Criptografia adaptativa em redes de sensores visuais sem fio
| Ano de defesa: | 2015 |
|---|---|
| Autor(a) principal: | |
| Orientador(a): | |
| Banca de defesa: | |
| Tipo de documento: | Dissertação |
| Tipo de acesso: | Acesso aberto |
| Idioma: | por |
| Instituição de defesa: |
Universidade Estadual de Feira de Santana
|
| Programa de Pós-Graduação: |
Mestrado em Computa??o Aplicada
|
| Departamento: |
DEPARTAMENTO DE TECNOLOGIA
|
| País: |
Brasil
|
| Palavras-chave em Português: | |
| Palavras-chave em Inglês: | |
| Área do conhecimento CNPq: | |
| Link de acesso: | http://localhost:8080/tede/handle/tede/242 |
Resumo: | Recently Wireless Sensor Networks have gained attention of researchers and industry around the world, such that many projects and solutions have been developed for various scenarios and applications. Such networks are formed by small sensor nodes with low processing power, few memory and few energy. Thus, resources are scarce, particularly energy, where, in most cases these nodes are powered by batteries, which is a crucial point in the network design. A kind of sensor network in which camera-enabled sensors are inserted are call Wireless Visual Sensor Networks. Because of this, these networks become able to recover large quantities of environment information which may to be interesting for several applications. However, in general, sensor networks are very vulnerable due to the nature of the communication and due also to the sensor nodes are, sometimes, in remote, hostile and hard to reach areas. Moreover, the sensor nodes are potentially inexpensive devices that can be easily purchased or designed by others to attack the network. So to mitigate these vulnerabilities, research in security area for such networks are required. However, traditional security mechanisms lead to very overhead of computing and communication can compromise the network performance when they are adopted. Thinking about it, this master's thesis aims to propose a new paradigm to ensure security for wireless visual sensor networks, being presented through a theoretical mathematical model to perform differentiation of areas in the monitoring environment to then considering the particularities of the application monitoring to provide security at different levels. Called Adaptive Encryption, this theoretical model can be used for various applications requiring different security assurances for different network locations, implying providing security at acceptable levels while consuming less network resources, above all energy. |
| id |
UEFS_984355f954b93a0340422e2ecdc10dde |
|---|---|
| oai_identifier_str |
oai:tede2.uefs.br:8080:tede/242 |
| network_acronym_str |
UEFS |
| network_name_str |
Biblioteca Digital de Teses e Dissertações da UEFS |
| repository_id_str |
|
| spelling |
