SecOverlay – Redes Overlay sobre Redes de Sensores Sem Fio para Transmissão Segura de Dados

  • Leonardo B. Oliveira UNICAMP
  • Eduardo Habib UFMG
  • Daniel Camara UFMG
  • Hao Chi Wong PARC
  • Antonio A. F. Loureiro UFMG
  • Ricardo Dahab UNICAMP

Resumo


Este trabalho avalia o uso de redes overlay (ROs) para segurança em Redes de Sensores Sem Fio (RSSFs). Os resultados preliminares da pesquisa indicam que para ataques comuns como blackhole e selective forwarding as ROs podem prevenir, respectivamente, a perda de 35,9% e 18,6%, das mensagens prioritárias em redes com 5% de nós atacantes.

Referências

Deborah Estrin, Ramesh Govindan, John S. Heidemann, and Satish Kumar. Next century challenges: Scalable coordination in sensor networks. In Mobile Computing and Networking, pages 263-270, Seattle, WA USA, 1999.

A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, October 2002.

C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2-3):293-315, September 2003.

David Andersen, Hari Balakrishnan, Frans Kaashoek, and Robert Morris. Resilient Overlay Networks. In The 8th ACM Symposium on Operating Systems Principles (SOSP'01), pages 131-145, Banff, CA, Oct. 2001.

Enrique J. Duarte Melo and Mingyan Liu. The effect of organization on energy consumption in wireless sensor networks. In IEEE Globecom 2002, November 2002.

W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In IEEE Hawaii Int. Conf. on System Sciences, pages 4-7, january 2000.

A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521-534, September 2002.

S. Zhu, S. Setia, and S. Jajodia. Leap: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM conference on Computer and communication security, pages 62-72. ACM Press, 2003.

J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu. Adaptive Security for Multi-layer Ad-hoc Networks. Wireless Communications and Mobile Computing, Wiley Interscience Press, 2(5):533-547, 2002. Special Issue.

M. Bohge and W. Trappe. An authentication framework for hierarchical ad hoc sensor networks. In Proceedings of the 2003 ACM workshop on Wireless security, pages 79-87. ACM Press, 2003.

A. C. Ferreira, M. A. Vilaça, L. B. Oliveira, E. Habib, H. C. Wong, and A. A. Loureiro. On the security of cluster-based communication protocols for wireless sensor networks. In 4th IEEE International Conference on Networking (ICN'05), volume 3420 of Lecture Notes in Computer Science, pages 449-458, Reunion Island, April 2005. Springer.

Leonardo B. Oliveira, Hao Chi Wong, and Antonio A. F. Loureiro. Lha-sp: Secure protocols for hierarchical wireless sensor networks. In 9th IFIP/IEEE International Symposium on Integrated Network Management (IM'05), pages 31-44, Nice, France, May 2005.

A. Keromytis, V. Misra, and D. Rubenstein. Sos: An architecture for mitigating ddos attacks. IEEE Journal on Selected Areas of Communications (JSAC), 33(3):413-426, 2004. Special issue on Service Overlay Networks.

Jun Li, Peter L. Reiher, and Gerald J. Popek. Resilient Self-Organizing Overlay Networks for Security Update Delivery. IEEE Journal on Selected Areas in Communications, 22(1):189-204, Jan. 2004.
Publicado
26/09/2005
Como Citar

Selecione um Formato
OLIVEIRA, Leonardo B.; HABIB, Eduardo; CAMARA, Daniel; WONG, Hao Chi; LOUREIRO, Antonio A. F.; DAHAB, Ricardo. SecOverlay – Redes Overlay sobre Redes de Sensores Sem Fio para Transmissão Segura de Dados. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 5. , 2005, Florianópolis. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2005 . p. 166-169. DOI: https://doi.org/10.5753/sbseg.2005.21545.

Artigos mais lidos do(s) mesmo(s) autor(es)

<< < 1 2 3 4 5 6 > >>