21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents<br />

1 Introduction 1<br />

1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br />

1.2 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . 2<br />

1.3 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br />

1.4 Thesis Outl<strong>in</strong>e . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />

2 <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> and Their Security 7<br />

2.1 Applications of <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> . . . . . . . . . . . 9<br />

2.1.1 Surveillance . . . . . . . . . . . . . . . . . . . . . . . 9<br />

2.1.2 Context Awareness . . . . . . . . . . . . . . . . . . . 10<br />

2.1.3 Other Applications . . . . . . . . . . . . . . . . . . . 11<br />

2.1.4 Security Concerns . . . . . . . . . . . . . . . . . . . 11<br />

2.2 <strong>Sensor</strong> Node Characteristics . . . . . . . . . . . . . . . . . . 13<br />

2.2.1 Computational Resources . . . . . . . . . . . . . . . 14<br />

2.2.2 Composition . . . . . . . . . . . . . . . . . . . . . . 15<br />

2.2.3 Infrastructure . . . . . . . . . . . . . . . . . . . . . . 16<br />

2.2.4 Topology . . . . . . . . . . . . . . . . . . . . . . . . 18<br />

2.2.5 Connectivity . . . . . . . . . . . . . . . . . . . . . . 19<br />

2.2.6 Network Size . . . . . . . . . . . . . . . . . . . . . . 19<br />

2.2.7 Tamper Resistance . . . . . . . . . . . . . . . . . . . 20<br />

2.2.8 Further Assumptions . . . . . . . . . . . . . . . . . . 21<br />

2.3 Related Network Types . . . . . . . . . . . . . . . . . . . . . 21<br />

2.3.1 Ad Hoc <strong>Networks</strong> . . . . . . . . . . . . . . . . . . . 22<br />

2.3.2 Personal Area <strong>Networks</strong> . . . . . . . . . . . . . . . . 24<br />

2.3.3 Peer-to-Peer <strong>Networks</strong> . . . . . . . . . . . . . . . . . 25<br />

2.4 Related Device Types . . . . . . . . . . . . . . . . . . . . . . 26<br />

2.4.1 Smartcards . . . . . . . . . . . . . . . . . . . . . . . 26<br />

2.4.2 RFID . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />

2.4.3 Embedded Computers . . . . . . . . . . . . . . . . . 29<br />

2.5 <strong>Sensor</strong> Network Models . . . . . . . . . . . . . . . . . . . . 31<br />

2.5.1 The Geometric Model of <strong>Sensor</strong> <strong>Networks</strong> . . . . . . 31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!