Costa, Daniel Gouveia01174798459http://lattes.cnpq.br/8865347912253328Gon?alves, Danilo de Oliveira2015-10-20T23:41:57Z2015-08-19GON?ALVES, Danilo de Oliveira. Criptografia adaptativa em redes de sensores visuais sem fio. 2015. 116 f. Disserta??o (Mestrado em Computa??o Aplicada)- Universidade Estadual de Feira de Santana, Feira de Santana, 2015.http://localhost:8080/tede/handle/tede/242Recently Wireless Sensor Networks have gained attention of researchers and industry around the world, such that many projects and solutions have been developed for various scenarios and applications. Such networks are formed by small sensor nodes with low processing power, few memory and few energy. Thus, resources are scarce, particularly energy, where, in most cases these nodes are powered by batteries, which is a crucial point in the network design. A kind of sensor network in which camera-enabled sensors are inserted are call Wireless Visual Sensor Networks. Because of this, these networks become able to recover large quantities of environment information which may to be interesting for several applications. However, in general, sensor networks are very vulnerable due to the nature of the communication and due also to the sensor nodes are, sometimes, in remote, hostile and hard to reach areas. Moreover, the sensor nodes are potentially inexpensive devices that can be easily purchased or designed by others to attack the network. So to mitigate these vulnerabilities, research in security area for such networks are required. However, traditional security mechanisms lead to very overhead of computing and communication can compromise the network performance when they are adopted. Thinking about it, this master's thesis aims to propose a new paradigm to ensure security for wireless visual sensor networks, being presented through a theoretical mathematical model to perform differentiation of areas in the monitoring environment to then considering the particularities of the application monitoring to provide security at different levels. Called Adaptive Encryption, this theoretical model can be used for various applications requiring different security assurances for different network locations, implying providing security at acceptable levels while consuming less network resources, above all energy.Recentemente as Redes de Sensores Sem Fio t?m ganhado a aten??o de pesquisadores, da ind?stria e do meio acad?mico ao redor do mundo todo, de modo que muitos projetos e solu??es t?m sido desenvolvidas para diversos cen?rios e aplica??es. Essas redes s?o formadas por pequenos n?s sensores com pouco poder de processamento, mem?ria e energia. Sendo assim, os recursos s?o bastante escassos, principalmente energia, onde, na maioria das vezes estes n?s s?o alimentados por baterias, sendo este um ponto crucial no projeto da rede. Um tipo de rede de sensores em que os n?s possuem c?meras de v?deo embutidas s?o chamadas de Redes de Sensores Visuais Sem Fio. Devido a isso, tais redes se tornam capazes de recuperar grandes quantidades de informa??es do ambiente o que pode ser interessante para diversas aplica??es. Todavia, de forma geral, as redes de sensores s?o muito vulner?veis devido a natureza da comunica??o e devido tamb?m aos n?s sensores estarem, algumas vezes, em locais remotos, hostis e de dif?cil acesso. Al?m disso, os n?s sensores s?o dispositivos potencialmente baratos que podem ser facilmente adquiridos ou projetados por terceiros a fim de atacar a rede. Ent?o, visando atenuar essas vulnerabilidades, pesquisas na ?rea de seguran?a para tais redes s?o necess?rias. Contudo, os mecanismos de seguran?a tradicionais geram muito sobrecarga de computa??o e comunica??o podendo comprometer o desempenho da rede quando s?o adotados. Pensando nisso, este trabalho