SOS: Sensoriamento Overlay Seguro em Redes de Sensores Sem Fio Hierárquicas

  • Leonardo B. Oliveira UNICAMP
  • Antonio A. F. Loureiro UFMG
  • Ricardo Dahab UNICAMP
  • Hao Chi Wong Palo Alto Research Center

Resumo


Este artigo apresenta o Sensoriamento Overlay Seguro (SOS). O SOS constrói uma Rede Overlay (RO) sobre uma Rede de Sensor Sem Fio (RSSF). Ao estabelecer e monitorar rotas alternativas, o SOS é capaz de encontrar rotas mais seguras que as fornecidas pelo protocolo de roteamento padrão. Os resultados indicam que o SOS é: 1) eficaz no aumento da taxa de entrega de mensagens em redes sob ataques de negação de serviço e 2) eficiente em termos de consumo de energia. Até onde sabemos, o SOS é o primeiro mecanismo de segurança baseado em ROs para RSSFs.

Referências

Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38(4):393–422.

Andersen, D., Balakrishnan, H., Kaashoek, F., and Morris, R. (2001). Resilient Overlay Networks. In The 8th ACM Symposium on Operating Systems Principles (SOSP’01), pages 131–145, Banff, CA.

Bohge, M. and Trappe, W. (2003). An authentication framework for hierarchical ad hoc sensor networks. In 2003 ACM workshop on Wireless security, pages 79–87.

Boukerche, A., Pazzi, R. W. N., and Araujo, R. B. (2004). A fast and reliable protocol for wireless sensor networks in critical conditions monitoring applications. In the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems (MSWiM ’04), pages 157–164, New York, NY, USA. ACM Press.

Capkun, S. and Hubaux, J.-P. (2003). Biss: building secure routing out of an incomplete set of security associations. In ACM workshop on Wireless security (WISE’03), pages 21–29. ACM Press.

de Oliveira, S., Wong, H. C., and Nogueira, J. M. S. (2005). Nekap: Estabelecimento de chaves resiliente a intrusos em rssf. In 23º Simposio Brasileiro de Redes de Computadores (SBRC’05).

Deng, J., Han, R., and Mishra, S. (2003). A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In IPSN, volume 2634 of Lecture Notes in Comp. Science, pages 349–364. Springer.

Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., and Khalili, A. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security. Also appeared in 10th ACM CCS ’03.

Eschenauer, L. and Gligor, V. D. (2002). A key management scheme for distributed sensor networks. In 9th ACM conference on Computer and communications security (CCS’03), pages 41–47. ACM Press.

Estrin, D., Govindan, R., Heidemann, J. S., and Kumar, S. (1999). Next century challenges: Scalable coordination in sensor networks. In Mobile Computing and Networking, pages 263–270, Seattle, WA.

Fall, K. and Varadhan, K. (2001). Network Simulator Notes and Documentation. The VINT Project.

Ferreira, A. C., Vilaça, M. A., Oliveira, L. B., Habib, E., Wong, H. C., and Loureiro, A. A. F. (2005). On the security of cluster-based communication protocols for wireless sensor networks. In 4th IEEE International Conference on Networking (ICN’05), volume 3420 of Lecture Notes in Computer Science, pages 449–458, Reunion Island.

Ganesan, D., Govindan, R., Shenker, S., and Estrin, D. (2001). Highly-resilient, energy-efficient multipath routing in wireless sensor networks. In 2nd ACM international symposium on Mobile ad hoc networking & computing (MobiHoc’01), pages 251–254, New York, NY, USA. ACM Press.

Gura, N., Patel, A., Wander, A., Eberle, H., and Shantz, S. C. (2004). Comparing elliptic curve cryptography and rsa on 8-bit cpus. In CHES, pages 119–132.

Heinzelman, W. R., Chandrakasan, A., and Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In IEEE Hawaii Int. Conf. on System Sciences, pages 4–7.

Hill, J. L. and Culler, D. E. (2002). Mica: A wireless platform for deeply embedded networks. IEEE Micro, 22(6):12–24.

Intanagonwiwat, C., Govindan, R., and Estrin, D. (2000). Directed diffusion: a scalable and robust communication paradigm for sensor networks. In Proceedings of the sixth annual international conference on Mobile computing and networking, pages 56–67, Boston, MA USA.

Karlof, C. and Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2–3):293–315.

Kong, J., Luo, H., Xu, K., Gu, D. L., Gerla, M., and Lu, S. (2002). Adaptive Security for Multi-layer Ad-hoc Networks. Wireless Communications and Mobile Computing, Wiley Interscience Press, 2(5):533–547. Special Issue.

Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., and Culler, D. (2004). TinyOS: An operating system for wireless sensor networks. In Weber, W., Rabaey, J., and Aarts, E., editors, Ambient Intelligence. Springer-Verlag, New York, NY.

Liu, D., Ning, P., and Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1):41–77. Also appeared in CCS ’03.

Lou, W., Liu, W., and Fang, Y. (2004). Spread: Enhancing data confidentiality in mobile ad hoc networks. In INFOCOM.

Marti, S., Giuli, T. J., Lai, K., and Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255–265.

Melo, E. J. D. and Liu, M. (2002). The effect of organization on energy consumption in wireless sensor networks. In IEEE Globecom 2002.

Oliveira, L. B., Wong, H. C., Bern, M., Dahab, R., and Loureiro, A. A. F. (2006). SecLEACH – a random key distribution solution for securing clustered sensor networks. In 5th IEEE International Symposium on Network Computing and Applications (NCA’06), Cambridge,MA,USA. to appear.

Oliveira, L. B., Wong, H. C., Bern, M., Habib, E., Loureiro, A. A. F., and Dahab, R. (2005a). SecLEACH uma solução segura de distribuição de chaves para redes de sensores sem fio hierárquicas. In V Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBSeg’05), Brazil.

Oliveira, L. B., Wong, H. C., and Loureiro, A. A. F. (2005b). LHA-SP: Secure protocols for hierarchical wireless sensor networks. In 9th IFIP/IEEE International Symposium on Integrated Network Management (IM’05), pages 31–44, Nice, France.

Papadimitratos, P. and Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS’ 02), pages 193–204.

Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521–534. Also appeared in MobiCom’01.

Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11):612–613.

Staddon, J., Balfanz, D., and Durfee, G. (2002). Efficient tracing of failed nodes in sensor networks. In the 1st ACM international workshop on Wireless sensor networks and applications, pages 122–130.

Wood, A. and Stankovic, J. (2002). Denial of service in sensor networks. IEEE Computer, 35(10):54–62.

Zhou, L. and Haas, Z. J. (1999). Securing ad hoc networks. IEEE Network, 13(6):24–30.

Zhu, S., Setia, S., and Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In 10th ACM conference on Computer and communication security, pages 62–72.
Publicado
28/08/2006
OLIVEIRA, Leonardo B.; LOUREIRO, Antonio A. F.; DAHAB, Ricardo; WONG, Hao Chi. SOS: Sensoriamento Overlay Seguro em Redes de Sensores Sem Fio Hierárquicas. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 6. , 2006, Santos. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2006 . p. 58-71. DOI: https://doi.org/10.5753/sbseg.2006.20939.

Artigos mais lidos do(s) mesmo(s) autor(es)

<< < 1 2 3 4 5 6 7 > >>