Securing sensor network

dc.contributor.advisorKing, Brian
dc.contributor.authorZare Afifi, Saharnaz
dc.contributor.otherRizkalla, Maher E.
dc.contributor.otherSalama, Paul
dc.date.accessioned2015-04-15T15:10:21Z
dc.date.available2015-04-15T15:10:21Z
dc.date.issued2014
dc.degree.date2014en_US
dc.degree.disciplineElectrical & Computer Engineeringen
dc.degree.grantorPurdue Universityen_US
dc.degree.levelM.S.en_US
dc.descriptionIndiana University-Purdue University Indianapolis (IUPUI)en_US
dc.description.abstractA wireless sensor network consists of lightweight nodes with a limited power source. They can be used in a variety of environments, especially in environments for which it is impossible to utilize a wired network. They are easy/fast to deploy. Nodes collect data and send it to a processing center (base station) to be analyzed, in order to detect an event and/or determine information/characteristics of the environment. The challenges for securing a sensor network are numerous. Nodes in this network have a limited amount of power, therefore they could be faulty because of a lack of battery power and broadcast faulty information to the network. Moreover, nodes in this network could be prone to different attacks from an adversary who tries to eavesdrop, modify or repeat the data which is collected by other nodes. Nodes may be mobile. There is no possibility of having a fixed infrastructure. Because of the importance of extracting information from the data collected by the sensors in the network there needs to be some level of security to provide trustworthy information. The goal of this thesis is to organize part of the network in an energy efficient manner in order to produce a suitable amount of integrity/security. By making nodes monitor each other in small organized clusters we increase security with a minimal energy cost. To increase the security of the network we use cryptographic techniques such as: public/ private key, manufacturer signature, cluster signature, etc. In addition, nodes monitor each other's activity in the network, we call it a "neighborhood watch" In this case, if a node does not forward data, or modifies it, and other nodes which are in their transmission range can send a claim against that node.en_US
dc.identifier.urihttps://hdl.handle.net/1805/6186
dc.identifier.urihttp://dx.doi.org/10.7912/C2/2517
dc.language.isoen_USen_US
dc.subjectCluster-Base Networken_US
dc.subjectThreshold Signatureen_US
dc.subjectData Aggregationen_US
dc.subjectWireless Networken_US
dc.subjectAd-hoc Networken_US
dc.subjectNeighborhood Watchen_US
dc.subject.lcshAd hoc networks (Computer networks) -- Researchen_US
dc.subject.lcshThreshold signatures -- Researchen_US
dc.subject.lcshData encryption (Computer science) -- Researchen_US
dc.subject.lcshComputer networks -- Security measuresen_US
dc.subject.lcshWireless communication systemsen_US
dc.subject.lcshWireless LANsen_US
dc.subject.lcshGroup signatures (Computer security)en_US
dc.subject.lcshData protectionen_US
dc.subject.lcshComputer security -- Managementen_US
dc.subject.lcshSensor networks -- Researchen_US
dc.subject.lcshPattern recognition systemsen_US
dc.subject.lcshComputers -- Access controlen_US
dc.subject.lcshComputer network protocolsen_US
dc.titleSecuring sensor networken_US
dc.typeThesisen
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
finalthesis.pdf
Size:
1.45 MB
Format:
Adobe Portable Document Format
Description:
Thesis
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.88 KB
Format:
Item-specific license agreed upon to submission
Description: