Back to Browse

AWSN/21/Flooding Attack /Key Management

629 views
Sep 20, 2020
15:59

CLICK Here https://www.youtube.com/channel/UC-s9vNBHUJP3SEofXwrXccQ/?sub_confirmation=1 Flooding Attack and its Countermeasures Many protocols require nodes to broadcast HELLO packets to announce themselves to their neighbors, and a node receiving such a packet may assume that it is within (normal) radio range of the sender Countermeasures of flooding attack Using Secret Keys Method In multi-path multi-base station data forwarding technique, each sensor node maintains number of different secrets (keys) in a multiple tree. Using Threshold Method A threshold based solution is used to defend against flooding attacks in WSN. The mobile nodes use a threshold value to check whether its neighbors are intruders or not. Key Distribution and Management Key Management Cryptography is one of the most common and reliable means to ensure security. It is the study of the principles, techniques, and algorithms by which information is transformed into a disguised version which no unauthorized person can read, but which can be recovered in its original form by an intended recipient. Symmetric Key Algorithms Symmetric key algorithms rely on the presence of the shared key at both the sender and receiver, which has been exchanged by some previous arrangement. There are two kinds of symmetric key algorithms, one involving block ciphers and the other stream ciphers. A block cipher is an encryption scheme in which the plaintext is broken into fixed-length segments called blocks, and the blocks are encrypted one at a time. Asymmetric Key Algorithms Asymmetric key (or public key) algorithms use different keys at the sender and receiver ends for encryption and decryption, respectively. Let the encryption process be represented by a function E, and decryption by D. Then the plaintext M is transformed into the ciphertext C as C = E (M). Key Distribution (Management) Approaches The primary goal of key distribution is to share a secret among a specified set of participants. There are several methods that can be employed to perform this operation, all of them requiring varying amounts of initial configuration, communication, and computation.

Download

0 formats

No download links available.

AWSN/21/Flooding Attack /Key Management | NatokHD