ < > @ @ @ > . > @> > < >@ @ > . > < @ > 19
  • 20. BLACK HOLE/SINK HOLE > . @ @ > < > > > @ . > . < > @ > > . > >@ @ >@ < 20
  • 21. BLACK HOLE B Attacker Base Station 21
  • 22. < > > > @ @ >> > . > > @ @ > >. @ . @ @ > < @ @ >< . > > > > > > > < > . @ . > > > > > 22
  • 23. > > . . . @ . . 23
  • 24. > @ > @ . > @ > @ > >> < . > > > < > @> > . > 24
  • 25. HELLO FLOOD @ > > @ > Hello @ . > > > > > < > > > @ @> Hello @ < . < . > @ < > > > > > > < . 25
  • 26. > @ > < > < >> >. > . > @> < > > > < . > > >< .> < > @> @ > @ > @ > > @ > > > @ . < > 26
  • 27. WORMHOLE > @ <wormhole @ .> @ > .> > > <> @ @ > > > @ .> > 27
  • 28. WORMHOLE Attacker B Z B Z Wormhole link Y Y 28
  • 29. WORMHOLE Hass <Dahill < ad hoc @ @ <wormhole > > @ @ < > >@ . Hu . @ < @ > @ >> @ RF > . wormhole > . watermarking wormhole < @ > @ > @> @ < > @ @ . @ . >> >@ > @ . < 29
  • 30. WORMHOLE wormhole > > 30
  • 31. - >= @ DES,3DES,RC5,AES = @ > @ @ > LEAP > Elliptic Curve Cryptography(ECC) @ @ 31
  • 32. @ ECC RSA @ > > @ @ <ECC 160 @ . > RSA 1024 . RSA > > ECC > @ 32
  • 33. - >@ > Agree on E , G Alice chooses random KA TA = KA * G Bob chooses random KB TB = KB * G Compute KB * TA Compute KA * TB Agree on G * KB * KA 33
  • 35. 35
  • 36. 36
  • 39. ... 39