无线传感器网络中移动元件的受控路径遍历

Baris Tas, A. Tosun
{"title":"无线传感器网络中移动元件的受控路径遍历","authors":"Baris Tas, A. Tosun","doi":"10.1109/ICCCN.2013.6614119","DOIUrl":null,"url":null,"abstract":"Mobile elements (MEs) have been used to improve the scalability and the performance of wireless sensor networks (WSNs). In most of these approaches, the ME traverses an area of interest with a pre- determined path set by the basestation (BS) and is trusted to follow the determined path. This assumption is not realistic since the ME carries essential information about the network making it appealing to various attackers. An ME can be captured and can be used to deceive the BS. As a result, further protocols are required to verify the path travelled by the ME. In this paper, we propose two protocols to control the path of a semi-trusted ME using cryptographic methods including Message Authentication Code (MAC), and hash chains. First protocol collects node encounter information with MACs and allows the BS to construct an approximate path using this information. Density of the nodes and the broadcast range play an important role in the quality of the constructed path. Second protocol enforces a strict path using hash chains. The ME helps the sensors verify a hash chain in a distributed manner and deviation from the path results in breaking the chain. We believe these protocols will serve as a first step to a model where the ME has to prove all of its actions to the BS.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Controlled Path Traversal for a Mobile Element in Wireless Sensor Networks\",\"authors\":\"Baris Tas, A. Tosun\",\"doi\":\"10.1109/ICCCN.2013.6614119\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile elements (MEs) have been used to improve the scalability and the performance of wireless sensor networks (WSNs). In most of these approaches, the ME traverses an area of interest with a pre- determined path set by the basestation (BS) and is trusted to follow the determined path. This assumption is not realistic since the ME carries essential information about the network making it appealing to various attackers. An ME can be captured and can be used to deceive the BS. As a result, further protocols are required to verify the path travelled by the ME. In this paper, we propose two protocols to control the path of a semi-trusted ME using cryptographic methods including Message Authentication Code (MAC), and hash chains. First protocol collects node encounter information with MACs and allows the BS to construct an approximate path using this information. Density of the nodes and the broadcast range play an important role in the quality of the constructed path. Second protocol enforces a strict path using hash chains. The ME helps the sensors verify a hash chain in a distributed manner and deviation from the path results in breaking the chain. We believe these protocols will serve as a first step to a model where the ME has to prove all of its actions to the BS.\",\"PeriodicalId\":207337,\"journal\":{\"name\":\"2013 22nd International Conference on Computer Communication and Networks (ICCCN)\",\"volume\":\"120 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 22nd International Conference on Computer Communication and Networks (ICCCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCN.2013.6614119\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2013.6614119","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

移动元素(MEs)已被用于提高无线传感器网络(WSNs)的可扩展性和性能。在大多数这些方法中,ME使用由基站(BS)设置的预先确定的路径遍历感兴趣的区域,并被信任遵循确定的路径。这种假设是不现实的,因为ME携带有关网络的基本信息,使其对各种攻击者具有吸引力。ME可以被捕获并用来欺骗BS。因此,需要进一步的协议来验证ME所经过的路径。在本文中,我们提出了两个协议来控制一个半可信的ME的路径使用加密方法,包括消息认证码(MAC)和哈希链。第一个协议收集节点与mac的相遇信息,并允许BS使用这些信息构建一个近似路径。节点的密度和广播范围对构建的路径质量起着重要的作用。第二个协议使用哈希链强制执行严格的路径。ME帮助传感器以分布式的方式验证哈希链,偏离路径将导致链断裂。我们相信,这些协议将成为ME必须向BS证明其所有行动的模型的第一步。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Controlled Path Traversal for a Mobile Element in Wireless Sensor Networks
Mobile elements (MEs) have been used to improve the scalability and the performance of wireless sensor networks (WSNs). In most of these approaches, the ME traverses an area of interest with a pre- determined path set by the basestation (BS) and is trusted to follow the determined path. This assumption is not realistic since the ME carries essential information about the network making it appealing to various attackers. An ME can be captured and can be used to deceive the BS. As a result, further protocols are required to verify the path travelled by the ME. In this paper, we propose two protocols to control the path of a semi-trusted ME using cryptographic methods including Message Authentication Code (MAC), and hash chains. First protocol collects node encounter information with MACs and allows the BS to construct an approximate path using this information. Density of the nodes and the broadcast range play an important role in the quality of the constructed path. Second protocol enforces a strict path using hash chains. The ME helps the sensors verify a hash chain in a distributed manner and deviation from the path results in breaking the chain. We believe these protocols will serve as a first step to a model where the ME has to prove all of its actions to the BS.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信