تُنشَرْ شبكات الحساسات اللاسلكية في بيئات معادية, و تستعمل في التطبيقات الحرجة مثل مراقبة ساحة المعركة و المراقبة الطبية، لذا فإن ضعف الأمن يعد مصدر قلق كبير. إن القيود الصارمة على مصادر شبكات الحساسات اللاسلكية تجعل من الضروري البحث عن حلول أمنية مع الأخذ بالحسبان تلك المصادر.
يعد البروتوكول المدروس (Implicit Geographic Forwarding Protocol) (IGF) عديم الحالة، أي أنه لا يحوي جدول توجيه و لا يعتمد على معرفة طوبولوجيا الشبكة أو على وجود أو غياب أحد العقد من شبكة الحساسات اللاسلكية. طُوِّرَ هذا البروتوكول بتقديم مجموعة من الآليات لزيادة الأمن فيه. بحيث تبقي على ميزات ديناميكية الربط, و تؤمن دفاعات فعالة ضد الهجمات المحتملة. أمنت هذه الآليات التصدي لعدة هجمات منها هجوم الثقب الأسود و هجوم سايبل و هجوم إعادة الارسال, و لكن المشكلة كانت في عدم قدرة الآليات السابقة على التصدي للهجوم الفيزيائي.
يتناول هذا البحث دراسة مفصلة للبروتوكول SIGF-2 و تقترح تحسيناً له. يتضمن التحسين استخدام مفهوم معرفة الانتشار ضمن خوارزمية مجموعة المفاتيح العشوائية في إدارة المفاتيح للتصدي للهجوم الفيزيائي. و قد أثبت نتائج المحاكاة من خلال مجموعة من البارامترات أن الاقتراح المقدم قد حسن من أداء الخوارزمية المدروسة.
Wireless Sensor Networks (WSNs) are deployed in adversarial environments and
used for critical applications such as battle field surveillance and medical monitoring, then
security weaknesses become a big concern. The severe resource constraints of WSNs give
rise to the need for resource bound security solutions.
The Implicit Geographic Forwarding Protocol (IGF) is considered stateless, which
means that it does not contain any routing tables and does not depend on the knowledge of
the network topology, or on the presence or absence of the node in WSN. This protocol is
developed to provide a range of mechanisms that increase security in IGF. Thus it keeps
the dynamic connectivity features and provides effective defenses against potential attacks.
These mechanisms supported the security against several attacks as Black hole, Sybil and
Retransmission attacks, but the problem was the inability of mechanisms to deal with
physical attack.
This research deals with a detailed study of the SIGF-2 protocol and proposes an
improvement for it, in which we use the concept of deployment knowledge from random
key pool algorithm of keys management to defend against physical attack . The evaluation
of simulation results, with different parameters, proved that our proposal had improved the
studied protocol.
References used
(J.Sen, "A Survey on Wireless Sensor Network Security", International Journal of Communication Networks and Information Security (IJCNIS) , USA , 1(2): 55-74, August (2009
(A.Erring , R.Szewczyk , V.Wen, D.Culler,.J.D. Tygar , " SPINS: Security Protocols for Sensor Networks" , Intel Research Berkely, USA , Vol.9,No.2, April (2001
(L.Mcgrath , C.weiss , " Wireless Sensor Networks Security" , CS-591 Fundamentals of Computer and Network Security, Colorado.(2005
Mobile Wireless Sensor Network (MWSN) is an emerging technology for attraction of
researchers with its research advantage and various application domains. Due to limited
resources of sensor nodes such as transmission power, communication capability
The low cost, ease of deployment has exposed WSNs an attractive choice for numerous applications,like environmental monitoring applications , security applications, real time tracking, and so on.
But in reality, these networks are operated on batte
Many wireless sensor network applications like forest fire detection and environment
monitoring recommend making benefit from moving humans, vehicles, or animals to
enhance network performance. In this research, we had improved our previous protoco
Many wireless sensor network applications like forest fire detection and environment monitoring recommend making benefit from moving humans, vehicles, or animals to enhance network performance. In this research, we had improved our previous protocol
The location of wireless sensor nodes located in the center is necessary for applications
where information about the site is important information such as security, protection,
object tracking and other applications.
localization algorithms are c