6 research outputs found

    SurvSec: A New Security Architecture for Reliable Network Recovery from Base Station Failure of Surveillance WSN

    Get PDF
    AbstractSecuring surveillance wireless sensor networks (WSNs) in hostile environments such as borders, perimeters and battlefields during Base Station (BS) failure is challenging. Surveillance WSNs are highly vulnerable to BS failure. The attackers can render the network useless by only destroying the BS as the needed efforts to destroy the BS is much less than that is needed to destroy the network. This attack scenario will give the attackers the best chance to compromise many legitimate nodes. Previous works have tackled BS failure by deploying a mobile BS or by using multiple BSs. Despite the best electronic countermeasures, intrusion tolerance and anti-traffic analysis strategies to protect the BSs, an adversary still can destroy them. This paper proposes a novel security architecture called Surveillance Security (SurvSec) for reliable network recovery from single BS failure of surveillance WSN with single BS. SurvSec relies on a set of sensor nodes serve as Security Managers for management and storage of the security related data of all sensor nodes. SurvSec security architecture provides methodologies for choosing and changing the security managers of the surveillance WSN. SurvSec has three components: (1) Sensor nodes serve as Security Managers, (2) Data Storage System, (3) Data Recovery System. Furthermore, both the frame format of the stored data is carefully built and the security threats are encoded to allow minimum overheads for SurvSec security architecture. In this paper, we provide detailed specifications of SurvSec security architecture. We evaluate our designed security architecture for reliable network recovery from BS failure. Our evaluation shows that the proposed new security architecture can meet all the desired specifications and our analysis shows that the provided Security Managers are capable of network recovery from BS failure

    Blockchain for Transparent Data Management Toward 6G

    Get PDF
    The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless networks (6G). Due to data heterogeneity and dynamics, decentralized data management (DM) is desirable for achieving transparent data operations across network domains, and blockchain can be a promising solution. However, the increasing data volume and stringent data privacy-preservation requirements in 6G bring significantly technical challenge to balance transparency, efficiency, and privacy requirements in decentralized blockchain-based DM. In this paper, we investigate blockchain solutions to address the challenge. First, we explore the consensus protocols and scalability mechanisms in blockchains and discuss the roles of DM stakeholders in blockchain architectures. Second, we investigate the authentication and authorization requirements for DM stakeholders. Third, we categorize DM privacy requirements and study blockchain-based mechanisms for collaborative data processing. Subsequently, we present research issues and potential solutions for blockchain-based DM toward 6G from these three perspectives. Finally, we conclude this paper and discuss future research directions.Huawei Technologies Canada || Natural Sciences and Engineering Research Council of Canad

    A Distributed Social-Aware Location Protection Method in Untrusted Vehicular Social Networks

    No full text

    A Power-Efficient and Social-Aware Relay Selection Method for Multi-Hop D2D Communications

    No full text

    Fair and Social-Aware Message Forwarding Method in Opportunistic Social Networks

    No full text

    Mouftah, Concealing of the sink location in WSNs by artificially homogenizing traffic intensity

    No full text
    Abstract-For sensor networks deployed to collect and transmit events into a sink node, sink anonymity is a critical security property. Traditional encryption and authentication are not effective in terms of preserving the sink's location because attackers can determine its location through traffic analysis. In this paper, we propose an easy to implement Concealing of the Sink Location (CSL) technique, which is based on the use of fake message injection. CSL is able to prevent attackers from acquiring valuable information on the sink's location through the traffic analysis attack. Simulation results demonstrate clearly that CSL protocol can hide effectively the sink's location. Although using fake messages consumes additional energy, the network's lifetime is not impacted, as will be shown
    corecore