de mestrado tem como objetivo propor um novo paradigma para garantir seguran?a para redes de sensores visuais sem fio, sendo apresentado atrav?s um modelo matem?tico te?rico para realizar diferencia??o de ?reas no ambiente de monitoramento para, ent?o, considerando as particularidades da aplica??o de monitoramento, prover seguran?a em diferentes n?veis. Chamado de Criptografia Adaptativa, este modelo te?rico pode ser utilizado por diversas aplica??es que necessitem de garantias de seguran?a diferenciadas para diferentes locais da rede, o que implica em prover seguran?a em n?veis aceit?veis consumindo menos recursos da rede, principalmente energia.Submitted by Ricardo Cedraz Duque Moliterno (ricardo.moliterno@uefs.br) on 2015-10-20T23:41:57Z No. of bitstreams: 1 Disserta??o-Danilo-Vers?o-final-p?s-banca .pdf: 11564872 bytes, checksum: 0a0388f802ddac466fce74bea4b02895 (MD5)Made available in DSpace on 2015-10-20T23:41:57Z (GMT). No. of bitstreams: 1 Disserta??o-Danilo-Vers?o-final-p?s-banca .pdf: 11564872 bytes, checksum: 0a0388f802ddac466fce74bea4b02895 (MD5) Previous issue date: 2015-08-19Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior - CAPESapplication/pdfhttp://tede2.uefs.br:8080/retrieve/4878/Disserta%c3%a7%c3%a3o-Danilo-Vers%c3%a3o-final-p%c3%b3s-banca%20.pdf.jpgporUniversidade Estadual de Feira de SantanaMestrado em Computa??o AplicadaUEFSBrasilDEPARTAMENTO DE TECNOLOGIACriptografiaRede de sensores sem fioRedes de sensores visuais sem fioCryptographyWireless sensor networksWireless visual sensor networksCIENCIA DA COMPUTACAO::TEORIA DA COMPUTACAOCIENCIA DA COMPUTACAO::SISTEMAS DE COMPUTACAOCriptografia adaptativa em redes de sensores visuais sem fioinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesis35536273586840950926006006006006004335108523020347051-86207825708332530189300925156837715312075167498588264571info:eu-repo/semantics/openAccessreponame:Biblioteca Digital de Teses e Dissertações da UEFSinstname:Universidade Estadual de Feira de Santana (UEFS)instacron:UEFSTHUMBNAILDisserta??o-Danilo-Vers?o-final-p?s-banca .pdf.jpgDisserta??o-Danilo-Vers?o-final-p?s-banca .pdf.jpgimage/jpeg3108http://tede2.uefs.br:8080/bitstream/tede/242/4/Disserta%C3%A7%C3%A3o-Danilo-Vers%C3%A3o-final-p%C3%B3s-banca+.pdf.jpgd6458ece3bdd6321644c67d447356d00MD54TEXTDisserta??o-Danilo-Vers?o-final-p?s-banca .pdf.txtDisserta??o-Danilo-Vers?o-final-p?s-banca .pdf.txttext/plain248364http://tede2.uefs.br:8080/bitstream/tede/242/3/Disserta%C3%A7%C3%A3o-Danilo-Vers%C3%A3o-final-p%C3%B3s-banca+.pdf.txt6287bef214ed47bab82ba9605839648fMD53ORIGINALDisserta??o-Danilo-Vers?o-final-p?s-banca .pdfDisserta??o-Danilo-Vers?o-final-p?s-banca .pdfapplication/pdf11564872http://tede2.uefs.br:8080/bitstream/tede/242/2/Disserta%C3%A7%C3%A3o-Danilo-Vers%C3%A3o-final-p%C3%B3s-banca+.pdf0a0388f802ddac466fce74bea4b02895MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-82165http://tede2.uefs.br:8080/bitstream/tede/242/1/license.txtbd3efa91386c1718a7f26a329fdcb468MD51tede/2422025-09-10 01:06:44.769oai:tede2.uefs.br:8080:tede/242Tk9UQTogQ09MT1FVRSBBUVVJIEEgU1VBIFBSw5NQUklBIExJQ0VOw4dBCkVzdGEgbGljZW7Dp2EgZGUgZXhlbXBsbyDDqSBmb3JuZWNpZGEgYXBlbmFzIHBhcmEgZmlucyBpbmZvcm1hdGl2b3MuCgpMSUNFTsOHQSBERSBESVNUUklCVUnDh8ODTyBOw4NPLUVYQ0xVU0lWQQoKQ29tIGEgYXByZXNlbnRhw6fDo28gZGVzdGEgbGljZW7Dp2EsIHZvY8OqIChvIGF1dG9yIChlcykgb3UgbyB0aXR1bGFyIGRvcyBkaXJlaXRvcyBkZSBhdXRvcikgY29uY2VkZSDDoCBVbml2ZXJzaWRhZGUgClhYWCAoU2lnbGEgZGEgVW5pdmVyc2lkYWRlKSBvIGRpcmVpdG8gbsOjby1leGNsdXNpdm8gZGUgcmVwcm9kdXppciwgIHRyYWR1emlyIChjb25mb3JtZSBkZWZpbmlkbyBhYmFpeG8pLCBlL291IApkaXN0cmlidWlyIGEgc3VhIHRlc2Ugb3UgZGlzc2VydGHDp8OjbyAoaW5jbHVpbmRvIG8gcmVzdW1vKSBwb3IgdG9kbyBvIG11bmRvIG5vIGZvcm1hdG8gaW1wcmVzc28gZSBlbGV0csO0bmljbyBlIAplbSBxdWFscXVlciBtZWlvLCBpbmNsdWluZG8gb3MgZm9ybWF0b3Mgw6F1ZGlvIG91IHbDrWRlby4KClZvY8OqIGNvbmNvcmRhIHF1ZSBhIFNpZ2xhIGRlIFVuaXZlcnNpZGFkZSBwb2RlLCBzZW0gYWx0ZXJhciBvIGNvbnRlw7pkbywgdHJhbnNwb3IgYSBzdWEgdGVzZSBvdSBkaXNzZXJ0YcOnw6NvIApwYXJhIHF1YWxxdWVyIG1laW8gb3UgZm9ybWF0byBwYXJhIGZpbnMgZGUgcHJlc2VydmHDp8Ojby4KClZvY8OqIHRhbWLDqW0gY29uY29yZGEgcXVlIGEgU2lnbGEgZGUgVW5pdmVyc2lkYWRlIHBvZGUgbWFudGVyIG1haXMgZGUgdW1hIGPDs3BpYSBhIHN1YSB0ZXNlIG91IApkaXNzZXJ0YcOnw6NvIHBhcmEgZmlucyBkZSBzZWd1cmFuw6dhLCBiYWNrLXVwIGUgcHJlc2VydmHDp8Ojby4KClZvY8OqIGRlY2xhcmEgcXVlIGEgc3VhIHRlc2Ugb3UgZGlzc2VydGHDp8OjbyDDqSBvcmlnaW5hbCBlIHF1ZSB2b2PDqiB0ZW0gbyBwb2RlciBkZSBjb25jZWRlciBvcyBkaXJlaXRvcyBjb250aWRvcyAKbmVzdGEgbGljZW7Dp2EuIFZvY8OqIHRhbWLDqW0gZGVjbGFyYSBxdWUgbyBkZXDDs3NpdG8gZGEgc3VhIHRlc2Ugb3UgZGlzc2VydGHDp8OjbyBuw6NvLCBxdWUgc2VqYSBkZSBzZXUgCmNvbmhlY2ltZW50bywgaW5mcmluZ2UgZGlyZWl0b3MgYXV0b3JhaXMgZGUgbmluZ3XDqW0uCgpDYXNvIGEgc3VhIHRlc2Ugb3UgZGlzc2VydGHDp8OjbyBjb250ZW5oYSBtYXRlcmlhbCBxdWUgdm9jw6ogbsOjbyBwb3NzdWkgYSB0aXR1bGFyaWRhZGUgZG9zIGRpcmVpdG9zIGF1dG9yYWlzLCB2b2PDqiAKZGVjbGFyYSBxdWUgb2J0ZXZlIGEgcGVybWlzc8OjbyBpcnJlc3RyaXRhIGRvIGRldGVudG9yIGRvcyBkaXJlaXRvcyBhdXRvcmFpcyBwYXJhIGNvbmNlZGVyIMOgIFNpZ2xhIGRlIFVuaXZlcnNpZGFkZSAKb3MgZGlyZWl0b3MgYXByZXNlbnRhZG9zIG5lc3RhIGxpY2Vuw6dhLCBlIHF1ZSBlc3NlIG1hdGVyaWFsIGRlIHByb3ByaWVkYWRlIGRlIHRlcmNlaXJvcyBlc3TDoSBjbGFyYW1lbnRlIAppZGVudGlmaWNhZG8gZSByZWNvbmhlY2lkbyBubyB0ZXh0byBvdSBubyBjb250ZcO6ZG8gZGEgdGVzZSBvdSBkaXNzZXJ0YcOnw6NvIG9yYSBkZXBvc2l0YWRhLgoKQ0FTTyBBIFRFU0UgT1UgRElTU0VSVEHDh8ODTyBPUkEgREVQT1NJVEFEQSBURU5IQSBTSURPIFJFU1VMVEFETyBERSBVTSBQQVRST0PDjU5JTyBPVSAKQVBPSU8gREUgVU1BIEFHw4pOQ0lBIERFIEZPTUVOVE8gT1UgT1VUUk8gT1JHQU5JU01PIFFVRSBOw4NPIFNFSkEgQSBTSUdMQSBERSAKVU5JVkVSU0lEQURFLCBWT0PDiiBERUNMQVJBIFFVRSBSRVNQRUlUT1UgVE9ET1MgRSBRVUFJU1FVRVIgRElSRUlUT1MgREUgUkVWSVPDg08gQ09NTyAKVEFNQsOJTSBBUyBERU1BSVMgT0JSSUdBw4fDlUVTIEVYSUdJREFTIFBPUiBDT05UUkFUTyBPVSBBQ09SRE8uCgpBIFNpZ2xhIGRlIFVuaXZlcnNpZGFkZSBzZSBjb21wcm9tZXRlIGEgaWRlbnRpZmljYXIgY2xhcmFtZW50ZSBvIHNldSBub21lIChzKSBvdSBvKHMpIG5vbWUocykgZG8ocykgCmRldGVudG9yKGVzKSBkb3MgZGlyZWl0b3MgYXV0b3JhaXMgZGEgdGVzZSBvdSBkaXNzZXJ0YcOnw6NvLCBlIG7Do28gZmFyw6EgcXVhbHF1ZXIgYWx0ZXJhw6fDo28sIGFsw6ltIGRhcXVlbGFzIApjb25jZWRpZGFzIHBvciBlc3RhIGxpY2Vuw6dhLgo=Biblioteca Digital de Teses e Dissertaçõeshttp://tede2.uefs.br:8080/PUBhttp://tede2.uefs.br:8080/oai/requestbcuefs@uefs.br|| bcref@uefs.br||bcuefs@uefs.bropendoar:2025-09-10T04:06:44Biblioteca Digital de Teses e Dissertações da UEFS - Universidade Estadual de Feira de Santana (UEFS)false |
| dc.title.por.fl_str_mv |
Criptografia adaptativa em redes de sensores visuais sem fio |
| title |
Criptografia adaptativa em redes de sensores visuais sem fio |
| spellingShingle |
Criptografia adaptativa em redes de sensores visuais sem fio Gon?alves, Danilo de Oliveira Criptografia Rede de sensores sem fio Redes de sensores visuais sem fio Cryptography Wireless sensor networks Wireless visual sensor networks CIENCIA DA COMPUTACAO::TEORIA DA COMPUTACAO CIENCIA DA COMPUTACAO::SISTEMAS DE COMPUTACAO |
