Εντοπίστηκε ένα σφάλμα στη λειτουργία της ΠΥΞΙΔΑΣ όταν χρησιμοποιείται μέσω του προγράμματος περιήγησης Safari. Μέχρι να αποκατασταθεί το πρόβλημα, προτείνουμε τη χρήση εναλλακτικού browser όπως ο Chrome ή ο Firefox. A bug has been identified in the operation of the PYXIDA platform when accessed via the Safari browser. Until the problem is resolved, we recommend using an alternative browser such as Chrome or Firefox.
 

Authentication in Mobile Sensor Networks

dc.contributor.degreegrantinginstitutionAthens University of Economics and Business, Department of Informaticsen
dc.contributor.opponentMitrou, Lilianen
dc.contributor.thesisadvisorMarias, Giannisen
dc.creatorKanelli, Charisen
dc.creatorΚανέλλη, Χάριςel
dc.date.accessioned2025-04-02T10:46:05Z
dc.date.available2025-04-02T10:46:05Z
dc.date.issued28-02-2014
dc.description.abstractWireless sensor networks (WSNs) is an area of great interest to both academia and industry. WSNs raise a large number of military, industrial, scientific, civilian and commercial applications to another level, allowing cost effective sensing, especially where human observation or traditional sensors would be undesirable, inefficient, expensive, or dangerous. Even from their earliest applications, sensor networks have been targeted for attack by adversaries with interest in intercepting the data being sent, or in reducing the ability of the network to carry out its mission. There are a lot of possible attacks against WSNs, which have different objectives, are performed at different levels, and result in different consequences. Wireless sensors have limited energy and computational capabilities, making many traditional security methodologies difficult or impossible to be utilized. Also, they are often deployed in open unattended areas, allowing physical attacks such as jamming, node capture and tampering. On the other hand, logical attacks include the HELLO flooding attack, the Sybil attack, the sinkhole attack, the wormhole attack, the blackhole attack, and the Distributed Denial of Service (DDoS) attack. Significant research effort is done to address all these problems. However, providing a security countermeasure for every possible attack would result in a huge security overhead, which is difficult to afford and would overwhelm the scarce resources available on sensor nodes. Despite the extensive scientific research, there is no standard procedure to help developers to choose the appropriate security scheme for their applications. The scale of deployment of a wireless sensor network requires careful decisions and trade-offs among various security measures. Sensor Network Security (SNS) is a growing field of research that presents researchers with challenging goals under tight design constraints. The need for creative and innovative security protocols is clear, since current security mechanisms are too resource intensive in terms of power, memory and processing capabilities of sensor network nodes. hus, before trying to design a secure communication mechanism, it is vital to properly study and understand the WSN architecture, the hardware and software specifications of the sensor nodes, the deployment environment, the production cost, the advantages and mostly the limitations, which could influence the WSN design. In this framework was this thesis elaborated. Particular emphasis is given to the security requirement of authentication. Before allowing a node to access real-time data from another sensor node, authentication must be ensured. The proposed scheme provides mutual authentication of the sensor nodes, with the use of sinusoidal functions which operate as pseudorandom number generators, keeping in mind the nodes’ limited computational, power and communication capabilities.en
dc.format.extent59p.
dc.identifier.urihttps://pyxida.aueb.gr/handle/123456789/11705
dc.languageen
dc.rightsAttribution 4.0 Internationalen
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subjectΠληροφορίαel
dc.subjectΛογισμικόel
dc.subjectΑσφάλεια δεδομένωνel
dc.subjectΒιομηχανίαel
dc.subjectInformationen
dc.subjectData securityen
dc.subjectSoftwareen
dc.subjectIndustryen
dc.titleAuthentication in Mobile Sensor Networksen
dc.typeText

Αρχεία

Πρωτότυπος φάκελος/πακέτο

Τώρα δείχνει 1 - 1 από 1
Φόρτωση...
Μικρογραφία εικόνας
Ονομα:
Kanelli_2014.pdf
Μέγεθος:
1.25 MB
Μορφότυπο:
Adobe Portable Document Format