Data Security in Unattended Wireless Sensor Networks

FieldValue
dc.contributor.authorVepanjeri Lokanadha Reddy, Sasi Kiran
dc.date.accessioned2013-01-14T16:36:27Z
dc.date.available2013-01-14T16:36:27Z
dc.date.created2013
dc.date.issued2013
dc.identifier.urihttp://hdl.handle.net/10393/23646
dc.identifier.urihttp://dx.doi.org/10.20381/ruor-6373
dc.description.abstractIn traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deployed in environments where it is not practical for the sink to be online all the time. Saving data in the memory of the nodes for a long time causes security problems due to the lack of tamper-resistant hardware. Data collected by the nodes has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN is a challenging task. We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We also propose a data authentication scheme against a mobile adversary trying to modify the data. The proposed data authentication scheme uses inexpensive cryptographic primitives and few message exchanges. The proposed solutions are analyzed both mathematically and using simulations proving that the proposed solutions are better than the previous ones in terms of security and communication overhead.
dc.language.isoen
dc.publisherUniversité d'Ottawa / University of Ottawa
dc.subjectUnattended wireless sensor network
dc.subjectSecurity
dc.subjectProactive adversary
dc.subjectReactive Adversary
dc.subjectData Authentication
dc.subjectData survivability
dc.subjectCryptography
dc.titleData Security in Unattended Wireless Sensor Networks
dc.typeThesis
dc.faculty.departmentScience informatique et génie électrique / Electrical Engineering and Computer Science
dc.contributor.supervisorNayak, Amiya
dc.embargo.termsimmediate
dc.degree.nameMCS
dc.degree.levelmasters
dc.degree.disciplineGénie / Engineering
thesis.degree.nameMCS
thesis.degree.levelMasters
thesis.degree.disciplineGénie / Engineering
uottawa.departmentScience informatique et génie électrique / Electrical Engineering and Computer Science
CollectionThèses, 2011 - // Theses, 2011 -

Files