Show simple item record

dc.contributor.authorReindl, Phillip Steven
dc.description.abstractIn many secure wireless network attack scenarios, the source of a data packet is as sensitive as the data it contains. Existing work to provide source anonymity in wireless sensor networks (WSN) are not frugal in terms of transmission overhead. We present a set of schemes to provide secure source anonymity. As the state of the art in WSN advances, researchers increasingly look to heterogeneous network topologies. We leverage high powered cluster head nodes to further reduce transmission overhead and provide excellent scalability. A significant threat to WSN is the insider attack due to the ease of tampering with low-cost sensors. Should a node become compromised and start making malicious collisions, it is desirable to identify the corrupt node and revoke its keys. We present schemes to identify the source of an arbitrary transmission in a reliable and distributed fashion.en_US
dc.publisherNorth Dakota State Universityen_US
dc.rightsNDSU policy 190.6.2en_US
dc.titleAnonymity and Hostile Node Identification in Wireless Sensor Networksen_US
dc.typeThesisen_US
dc.date.accessioned2024-01-27T18:41:28Z
dc.date.available2024-01-27T18:41:28Z
dc.date.issued2010
dc.identifier.urihttps://hdl.handle.net/10365/33637
dc.subject.lcshWireless sensor networks -- Security measures.en_US
dc.subject.lcshWireless sensor nodes.en_US
dc.subject.lcshData protection.en_US
dc.rights.urihttps://www.ndsu.edu/fileadmin/policy/190.pdfen_US
ndsu.degreeMaster of Science (MS)en_US
ndsu.collegeEngineeringen_US
ndsu.departmentComputer Scienceen_US
ndsu.programComputer Scienceen_US
ndsu.advisorNygard, Kendall
ndsu.advisorDu, Xiaojiang


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record