Chapter 10 discusses the latest technologies for

Info icon This preview shows pages 10–12. Sign up to view the full content.

Chapter 10 discusses the latest technologies for policy-based security management that enable this capability in an energy efficient manner. Radio frequency signals have a limited range, and therefore a wireless attacker can only attack nodes in its vicinity. For that reason, not all nodes are susceptible to the same level of attack at the same time. Propagation behavior is one of the concepts the authors explore in applying security at the right place, time and strength. The authors also conduct an analysis of the energy consumption due to computation and communication of security protocols to illustrate the value of their scheme in security management. Additionally, Chapter 10 presents a case study for a policy-based proactive/reactive security management framework. Chapter 11 presents a wireless sensor network authorization specification language (WASL) for expressing policies, which can be efficiently communicated throughout the network. WASL distinguishes between the ability to access data and the authorization to do so. For instance, a class of subjects can be authorized to perform a set of actions on a particular data object. This is particularly beneficial for ad hoc and sensor networks where nodes must rely on neighbors for forwarding data, but do not trust the neighbor to operate on the data. The authors demonstrate the implementation of WASL for three different security policy models. The ability to upgrade existing programs or install new programs post deployment is also essential to the management of ad hoc and sensor networks. A wireless sensor network may need an application patch or new security function added to keep the network operational. It would be impractical to complete this task manually, thus motivating a secure way to do “over-the-air” programming. Chapter 12 surveys recent advancements in dynamic program updates. The authors also propose Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 10

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Preface x two ideas of their own based on the cryptographic hash function and the orthogonality principle. Many of the protocols used to disseminate program upgrades use version numbers to distinguish new configurations from old ones. Under certain faulty conditions the program updates may not stabilize. The implications of non-stabilizing upgrades could cause a wireless network to carry on forever expending valuable resources. Chapter 13 presents a solution to this problem.
Image of page 11
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • Public key infrastructure, ........., Public-key cryptography, Pretty Good Privacy

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern