1. INTRODUCTION
R WPAN [1] is a family of ad hoc networks for low-resource devices known by their low power
consumption, low range and low debit. To communicate, these devices implement the IEEE
802.15.4 protocol [2] in the two lower layers, i.e. data link layer and physical layer. This protocol
was designed specifically for this type of devices. It divides them into two types:
• FFD (Full Function Device) with all possible functions, must be at least one in a network, act as
a PAN coordinator or a router, can communicate with all devices within the same network.
• RFD (Reduced Function Device) with limited functions, act as a sensor or actuator, can only
communicate with FFDs.
802.15.4 defines two types of topologies: hierarchical and distributed. In hierarchical topologies
devices are placed in groups as clusters, each cluster is managed by a cluster-head. Into a
cluster, cluster-heads can communicate with each other, but devices can communicate only with
their cluster-head.
In distributed topologies, all devices contribute to the formation of the network and every one of
them can communicate with others who are within his reach.
Although LR WPAN characteristics helped greatly to the development of ubiquitous networks [3],
they have a high security issues caused by the absence of a security infrastructure. Devices do
not have sufficient resources to implement known security protocols that have proven their
effective-ness [4]. One of the security deficiencies these networks suffer from, is the easy
disclosure of exchanged information between devices into the network [5]. This information can
be used by attackers in order to disrupt the functioning of the network. Among the solutions
proposed to address this problem is the use of a specific cryptographic protocol, which respects
the specificity of LR WPAN networks, as first line defense. Most solutions in this sense choose to
deal with the hierarchical topologies because the devices are placed in an ordered manner and
well controllable [6]. Also, these solutions neglect the security of the network deployment phase,
the bootstrapping, as it takes a very little time to an attacker can intervene. This is true in a
clustered networks, but in a distributed networks bootstrapping phase takes a very important time
before the network being stabilized since the devices are placed in a disorderly manner. Securing
this phase is indispensable, devices exchange important information if they are captured by a
malicious, he can use them to attack the network.
We try to find a suitable solution to secure the bootstrap-ping phase in distributed LR WPAN. We
propose a security model based on symmetric cryptography with a specific key establishment
scheme. In the analysis part, we study the advantages of this solution in terms of its respect of:
security metrics, flexibility, scalability, and energy-efficient.
After this introduction, the structure of the rest of the pa-per is as follows: Section 2 gives a brief
overview of LR WPAN specifications, Section 3 discusses the proposed security model, and
Section 4 presents a theoretical analysis of this model in terms of energy, flexibility and security.
Finally, Section 5 concludes the paper.
1. INTRODUCTION
R WPAN [1] is a family of ad hoc networks for low-resource devices known by their low power
consumption, low range and low debit. To communicate, these devices implement the IEEE
802.15.4 protocol [2] in the two lower layers, i.e. data link layer and physical layer. This protocol
was designed specifically for this type of devices. It divides them into two types:
• FFD (Full Function Device) with all possible functions, must be at least one in a network, act as
a PAN coordinator or a router, can communicate with all devices within the same network.
• RFD (Reduced Function Device) with limited functions, act as a sensor or actuator, can only
communicate with FFDs.
802.15.4 defines two types of topologies: hierarchical and distributed. In hierarchical topologies
devices are placed in groups as clusters, each cluster is managed by a cluster-head. Into a
cluster, cluster-heads can communicate with each other, but devices can communicate only with
their cluster-head.
In distributed topologies, all devices contribute to the formation of the network and every one of
them can communicate with others who are within his reach.
Although LR WPAN characteristics helped greatly to the development of ubiquitous networks [3],
they have a high security issues caused by the absence of a security infrastructure. Devices do
not have sufficient resources to implement known security protocols that have proven their
effective-ness [4]. One of the security deficiencies these networks suffer from, is the easy
disclosure of exchanged information between devices into the network [5]. This information can
be used by attackers in order to disrupt the functioning of the network. Among the solutions
proposed to address this problem is the use of a specific cryptographic protocol, which respects
the specificity of LR WPAN networks, as first line defense. Most solutions in this sense choose to
deal with the hierarchical topologies because the devices are placed in an ordered manner and
well controllable [6]. Also, these solutions neglect the security of the network deployment phase,
the bootstrapping, as it takes a very little time to an attacker can intervene. This is true in a
clustered networks, but in a distributed networks bootstrapping phase takes a very important time
before the network being stabilized since the devices are placed in a disorderly manner. Securing
this phase is indispensable, devices exchange important information if they are captured by a
malicious, he can use them to attack the network.
We try to find a suitable solution to secure the bootstrap-ping phase in distributed LR WPAN. We
propose a security model based on symmetric cryptography with a specific key establishment
scheme. In the analysis part, we study the advantages of this solution in terms of its respect of:
security metrics, flexibility, scalability, and energy-efficient.
