Nt1310 Unit 1 Network Agency Paper

Improved Essays
Certification Authority(CA):A certification Authority which is having private and public key pairs and trusted by sensors.The role of the CA in this process is to guarantee that the individual granted the unique certificate is in the fact who he or she claims to be.
External Agent(EA):External Agent is an entity who tries communicate with the WSN.External agent agent also has a private and public key pair and the public key must be certified the CA.
Base station(BS):A Base station is a signal transmitter or receiver that controls the local wireless network and may also be the gateway between external environment and WSN.Base station plays a major role in WSN security.BS will have more communicating information to BS or EA.
Eaves Dropping
…show more content…
VII. REFERENCES:
[1] JaydpSen,”A survey on Wireless Sensor network Security”,Technical report 55-77,International Journal of Communication Networks and Information Security(IJCNIS)Vol 1,No2 August 2009.
[2] Vidhani Kumar and Manik Lal Das,”Securing Wireless Sensor Networks with Public Key Techniques Adhoc & Sensor Wireless Networks”,pp189-201,2008.
[3]” Security architecture for the Internet Protocol”,RFC 2401,November 2013.
[4 ]http://www.ssh.com
[5] D.W.Carman,P.S.Krus and B.J.Matt,”Constraints and approaches for distributed sensor network security”,Technical Report 00-010,NAI Labs,Network Associates Inc., Glenwood MD,2012.
[6] http://www.darpa.mil/index.html[accessed 13 Dec

Related Documents

  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics. Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    So you have an old Dell PowerEdge 2900 Server laying around with a few hard drives and your thinking I would really like to use this equipment as a NAS drive. It could happen, in our case it did. There were some stumbling blocks on the way though. Here is how we got through them… The goals we wanted to accomplish were creating a RAID5 array of 8 (7+1 Hot Spare) 1TB hard drives and then wanted to connect this FreeNas volume through and iSCSI channel to a file server that will present the NAS as a shared folder all of our servers could use. We quickly found that using the factory PERC (PowerEdge RAID Controller) to create a RAID 5 Array was not going to work.…

    • 608 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    1) Eavesdropping: It can be defined as secretly listening to the private conversation of others without their consent. Here an attacker can choose to passively eavesdrop on the network communication and steal the data. Through passive eavesdropping attackers apparently eliminate their presence in the network and make such attacks difficult to detect. The goal of such an attack is to violate the confidentiality of the communications by intercepting the network and sniffing or listening to the routing packets. Also, an adversary can actively influence the communication channel by disrupting, jamming or modifying the network packets and/or inserting false packets into the network.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Healthcare landing page SEO: HIPAA COMPLIANCE - 5 Page title: HIPAA Compliance Endpoint Security How Visibility, Control & Automated Response Helps Healthcare Organizations Compensate for BYOD and IoT security Gaps The rise in IoT, BYOD and mobile devices, has made network endpoints one of the most vulnerable security gaps in most networks. What makes the healthcare industry unique, is its need to secure information while maintaining the delicate balance between patient privacy and the need for readily available information to ensure efficient, accurate diagnosis and treatment.…

    • 370 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    802.11 Cons

    • 1585 Words
    • 7 Pages

    They enable clients to find them by transmitting Beacon frames with network parameters. This also allows hackers to launch an attack on a network, because the Beacon frames are not processed by any privacy functions, which means that the 802.11 network is available for anybody with an 802.11 card. Hackers with high-gain antennas can find networks from nearby roads or buildings and launch attacks without physically having…

    • 1585 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    This week’s lab introduces the student to various types of attacks that can be implemented by distributing a Trojan Horse script or by performing a variety of Denial-of-Service attacks (DoS). To begin to understand how these attacks are performed, the student is instilled with the knowledge as well as the use of file-hashes to identify compromised files and also how to generate file-hashes to establish baseline standards, which could benefit a Tripwire type regiment. Then, the lab takes the student through performing the various tasks associated with implementing such attacks by crafting a Trojan horse-like script.…

    • 1971 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    1. PHYSICAL SECURITY POLICY 1.1 Overview This policy is designed to set how Dalton, Walton & Carlton, Inc. (DW&C) strives to protect its employees, visitors and assets (buildings, property, information) against physical threats including but not limited to crimes (criminal damage and theft) and terrorism through the use of physical security controls.…

