Secure and continuous management of heterogeneous ad hoc networks

A. Durresi, V. Bulusu, V. Paruchuri, L. Barolli
{"title":"Secure and continuous management of heterogeneous ad hoc networks","authors":"A. Durresi, V. Bulusu, V. Paruchuri, L. Barolli","doi":"10.1109/AINA.2006.298","DOIUrl":null,"url":null,"abstract":"Addition of new nodes to a sensor network is a fundamental requirement for their continuity operation over time. We analyze the weakening of security due to node capture when adding sensor nodes using key predistribution schemes with \"fixed\" key pools. We have also developed an approach, which provides a significant improvement in security after multiple deployments through the use of multiple key pools, strong nodes and actors. These strong nodes are used as bridges between nodes of various deployments. To achieve better connectivity we use nodes of varying capabilities with the connectivity being a function of the quality of nodes available. We also explore the role that can be played by actors in enhancing connectivity.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2006.298","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

Addition of new nodes to a sensor network is a fundamental requirement for their continuity operation over time. We analyze the weakening of security due to node capture when adding sensor nodes using key predistribution schemes with "fixed" key pools. We have also developed an approach, which provides a significant improvement in security after multiple deployments through the use of multiple key pools, strong nodes and actors. These strong nodes are used as bridges between nodes of various deployments. To achieve better connectivity we use nodes of varying capabilities with the connectivity being a function of the quality of nodes available. We also explore the role that can be played by actors in enhancing connectivity.
异构自组织网络的安全和持续管理
向传感器网络添加新节点是其随时间连续运行的基本要求。我们分析了当使用带有“固定”密钥池的密钥预分配方案添加传感器节点时,由于节点捕获而导致的安全性削弱。我们还开发了一种方法,通过使用多个密钥池、强节点和参与者,在多次部署后显著提高了安全性。这些强节点用作各种部署的节点之间的桥梁。为了实现更好的连接性,我们使用不同功能的节点,连接性是可用节点质量的函数。我们还探讨了各方在加强互联互通方面可以发挥的作用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信