• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Security
 

Security

on

  • 607 views

 

Statistics

Views

Total Views
607
Views on SlideShare
607
Embed Views
0

Actions

Likes
0
Downloads
2
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Security Security Presentation Transcript

    • @ @mahsanmokhtari83@gmail.commahsanmokhtari83@gmail.com
    • > @ @> > @ @> > . > > @ . < @ @ > > . > 2
    • > @ @. > @ @ > @ @> > @ > @ >> > @ > < > @ > > > > @ > @ > @ . > @ >> > <> > @@ > @ > >. @ > > > > @> > > < > < @> . > 3
    • @ @ E B C A D Sensor nodes Sensor fieldUser 4
    • @> > @ @ @ . > > > >> @ < >> > > < . > .@ @ @ > < @ < > > > Parent . 5
    • @>> @ > @ > >> .> > >> > <> @> @ . @ . 6 @ >
    • @. > > @ @ @ > > > > » . « @ @ > @. > . < @ @> > @ . > > > 7
    • @ > >> @ @ > > > > @ > 8
    • @ @ @ >> > >> >> @ > >(Secure Range-In depended Localization) SeRLoc > µTESLA 9
    • @ >> > Sybil WormholeBlack hole/Sinkhole > > > > Hello Flood >> @ 10
    • (DOS)> > < >. @ > > > @> > > > > > > . .> >> @ < > > <@ @ >. . @ >@ > <@ @ > <DoS > > @ > < .> 11
    • DOS > > >- @ > - @ - @ - > > > > > @ > @ > > - - > > - - @ ( ) 12
    • (DOS) > > < @ >> > > < >. . < @ > > > > @ . :>> > > > > > > > .> >> @ >> < > > < 13
    • SYBIL > " sybil .>> "> @ > @ > > sybil < @ @ . > > <@ @ < > > < @ . sybil > < @ >@ @ > > @ @ > >< . @ @.> sybil < . > 14
    • SYBIL Sybil > <ad hoc < . @ @ > <> @ > . > @ > >. > > > @ .@ > > > Sybil . Sybil @ . > 15
    • SYBIL F Z Y B AE B C X Sybil Node 16 C
    • SYBIL <Sybil > >@ . > > « » :> > > > @ > = >< > « » > . > 17
    • > > > > . > @ @ > >< > .> > > > <> > @ .? > < > > 18
    • . > < >> . <> >< > >> @ . > > >@ @ < > @ @ @ > . > @> > < >@ @ > . > < @ > 19
    • BLACK HOLE/SINK HOLE > . @ @ > < > > > @ . > . < > @ > >. > >@ @ >@ < 20
    • BLACK HOLE B AttackerBase Station 21
    • < > > > @ @ >> > . > > @ @ > >. @ . @ @ > < @@ >< . > > > > > > > < > . @ . > > > > > 22
    • > > . .. @ . . 23
    • > @ > @ . > @ >@ > >> < . > > > < > @> > . > 24
    • HELLO FLOOD@ > > @ > Hello @ . > > > > > < > > > @ @> Hello @ < . < . > @ < > > > > > > < . 25
    • > @ > < > < >> >. > . > @> < > >> < . > > >< .> < > @> @ > @ > @ > > @ > > > @ . < > 26
    • WORMHOLE > @ <wormhole@ .> @ > .> > > <> @ @ > > > @ .> > 27
    • WORMHOLE AttackerB Z B Z Wormhole link Y Y 28
    • WORMHOLEHass <Dahill < ad hoc @ @ <wormhole > > @ @ < > >@ . Hu . @ < @ > @ >> @RF > . wormhole > . watermarking wormhole < @ > @ > @> @ < > @ @ . @ . >> >@ > @ . < 29
    • WORMHOLE wormhole> > 30
    • - >= @ DES,3DES,RC5,AES = @ > @ @ > LEAP >Elliptic Curve Cryptography(ECC) @ @ 31
    • @ ECC RSA@ > > @ @ <ECC 160 @ . > RSA 1024 . RSA > > ECC > @ 32
    • - >@ > Agree on E , GAlice chooses random KA TA = KA * G Bob chooses random KB TB = KB * G Compute KB * TA Compute KA * TB Agree on G * KB * KA 33
    • BROADCASTING & MULTICASTING @ @ 34
    • 35
    • 36
    • 37Multicasting
    • 38Broadcasting
    • ... 39