| title_short |
Criptografia adaptativa em redes de sensores visuais sem fio |
| title_full |
Criptografia adaptativa em redes de sensores visuais sem fio |
| title_fullStr |
Criptografia adaptativa em redes de sensores visuais sem fio |
| title_full_unstemmed |
Criptografia adaptativa em redes de sensores visuais sem fio |
| title_sort |
Criptografia adaptativa em redes de sensores visuais sem fio |
| author |
Gon?alves, Danilo de Oliveira |
| author_facet |
Gon?alves, Danilo de Oliveira |
| author_role |
author |
| dc.contributor.advisor1.fl_str_mv |
Costa, Daniel Gouveia |
| dc.contributor.authorID.fl_str_mv |
01174798459 |
| dc.contributor.authorLattes.fl_str_mv |
http://lattes.cnpq.br/8865347912253328 |
| dc.contributor.author.fl_str_mv |
Gon?alves, Danilo de Oliveira |
| contributor_str_mv |
Costa, Daniel Gouveia |
| dc.subject.por.fl_str_mv |
Criptografia Rede de sensores sem fio Redes de sensores visuais sem fio |
| topic |
Criptografia Rede de sensores sem fio Redes de sensores visuais sem fio Cryptography Wireless sensor networks Wireless visual sensor networks CIENCIA DA COMPUTACAO::TEORIA DA COMPUTACAO CIENCIA DA COMPUTACAO::SISTEMAS DE COMPUTACAO |
| dc.subject.eng.fl_str_mv |
Cryptography Wireless sensor networks Wireless visual sensor networks |
| dc.subject.cnpq.fl_str_mv |
CIENCIA DA COMPUTACAO::TEORIA DA COMPUTACAO CIENCIA DA COMPUTACAO::SISTEMAS DE COMPUTACAO |
| description |
Recently Wireless Sensor Networks have gained attention of researchers and industry around the world, such that many projects and solutions have been developed for various scenarios and applications. Such networks are formed by small sensor nodes with low processing power, few memory and few energy. Thus, resources are scarce, particularly energy, where, in most cases these nodes are powered by batteries, which is a crucial point in the network design. A kind of sensor network in which camera-enabled sensors are inserted are call Wireless Visual Sensor Networks. Because of this, these networks become able to recover large quantities of environment information which may to be interesting for several applications. However, in general, sensor networks are very vulnerable due to the nature of the communication and due also to the sensor nodes are, sometimes, in remote, hostile and hard to reach areas. Moreover, the sensor nodes are potentially inexpensive devices that can be easily purchased or designed by others to attack the network. So to mitigate these vulnerabilities, research in security area for such networks are required. However, traditional security mechanisms lead to very overhead of computing and communication can compromise the network performance when they are adopted. Thinking about it, this master's thesis aims to propose a new paradigm to ensure security for wireless visual sensor networks, being presented through a theoretical mathematical model to perform differentiation of areas in the monitoring environment to then considering the particularities of the application monitoring to provide security at different levels. Called Adaptive Encryption, this theoretical model can be used for various applications requiring different security assurances for different network locations, implying providing security at acceptable levels while consuming less network resources, above all energy. |
