Thursday 13 November 2008

Intrusion Detection forWireless Sensor Networks

A WSN consists of a large set of tiny sensor nodes. Sensor nodes can perform
sensing, data processing, and communicating but with limited power,
computational capacities, small memory size, and low bandwidth. Unlike
MANETs, the senor nodes in WSNs are usually static after deployment, and
communicate mainly through broadcast instead of point-to-point communication.
Sensor networks have been used in a variety of domains, such as
military sensing in a battlefield, perimeter defense in critical area such as
airport, intrusion detection for traditional communication network, disasters
monitoring, and home healthcare. Obviously, some applications are
security-critical, which attract many researchers’ attention to secure a sensor
network. Some security protocols or mechanisms have been designed
for sensor network. For example, SPINS, a set of protocols, provides secure
data confidentiality, two-party data authentication, and data freshness and
authenticated broadcast for sensor network.15 LEAP, a localized encryption
and authentication protocol, is designed to support in-network processing
based on the different security requirements for different types of message
exchange. INSENS is an intrusion-tolerant routing protocol for WSNs.17
A lightweight security protocol relying solely on broadcasts of end-to-end
encrypted packets. However, in a sensor network,
as a complicated system, there are always some vulnerabilities to be
attacked.

Reference:Wireless Ad hoc Networking by Shih-Lin Wu & Yu-Chee Tseng

Wireless Ad Hoc Networking
Author:Chang Guang University, Tao-Yuan, Taiwan National Chiao-Tung University, Hsin-Chu, Taiwan
Reader Reviews

What a Techie needs to Understand wireless5
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks by Shih-Lin Wu and Yu-Chee Tseng (Wireless Networks and Mobile Communications: Auerbach) The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday life as we know it.
By integrating these technologies into a pervasive system, we can access information and use computing resources anytime, anywhere, and with any device. Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks covers these key technologies used in wireless ad hoc networks. The book is divided into three parts, each providing self-contained chapters written by international experts. Topics include networking architectures and protocols, cross-layer architectures, localization and location tracking, time synchronization, QoS and real-time, security and dependability, applications, modeling and performance evaluation, implementation and experience, and much more.
The book is novel in its single source presentation of ad hoc networking and its key technologies and applications over the platforms of personal-area, sensory-area, and local-area networks. It is a valuable resource for those who work in or are interested in learning about the pervasive computing environment.
Features:
* Covers key technologies in wireless and ad hoc networks for personal-area, local-area, and sensory-area networks
* Presents state-of-the-art research and developments by an international team of experts
* Explores topics from networking architectures and protocols to implementation experience and measurements

No comments: