dc.contributor.author | Reindl, Phillip Steven | |
dc.description.abstract | In many secure wireless network attack scenarios, the source of a data packet is as sensitive
as the data it contains. Existing work to provide source anonymity in wireless sensor
networks (WSN) are not frugal in terms of transmission overhead. We present a set of
schemes to provide secure source anonymity. As the state of the art in WSN advances,
researchers increasingly look to heterogeneous network topologies. We leverage high
powered cluster head nodes to further reduce transmission overhead and provide excellent
scalability. A significant threat to WSN is the insider attack due to the ease of tampering
with low-cost sensors. Should a node become compromised and start making malicious
collisions, it is desirable to identify the corrupt node and revoke its keys. We present
schemes to identify the source of an arbitrary transmission in a reliable and distributed
fashion. | en_US |
dc.publisher | North Dakota State University | en_US |
dc.rights | NDSU policy 190.6.2 | en_US |
dc.title | Anonymity and Hostile Node Identification in Wireless Sensor Networks | en_US |
dc.type | Thesis | en_US |
dc.date.accessioned | 2024-01-27T18:41:28Z | |
dc.date.available | 2024-01-27T18:41:28Z | |
dc.date.issued | 2010 | |
dc.identifier.uri | https://hdl.handle.net/10365/33637 | |
dc.subject.lcsh | Wireless sensor networks -- Security measures. | en_US |
dc.subject.lcsh | Wireless sensor nodes. | en_US |
dc.subject.lcsh | Data protection. | en_US |
dc.rights.uri | https://www.ndsu.edu/fileadmin/policy/190.pdf | en_US |
ndsu.degree | Master of Science (MS) | en_US |
ndsu.college | Engineering | en_US |
ndsu.department | Computer Science | en_US |
ndsu.program | Computer Science | en_US |
ndsu.advisor | Nygard, Kendall | |
ndsu.advisor | Du, Xiaojiang | |