| publishDate |
2015 |
| dc.date.accessioned.fl_str_mv |
2015-10-20T23:41:57Z |
| dc.date.issued.fl_str_mv |
2015-08-19 |
| dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
| dc.type.driver.fl_str_mv |
info:eu-repo/semantics/masterThesis |
| format |
masterThesis |
| status_str |
publishedVersion |
| dc.identifier.citation.fl_str_mv |
GON?ALVES, Danilo de Oliveira. Criptografia adaptativa em redes de sensores visuais sem fio. 2015. 116 f. Disserta??o (Mestrado em Computa??o Aplicada)- Universidade Estadual de Feira de Santana, Feira de Santana, 2015. |
| dc.identifier.uri.fl_str_mv |
http://localhost:8080/tede/handle/tede/242 |
| identifier_str_mv |
GON?ALVES, Danilo de Oliveira. Criptografia adaptativa em redes de sensores visuais sem fio. 2015. 116 f. Disserta??o (Mestrado em Computa??o Aplicada)- Universidade Estadual de Feira de Santana, Feira de Santana, 2015. |
| url |
http://localhost:8080/tede/handle/tede/242 |
| dc.language.iso.fl_str_mv |
por |
| language |
por |
| dc.relation.program.fl_str_mv |
3553627358684095092 |
| dc.relation.confidence.fl_str_mv |
600 600 600 600 600 |
| dc.relation.department.fl_str_mv |
4335108523020347051 |
| dc.relation.cnpq.fl_str_mv |
-862078257083325301 8930092515683771531 |
| dc.relation.sponsorship.fl_str_mv |
2075167498588264571 |
| dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
| eu_rights_str_mv |
openAccess |
| dc.format.none.fl_str_mv |
application/pdf |
| dc.publisher.none.fl_str_mv |
Universidade Estadual de Feira de Santana |
| dc.publisher.program.fl_str_mv |
Mestrado em Computa??o Aplicada |
| dc.publisher.initials.fl_str_mv |
UEFS |
| dc.publisher.country.fl_str_mv |
Brasil |
| dc.publisher.department.fl_str_mv |
DEPARTAMENTO DE TECNOLOGIA |
| publisher.none.fl_str_mv |
Universidade Estadual de Feira de Santana |
| dc.source.none.fl_str_mv |
reponame:Biblioteca Digital de Teses e Dissertações da UEFS instname:Universidade Estadual de Feira de Santana (UEFS) instacron:UEFS |
| instname_str |
Universidade Estadual de Feira de Santana (UEFS) |
| instacron_str |
UEFS |
| institution |
UEFS |
| reponame_str |
Biblioteca Digital de Teses e Dissertações da UEFS |
| collection |
Biblioteca Digital de Teses e Dissertações da UEFS |
| bitstream.url.fl_str_mv |
http://tede2.uefs.br:8080/bitstream/tede/242/4/Disserta%C3%A7%C3%A3o-Danilo-Vers%C3%A3o-final-p%C3%B3s-banca+.pdf.jpg http://tede2.uefs.br:8080/bitstream/tede/242/3/Disserta%C3%A7%C3%A3o-Danilo-Vers%C3%A3o-final-p%C3%B3s-banca+.pdf.txt http://tede2.uefs.br:8080/bitstream/tede/242/2/Disserta%C3%A7%C3%A3o-Danilo-Vers%C3%A3o-final-p%C3%B3s-banca+.pdf http://tede2.uefs.br:8080/bitstream/tede/242/1/license.txt |
| bitstream.checksum.fl_str_mv |
d6458ece3bdd6321644c67d447356d00 6287bef214ed47bab82ba9605839648f 0a0388f802ddac466fce74bea4b02895 bd3efa91386c1718a7f26a329fdcb468 |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
| repository.name.fl_str_mv |
Biblioteca Digital de Teses e Dissertações da UEFS - Universidade Estadual de Feira de Santana (UEFS) |
| repository.mail.fl_str_mv |
bcuefs@uefs.br|| bcref@uefs.br||bcuefs@uefs.br |
| _version_ |
1845618183179862016 |