After this introduction, the structure of the rest of the pa-per is as follows: Section 2 gives a brief
overview of LR WPAN specifications, Section 3 discusses the proposed security model, and
Section 4 presents a theoretical analysis of this model in terms of energy, flexibility and security.
Finally, Section 5 concludes the paper.
การแปล กรุณารอสักครู่..
1 . บทนำ
R สำหรับ [ 1 ] เป็นครอบครัวของเครือข่ายเฉพาะกิจที่มีทรัพยากรอุปกรณ์ที่รู้จักกันโดยการใช้พลังงาน
ต่ำช่วงต่ำ และเดบิต ต่ำ สื่อสาร , อุปกรณ์เหล่านี้ใช้ IEEE
802.15.4 โปรโตคอล [ 2 ] ในราคา 2 ชั้น คือ ชั้นเชื่อมโยงข้อมูลและชั้นทางกายภาพ นี้ถูกออกแบบมาเฉพาะสำหรับโปรโตคอล
ของอุปกรณ์ประเภทนี้ มันแบ่งเป็นสองประเภท :
บริการ ffd ( อุปกรณ์ฟังก์ชั่นเต็ม ) กับฟังก์ชันทั้งหมดได้ ต้องมีอย่างน้อยหนึ่งในเครือข่าย ทำหน้าที่เป็นผู้ประสานงาน
กระทะหรือเราเตอร์สามารถสื่อสารกับอุปกรณ์ภายในเครือข่ายเดียวกัน
- กรมป่าไม้ ( ลดฟังก์ชันการทำงานอุปกรณ์ ) จำกัด ทำหน้าที่เป็นเซ็นเซอร์หรือตัวกระตุ้นเท่านั้น
สื่อสาร กับ ffds
802.15.4 กำหนดสองประเภทของรูปแบบ : ลำดับชั้นและกระจาย In hierarchical topologies
devices are placed in groups as clusters, each cluster is managed by a cluster-head. Into a
cluster, cluster-heads can communicate with each other, but devices can communicate only with
their cluster-head.
In distributed topologies, all devices contribute to the formation of the network and every one of
them can communicate with others who are within his reach.
Although LR WPAN characteristics helped greatly to the development of ubiquitous networks [3],
they have a high security issues caused by the absence of a security infrastructure. Devices do
not have sufficient resources to implement known security protocols that have proven their
effective-ness [4]. One of the security deficiencies these networks suffer from, is the easy
การแลกเปลี่ยนข้อมูลระหว่างอุปกรณ์ในเครือข่าย [ 5 ] ข้อมูลนี้จะถูกใช้โดยแฮกเกอร์
เพื่อรบกวนการทำงานของเครือข่าย ระหว่างโซลูชั่น
เสนอเพื่อแก้ไขปัญหานี้คือการใช้เฉพาะการเข้ารหัสโปรโตคอลที่เคารพ
ความจำเพาะของเครือข่ายสำหรับ LR เป็นแนวป้องกันก่อน โซลูชั่นส่วนใหญ่เลือก
ในความหมายนี้จัดการกับโครงสร้างลำดับชั้น เนื่องจากอุปกรณ์จะถูกวางในลักษณะที่สามารถควบคุมและสั่ง
ดี [ 6 ] นอกจากนี้ โซลูชั่นเหล่านี้ละเลยความปลอดภัยของการใช้งานเครือข่ายเฟส
Bootstrapping มันใช้เวลาน้อยมากที่จะโจมตีสามารถแทรกแซง นี้เป็นจริงใน
เป็นกลุ่มเครือข่าย แต่ในการกระจายเครือข่าย bootstrapping ระยะใช้เวลา
เวลาที่สำคัญมากbefore the network being stabilized since the devices are placed in a disorderly manner. Securing
this phase is indispensable, devices exchange important information if they are captured by a
malicious, he can use them to attack the network.
We try to find a suitable solution to secure the bootstrap-ping phase in distributed LR WPAN. We
propose a security model based on symmetric cryptography with a specific key establishment
scheme. In the analysis part, we study the advantages of this solution in terms of its respect of:
security metrics, flexibility, scalability, and energy-efficient.
After this introduction, the structure of the rest of the pa-per is as follows: Section 2 gives a brief
overview of LR WPAN specifications,ส่วนที่ 3 กล่าวถึงการนำเสนอรูปแบบการรักษาความปลอดภัยและ
ส่วนที่ 4 แสดงการวิเคราะห์เชิงทฤษฎีของแบบจำลองนี้ในแง่ของพลังงานความยืดหยุ่นและรักษาความปลอดภัย .
ในที่สุด ส่วนที่ 5 สรุปกระดาษ
การแปล กรุณารอสักครู่..