Download presentation
Presentation is loading. Please wait.
1
25 April 2005 1 Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005
2
25 April 2005 2 Presentation Outline Wireless Sensor Networks (WSN) Security for WSN Implementation Conclusion
3
25 April 2005 3 Wireless Sensor Networks What is a WSN? –Nodes –Beacons –Base Station
4
25 April 2005 4 Wireless Sensor Networks Applications –Military –Medical Advantages –Deployment –Disposability –Size
5
25 April 2005 5 Securing WSN Requirements –Data Confidentiality –Data Authentication –Data Integrity –Data Freshness
6
25 April 2005 6 Sensor Network Encryption Protocol Encryption keys Semantic security –Counter used to encrypt message differently –Never repeats Message Authentication Code
7
25 April 2005 7 Implementation Time of Arrival method Ultrasonic transducers TinyOS MatLab MicaZ
8
25 April 2005 8 Ultrasonic Time of Arrival
9
25 April 2005 9 Base Station Connected to PC Beacon Node Sensor Field Layout Beacon
10
25 April 2005 10 MicaZ
11
25 April 2005 11 Conclusion Setting up WSN Implementing security
12
25 April 2005 12 Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.