首页--工业技术论文--自动化技术、计算机技术论文--自动化技术及设备论文--自动化元件、部件论文--发送器(变换器)、传感器论文--传感器的应用论文

Candidate Base Stations a Security Solution for Compromised Base Stations in Wireless Sensor Networks

DECLARATION第4-5页
TABLE OF CONTENTS第5-7页
LIST OF FIGURES第7-8页
LIST OF ACRONYMS第8-9页
ACKNOWLEDGEMENT第9-10页
DEDICATION第10-11页
ABSTRACT第11页
CHAPTER ONE第12-16页
    1.0 INTRODUCTION第12-13页
    1.1 MOTIVATION第13-14页
    1.2 GOALS OF THIS THESIS第14页
    1.3 ORGANIZATION OF THE THESIS第14-16页
CHAPTER TWO第16-22页
    2.0 BACKGROUND第16-17页
    2.2 WIRELESS SENSOR NETWORKS APPLICATION第17-20页
        2.2.1 Industrial Control and Monitoring第17-18页
        2.2.2 Home Automation and Consumer Electronics第18页
        2.2.3 Security and Military Sensing第18-19页
        2.2.4 Asset Tracking and Supply Chain Management第19-20页
        2.2.5 Health Monitoring第20页
    2.3 DIFFERENCES BETWEEN SENSOR AND OTHER AD HOC NETWORKS第20-22页
CHAPTER THREE第22-33页
    3.0 WIRELESS SENSOR NETWORK STRUCTURE第22-23页
    3.1 NETWORK TOPOLOGY第23-25页
    3.2 WIRELESS SENSOR NETWORKS ARCHITECTURE第25-28页
    3.3 WIRELESS SENSOR NETWORK ROUTING PROTOCOLS第28-31页
        3.3.1 Destination-Sequenced Distance-Vector(DSDV)第29页
        3.3.2 Temporally Ordered Routing Algorithm(TORA)第29-30页
        3.3.3 Dynamic Source Routing(DSR)第30-31页
        3.3.4 Ad Hoc On-Demand Distance Vector Routing(AODV)第31页
    3.4 OTHER ROUTING PROTOCOLS第31-33页
        3.4.1 LEACH(Low Energy Adaptive Clustering Hierarchy)第31-32页
        3.4.2 SPIN(Sensor Protocols for Information via Negotiation)第32-33页
CHAPTER FOUR第33-40页
    4.0 WHAT ARE BASE STATIONS?第33-34页
    4.1 ROLE OF BASE STATIONS第34-35页
    4.2 SCALABILITY OF BASE STATIONS第35-36页
    4.3 BASE STATION ATTACKS AND THEIR SOLUTIONS第36-40页
        4.3.1 Jamming the communication medium第36页
        4.3.2 Denial of Service(DOS)Attack第36-37页
        4.3.3 Route discovery phase attack第37页
        4.3.4 Physical vandalism第37-40页
CHAPTER FIVE第40-50页
    5.0 BASE STATION SECURITY WITH CANDIDATE BASE STATIONS第40-41页
    5.1 NETWORK ARCHITECTURE AND BASE STATION SECURITY PROTOCOLS第41-43页
        5.1.1 Related works第41-42页
        5.1.2 Base Station Security protocol with Candidate Base Stations第42-43页
    5.2 CANDIDATE BASE STATIONS第43页
    5.3 CANDIDATE BASE STATION MODEL第43-50页
        5.3.1 Sensor nodes or CBs module第45-46页
        5.3.2 Compromised base station module第46-47页
        5.3.3 Candidate base station module第47页
        5.3.4 Other base station module第47-48页
        5.3.5 Route data module第48页
        5.3.6 Hang module第48-49页
        5.3.7 Stop module第49-50页
CHAPTER SIX第50-61页
    6.0 SIMULATION SET-UP AND DISCUSSION第50-53页
        6.0.1 Handshake between some Nodes, Base Stations and Data Transmission第50-51页
        6.0.2 Data Transmission第51-53页
    6.1 BASE STATION FAILURE DETECTION第53-55页
    6.2 CANDIDATE BASE STATION SUCCESS RATIO第55-57页
    6.3 DISCONNECTED SENSOR NODES第57-58页
    6.4 FUTURE WORK第58-60页
    6.5 CONCLUSION第60-61页
REFERENCES第61-67页
APPENDIX A第67-68页
    A.1 PUBLISHED PAPERS第67-68页
APPENDIX B第68-72页
    B.1 PART OF THE PROGRAMME CODE第68-72页

论文共72页,点击 下载论文
上一篇:Hidden Markov Model Based Automatic Speech Recognition Using Mel Frequency Cepstral Coefficients in Nepalese
下一篇:金刚石型B20的常温常压电化学合成