Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick.

Similar presentations


Presentation on theme: "1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick."— Presentation transcript:

1 1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick Key Crytograpy RoutingSupport specialized traffic pattern. Cannot afford to have too many node states and packet overhead Support any node pairs Some source routing and distance vector protocol incur heavy control traffic ResourceTigher resources (power, processor speed, bandwidth) Not as tight.

2 2 cs526 chow Deal With Mischieving/Selfish Nodes Marti [21] and Buchegger and Boudec [22] suggest Punishment Reporting Holding Grudges vulnerable to blackmailers. Marti [21] and Buchegger and Boudec [22] suggest Punishment Reporting Holding Grudges vulnerable to blackmailers.

3 3 cs526 chow SPIN: A Suite of Security Protocol for Sensor Networks By Adrian Perrig et al at UC Berkeley. Wireless Networks, 8, 521- 534,2003. Two Security Building Blocks: SNEP (Secure Network Encryption Protocol): –Provide data confidentiality, two-party data authentication, evidence of data freshness.  TESLA (micro version of TELSA) TELSA: Timed Efficient Stream Loss-Tolerant Authentication Protocol –Authenticated broadcast for resource constrained environment. –Source authentication; data not modified en route. –Use symmetric crypto function (Message Authentication Code MAC function) By Adrian Perrig et al at UC Berkeley. Wireless Networks, 8, 521- 534,2003. Two Security Building Blocks: SNEP (Secure Network Encryption Protocol): –Provide data confidentiality, two-party data authentication, evidence of data freshness.  TESLA (micro version of TELSA) TELSA: Timed Efficient Stream Loss-Tolerant Authentication Protocol –Authenticated broadcast for resource constrained environment. –Source authentication; data not modified en route. –Use symmetric crypto function (Message Authentication Code MAC function)


Download ppt "1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick."

Similar presentations


Ads by Google