120 likes | 457 Views
Securing Wireless Sensor Networks. Cheyenne Hollow Horn SFS Presentation 2005. Presentation Outline. Wireless Sensor Networks (WSN) Security for WSN Implementation Conclusion. Wireless Sensor Networks. What is a WSN? Nodes Beacons Base Station. Wireless Sensor Networks. Applications
E N D
Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005
Presentation Outline • Wireless Sensor Networks (WSN) • Security for WSN • Implementation • Conclusion
Wireless Sensor Networks • What is a WSN? • Nodes • Beacons • Base Station
Wireless Sensor Networks • Applications • Military • Medical • Advantages • Deployment • Disposability • Size
Securing WSN • Requirements • Data Confidentiality • Data Authentication • Data Integrity • Data Freshness
Sensor Network Encryption Protocol • Encryption keys • Semantic security • Counter used to encrypt message differently • Never repeats • Message Authentication Code
Implementation • Time of Arrival method • Ultrasonic transducers • TinyOS • MatLab • MicaZ
Sensor Field Layout Beacon Beacon Node Node Node Node Node Base Station Connected to PC Beacon
Conclusion • Setting up WSN • Implementing security