    • 1248 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Traditionally, power grid architectures were standalone systems that consisted of proprietary protocols traversing legacy hardware and software systems (Li et al., 2012). Power grid automation systems using this type of architecture carried high operating costs that power companies found to be inefficient over time (Kuder et al., 2010). Due to this inefficiency, power companies began to integrate the operation of power grid automation systems into public networks. This integration served its purpose of reducing operating cost, but significantly increased the power grids exposure to cyber-attacks (Kuder et al., 2010). Recent discoveries that hackers have inserted software into the US electrical grid, allowing the grid to be disrupted at a later date from a remote location, clearly demonstrates the fact that the utility infrastructure is quite vulnerable and that its overall mission of serving the population could be severely compromised as a result of a cyber-attack (Li et al., 2012).…

    • 2030 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Essay On Zero Day

    • 1430 Words
    • 6 Pages

    Many years ago, much of society may have envisioned a future with flying cars and robots that shared the Earth with humans. While this has yet to occur, technology is leaps and bounds beyond what it was imagined to be at this point. With technological advancement comes a necessity to secure it; and for some, exploit it. Zero day exploits employed for economic or military advantage; cyber crime, cyber terrorism and threats to SCADA systems; meta-data collected and used by the private sector and public sector; and vulnerability assessments for mobile devices in the BYOD environment may seem to have little in common. However, each comes with security issues, policy controls to be implemented, and human factors that influence the recommended policies.…

    • 1430 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Zigbee Case Study

    • 1223 Words
    • 5 Pages

    Overview: With the demand and rise of electronic equipment’s, new technologies are being developed and deployed to meet the global demands. Zigbee is one such technology in rise with low power consumption and low-cost to meet the rising market of Internet of things (IoT) networks. Zigbee is generally deployed for applications which use low data rate and low power consumption and is an open standard worldwide. Zigbee uses a different protocol than Wi-Fi networks where it uses a mesh networking protocol to create a self-healing architecture, thereby supporting much lower data rates than Wi-Fi. Exploitation in ZigBee devices:…

    • 1223 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    2. PRELIMINARIES The research efforts that proposed for the connectivity and coverage issues in WSNs are based upon a lot of theories and assumptions. The basic concepts of connectivity and coverage have an essential role in understanding this issue. In this section, we describe the notions of connectivity and coverage, the category of sensor nodes, sensing models and communication models.…

    • 1501 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    MANET Case Study

    • 890 Words
    • 4 Pages

    Wireless links between nodes can be unreliable – Wireless nodes have a limited amount of energy available at any given time which could result in a node becoming unavailable for communication when its power is depleted. These wireless links are also susceptible to attacks. Unlike wired networks in which the adversary first needs to gain actual physical access to the network, in wireless ad-hoc networks the adversary can attack from any link and target any node. These ad-hoc networks don’t have a clear defence line, as such each and every node must be prepared to defend itself from threats. 2.…

    • 890 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Smart Home Essay

    • 815 Words
    • 4 Pages

    Integration is made possible via the application of sensor technology and wireless networks (WSN). Wide area networks (WAN) linked to Local area networks (LAN) and now increasingly Body area networks (BAN), provide the framework on which data can flow and enable the IOT. (Van Kraenenburg, 2015). According to the electrical trade association BEAMA, the modern smart home would operate primarily on a wireless local area network (WLAN).…

    • 815 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Biometric Security

    • 2314 Words
    • 10 Pages

    Nowadays, not many people can walk down the street without running into someone connected to cyberspace. The Internet of Things is a broad term used to define an entire system of devices connected to cyberspace that can communicate with one another. As shown in figure 1.1, there are many devices just at home that can be considered a part of the IoT. This figure is just a small example of all devices that are connected to cyberspace. The term IoT can cover phones, watches, laptops and just about anything mobile that connects to cyberspace. With the IoT constantly expanding due to new internet ready devices introduced, new security measures must be taken to protect these devices.…

    • 2314 Words
    • 10 Pages
    Improved Essays