IP기반 무선 네트워크를 위한 통합 시큐리티 프레임워크
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | 김기형, 홍석교 | - |
dc.contributor.author | 라비아 리아즈 | - |
dc.date.accessioned | 2018-11-08T06:57:53Z | - |
dc.date.available | 2018-11-08T06:57:53Z | - |
dc.date.issued | 2009-02 | - |
dc.identifier.other | 9421 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/handle/2018.oak/4583 | - |
dc.description | 학위논문(박사)--아주대학교 일반대학원 :전자공학과,2009. 2 | - |
dc.description.tableofcontents | ACKNOWLEDGEMENT II ABSTRACT IV LIST OF FIGURES XII LIST OF TABLES XIV LIST OF ACRONYMS XV 1-INTRODUCTION 2 1.1 Motivation 2 1.2 Overview of contributions 4 1.3 Organization of thesis 5 2-6 LOWPAN SECURITY ANALYSIS 7 2.1. IEEE 802.15.4 Standard 7 2.2 6LowPan; IPv6 over LoWPAN 11 2.2.1 Adaptation Layer 14 2.3. 6LowPAN constraints 14 2.4. Applications and Scenarios 15 2.4.1 Industrial monitoring 16 2.4.2 Structural monitoring 16 2.4.3 Health Care 16 2.4.4 Home automation 17 2.4.5 Vehicle Telemetric 17 2.4.6 Agriculture monitoring 18 2.4.7 Disaster Management 18 2.5. Security Goals of 6LowPan 18 2.5.1 Confidentiality 19 2.5.2 Integrity 19 2.5.3 Authentication: 20 2.5.4 Availability 20 2.5.5 End-to-End Security 22 2.5.6 Key Management 22 2.5.7 Malicious Node Detection Mechanism 23 2.5.8 Node Revocation Mechanism 23 2.6. Attacks on 6LowPAN networks 24 2.6.1 hardware Compromise 24 2.6.2 Software Compromise 25 2.6.3 Message Interruption 25 2.6.4 Message Interception 26 2.6.5 Fabrication and Modification of Message 26 2.6.7 Node Replication Attack 26 2.6.8 Passive information gathering 27 2.6.9 Battery Exhaustion Attacks 27 2.6.10 Routing Attacks 27 2.6.11 Security Threats due to IP layer 29 2.7. Security Analysis of Current 6LoWPAN Security Standards 31 2.7.1 Security Analysis of 802.15.4 MAC 31 2.7.2 Security Analysis of IP Layer 34 2.8 Summary 36 3- 6LOWPAN SECURITY FRAMEWORK 37 3.1 Network Model 37 3.2 Smart Home Scenario 40 3.2.1 Application Features 41 3.2.2 6LoWPAN Applicability and Requirements: 42 3.3 Trust Model 43 3.4 Threat Model 44 3.5 Security Framework 44 3.6 Security Framework Implementation 49 3.6.1 Low security Requirements: 49 3.6.2 Security Critical Applications: 50 4- AUTHENTICATION PROTOCOL FOR 6LOWPAN 51 4.1 INTRODUCTION 51 4.2 LITERATURE REVIEW 53 4.2.1 Authentication in IEEE 802.15.4 53 4.2.2 μ_TESLA (SPINS) 54 4.2.3 Extensible Authentication Protocol 55 4.2.4 Distributed bi-directional authentication for WSN 58 4.3 Terminologies used in Authentication Protocol 58 4.4 6LoWPAN Authentication 60 4.5 Two Step Authentication Protocol for 6LoWPAN 61 5- KEY MANGEMENT IN WIRELESS SENSOR NETWORKS 68 5.1 Key Management Process 70 5.1.1 Key analysis 71 5.1.2 Key Assignment 71 5.1.3 Key Generation 71 5.1.4 Key Distribution and re-distribution 72 5.2 Public key cryptography in WSN's 72 5.2.1 Elliptic Curve Cryptography 73 5.3 Classification of Key Management schemes in sensor networks 75 5.4 Key management protocols for WSN's 76 5.4.1 Probabilistic approaches 77 5.4.2 Deterministic approaches 80 5.4.3 Location Based approaches 82 5.4.4 hierarchical schemes 84 5.5 Summary 90 6- A UNIFYING KEY MANAGEMENT FRAMEWORK FOR WIRELESS SENSOR NETWORKS. 92 6.1 Network Model 93 6.2 proposed Framework 96 6.2.1 SACK: Storage And Communication optimized Keying framework for wireless sensor networks 96 6.2.2 SACK-P (SACK Public) 103 6.2.3 SACK-H SACK Hybrid 104 6.3 Post Deployment Operations 107 6.3.1 Scalability 107 6.3.2 Key Connectivity 108 6.3.2 Revocation 109 6.3.4 Resilience 111 6.3.5 Mobility 112 6.4 Communication Scenarios 113 6.5 Robustness of proposed Schemes against Security Attacks 117 6.5.1 Passive information gathering 118 6.5.2 Man-in-the-Middle attack 119 6.5.3 Sybil Attack 119 6.5.4 Node Replication Attack 119 6.6 Summary 120 7- PRO-ACTIVE KEY REVOCATION PROTOCOL 121 7.1 Introduction 121 7.2 Literature Survey 121 7.3 Node Revocation 122 7.4 TASER Operation 125 8- PERFORMANCE EVALUATION 127 8.1 Memory Analysis 128 8.2 Communication Overhead 129 8.3 Time Analysis 130 8.4 Energy Analysis 133 8.5 Comparison with other schemes 137 8.6 Hardware Implementation using MICA Motes 139 8.6.1 SACK-P Time and Power Analysis 140 8.6.2 SACK-H Time and Power Analysis 142 8.6.3 Comparisons 143 8.7 Discussion 145 9- CONCLUSION AND FUTURE RESEARCH ISSUES 148 | - |
dc.language.iso | eng | - |
dc.publisher | The Graduate School, Ajou University | - |
dc.rights | 아주대학교 논문은 저작권에 의해 보호받습니다. | - |
dc.title | IP기반 무선 네트워크를 위한 통합 시큐리티 프레임워크 | - |
dc.title.alternative | Rabia Riaz | - |
dc.type | Thesis | - |
dc.contributor.affiliation | 아주대학교 일반대학원 | - |
dc.contributor.alternativeName | Rabia Riaz | - |
dc.contributor.department | 일반대학원 전자공학과 | - |
dc.date.awarded | 2009. 2 | - |
dc.description.degree | Master | - |
dc.identifier.localId | 567810 | - |
dc.identifier.url | http://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000009421 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.