You are here

Secure routing in wireless sensor networks

Download pdf | Full Screen View

Date Issued:
2007
Summary:
This research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency.
Title: Secure routing in wireless sensor networks.
78 views
20 downloads
Name(s): Ibriq, Jamil
College of Engineering and Computer Science
Department of Computer and Electrical Engineering and Computer Science
Type of Resource: text
Genre: Electronic Thesis Or Dissertation
Issuance: multipart monograph
Date Issued: 2007
Publisher: Florida Atlantic University
Extent: 196 p.
Language(s): English
Summary: This research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency.
Summary: The proposed key management scheme is called Hierarchical Key Establishment Scheme (HIKES). In HIKES, the base station, acting as the central trust authority, empowers randomly selected sensors to act as local trust authorities, authenticating on its behalf the cluster members and issuing to them all secret keys necessary to secure their communications. HIKES uses a novel key escrow scheme that enables any sensor node selected as a cluster head to generate all the cryptographic keys needed to authenticate other sensors within its cluster. This scheme localizes secret key issuance and reduces the communication cost with the base station. The key escrow scheme also provides the HIKES with as large an addressing mechanism as needed. HIKES also provides a one-step broadcast authentication mechanism. HIKES provides entity authentication to every sensor in the network and is robust against most known attacks. We propose a hierarchical routing mechanism called Secure Hierarchical Energy-Efficient Routing protocol (SHEER). SHEER implements HIKES, which provides the communication security from the inception of the network. SHEER uses a probabilistic broadcast mechanism and a three-level hierarchical clustering architecture to improve the network energy performance and increase its lifetime.
Summary: Simulation results have shown that HIKES provides an energy-efficient and scalable solution to the key management problem. Cost analysis shows that HIKES is computationally efficient and has low storage requirement. Furthermore, high degree of address flexibility can be achieved in HIKES. Therefore, this scheme meets the desired criteria set forth in this work. Simulation studies also show that SHEER is more energy-efficient and has better scalability than the secure version of LEACH using HIKES.
Identifier: 209828678 (oclc), 42771 (digitool), FADT42771 (IID), fau:4283 (fedora)
Note(s): by Jamil Ibriq.
Thesis (Ph. D.)--Florida Atlantic University, 2007.
Includes bibliography.
Also available in print.
Electronic reproduction. Boca Raton, FL : 2007. Mode of access: World Wide Web.
Subject(s): Sensor networks -- Security measures
Ad hoc networks (Computer networks) -- Security measures
Wireless communication systems -- Security measures
Wireless communication systems -- Technological innovations
Mobile computing
Persistent Link to This Record: http://purl.flvc.org/FAU/42771
Links: http://ezproxy.fau.edu
Use and Reproduction: http://rightsstatements.org/vocab/InC/1.0/
Host Institution: FAU
Has Part: Secure routing in wireless sensor networks.
(OCoLC)191901903