25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005
25 April Presentation Outline Wireless Sensor Networks (WSN) Security for WSN Implementation Conclusion
25 April Wireless Sensor Networks What is a WSN? –Nodes –Beacons –Base Station
25 April Wireless Sensor Networks Applications –Military –Medical Advantages –Deployment –Disposability –Size
25 April Securing WSN Requirements –Data Confidentiality –Data Authentication –Data Integrity –Data Freshness
25 April Sensor Network Encryption Protocol Encryption keys Semantic security –Counter used to encrypt message differently –Never repeats Message Authentication Code
25 April Implementation Time of Arrival method Ultrasonic transducers TinyOS MatLab MicaZ
25 April Ultrasonic Time of Arrival
25 April Base Station Connected to PC Beacon Node Sensor Field Layout Beacon
25 April MicaZ
25 April Conclusion Setting up WSN Implementing security
25 April Questions?