Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Security

736 views

Published on

Published in: Education
  • Be the first to comment

Security

  1. 1. @ @mahsanmokhtari83@gmail.commahsanmokhtari83@gmail.com
  2. 2. > @ @> > @ @> > . > > @ . < @ @ > > . > 2
  3. 3. > @ @. > @ @ > @ @> > @ > @ >> > @ > < > @ > > > > @ > @ > @ . > @ >> > <> > @@ > @ > >. @ > > > > @> > > < > < @> . > 3
  4. 4. @ @ E B C A D Sensor nodes Sensor fieldUser 4
  5. 5. @> > @ @ @ . > > > >> @ < >> > > < . > .@ @ @ > < @ < > > > Parent . 5
  6. 6. @>> @ > @ > >> .> > >> > <> @> @ . @ . 6 @ >
  7. 7. @. > > @ @ @ > > > > » . « @ @ > @. > . < @ @> > @ . > > > 7
  8. 8. @ > >> @ @ > > > > @ > 8
  9. 9. @ @ @ >> > >> >> @ > >(Secure Range-In depended Localization) SeRLoc > µTESLA 9
  10. 10. @ >> > Sybil WormholeBlack hole/Sinkhole > > > > Hello Flood >> @ 10
  11. 11. (DOS)> > < >. @ > > > @> > > > > > > . .> >> @ < > > <@ @ >. . @ >@ > <@ @ > <DoS > > @ > < .> 11
  12. 12. DOS > > >- @ > - @ - @ - > > > > > @ > @ > > - - > > - - @ ( ) 12
  13. 13. (DOS) > > < @ >> > > < >. . < @ > > > > @ . :>> > > > > > > > .> >> @ >> < > > < 13
  14. 14. SYBIL > " sybil .>> "> @ > @ > > sybil < @ @ . > > <@ @ < > > < @ . sybil > < @ >@ @ > > @ @ > >< . @ @.> sybil < . > 14
  15. 15. SYBIL Sybil > <ad hoc < . @ @ > <> @ > . > @ > >. > > > @ .@ > > > Sybil . Sybil @ . > 15
  16. 16. SYBIL F Z Y B AE B C X Sybil Node 16 C
  17. 17. SYBIL <Sybil > >@ . > > « » :> > > > @ > = >< > « » > . > 17
  18. 18. > > > > . > @ @ > >< > .> > > > <> > @ .? > < > > 18
  19. 19. . > < >> . <> >< > >> @ . > > >@ @ < > @ @ @ > . > @> > < >@ @ > . > < @ > 19
  20. 20. BLACK HOLE/SINK HOLE > . @ @ > < > > > @ . > . < > @ > >. > >@ @ >@ < 20
  21. 21. BLACK HOLE B AttackerBase Station 21
  22. 22. < > > > @ @ >> > . > > @ @ > >. @ . @ @ > < @@ >< . > > > > > > > < > . @ . > > > > > 22
  23. 23. > > . .. @ . . 23
  24. 24. > @ > @ . > @ >@ > >> < . > > > < > @> > . > 24
  25. 25. HELLO FLOOD@ > > @ > Hello @ . > > > > > < > > > @ @> Hello @ < . < . > @ < > > > > > > < . 25
  26. 26. > @ > < > < >> >. > . > @> < > >> < . > > >< .> < > @> @ > @ > @ > > @ > > > @ . < > 26
  27. 27. WORMHOLE > @ <wormhole@ .> @ > .> > > <> @ @ > > > @ .> > 27
  28. 28. WORMHOLE AttackerB Z B Z Wormhole link Y Y 28
  29. 29. WORMHOLEHass <Dahill < ad hoc @ @ <wormhole > > @ @ < > >@ . Hu . @ < @ > @ >> @RF > . wormhole > . watermarking wormhole < @ > @ > @> @ < > @ @ . @ . >> >@ > @ . < 29
  30. 30. WORMHOLE wormhole> > 30
  31. 31. - >= @ DES,3DES,RC5,AES = @ > @ @ > LEAP >Elliptic Curve Cryptography(ECC) @ @ 31
  32. 32. @ ECC RSA@ > > @ @ <ECC 160 @ . > RSA 1024 . RSA > > ECC > @ 32
  33. 33. - >@ > Agree on E , GAlice chooses random KA TA = KA * G Bob chooses random KB TB = KB * G Compute KB * TA Compute KA * TB Agree on G * KB * KA 33
  34. 34. BROADCASTING & MULTICASTING @ @ 34
  35. 35. 35
  36. 36. 36
  37. 37. 37Multicasting
  38. 38. 38Broadcasting
  39. 39. ... 39

×