• Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
473
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
2
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. @ @mahsanmokhtari83@gmail.commahsanmokhtari83@gmail.com
  • 2. > @ @> > @ @> > . > > @ . < @ @ > > . > 2
  • 3. > @ @. > @ @ > @ @> > @ > @ >> > @ > < > @ > > > > @ > @ > @ . > @ >> > <> > @@ > @ > >. @ > > > > @> > > < > < @> . > 3
  • 4. @ @ E B C A D Sensor nodes Sensor fieldUser 4
  • 5. @> > @ @ @ . > > > >> @ < >> > > < . > .@ @ @ > < @ < > > > Parent . 5
  • 6. @>> @ > @ > >> .> > >> > <> @> @ . @ . 6 @ >
  • 7. @. > > @ @ @ > > > > » . « @ @ > @. > . < @ @> > @ . > > > 7
  • 8. @ > >> @ @ > > > > @ > 8
  • 9. @ @ @ >> > >> >> @ > >(Secure Range-In depended Localization) SeRLoc > µTESLA 9
  • 10. @ >> > Sybil WormholeBlack hole/Sinkhole > > > > Hello Flood >> @ 10
  • 11. (DOS)> > < >. @ > > > @> > > > > > > . .> >> @ < > > <@ @ >. . @ >@ > <@ @ > <DoS > > @ > < .> 11
  • 12. DOS > > >- @ > - @ - @ - > > > > > @ > @ > > - - > > - - @ ( ) 12
  • 13. (DOS) > > < @ >> > > < >. . < @ > > > > @ . :>> > > > > > > > .> >> @ >> < > > < 13
  • 14. SYBIL > " sybil .>> "> @ > @ > > sybil < @ @ . > > <@ @ < > > < @ . sybil > < @ >@ @ > > @ @ > >< . @ @.> sybil < . > 14
  • 15. SYBIL Sybil > <ad hoc < . @ @ > <> @ > . > @ > >. > > > @ .@ > > > Sybil . Sybil @ . > 15
  • 16. SYBIL F Z Y B AE B C X Sybil Node 16 C
  • 17. SYBIL <Sybil > >@ . > > « » :> > > > @ > = >< > « » > . > 17
  • 18. > > > > . > @ @ > >< > .> > > > <> > @ .? > < > > 18
  • 19. . > < >> . <> >< > >> @ . > > >@ @ < > @ @ @ > . > @> > < >@ @ > . > < @ > 19
  • 20. BLACK HOLE/SINK HOLE > . @ @ > < > > > @ . > . < > @ > >. > >@ @ >@ < 20
  • 21. BLACK HOLE B AttackerBase Station 21
  • 22. < > > > @ @ >> > . > > @ @ > >. @ . @ @ > < @@ >< . > > > > > > > < > . @ . > > > > > 22
  • 23. > > . .. @ . . 23
  • 24. > @ > @ . > @ >@ > >> < . > > > < > @> > . > 24
  • 25. HELLO FLOOD@ > > @ > Hello @ . > > > > > < > > > @ @> Hello @ < . < . > @ < > > > > > > < . 25
  • 26. > @ > < > < >> >. > . > @> < > >> < . > > >< .> < > @> @ > @ > @ > > @ > > > @ . < > 26
  • 27. WORMHOLE > @ <wormhole@ .> @ > .> > > <> @ @ > > > @ .> > 27
  • 28. WORMHOLE AttackerB Z B Z Wormhole link Y Y 28
  • 29. WORMHOLEHass <Dahill < ad hoc @ @ <wormhole > > @ @ < > >@ . Hu . @ < @ > @ >> @RF > . wormhole > . watermarking wormhole < @ > @ > @> @ < > @ @ . @ . >> >@ > @ . < 29
  • 30. WORMHOLE wormhole> > 30
  • 31. - >= @ DES,3DES,RC5,AES = @ > @ @ > LEAP >Elliptic Curve Cryptography(ECC) @ @ 31
  • 32. @ ECC RSA@ > > @ @ <ECC 160 @ . > RSA 1024 . RSA > > ECC > @ 32
  • 33. - >@ > Agree on E , GAlice chooses random KA TA = KA * G Bob chooses random KB TB = KB * G Compute KB * TA Compute KA * TB Agree on G * KB * KA 33
  • 34. BROADCASTING & MULTICASTING @ @ 34
  • 35. 35
  • 36. 36
  • 37. 37Multicasting
  • 38. 38Broadcasting
  • 39. ... 39