2 results
Search Results
Now showing 1 - 2 of 2
Item Post-Deployment Key Management in Heterogeneous Wireless Sensor Networks(North Dakota State University, 2010) Loree, Paul EdwardMany wireless sensor network applications require secure communication between nodes in the network. However, establishing pair-wise keys between nodes to provide security is challenging due to the limited resources in sensor nodes and the hostile environments in which they are deployed. Many key establishment schemes have been previously proposed for wireless sensor networks. However, most of these schemes were designed to work in a homogeneous network environment in which the nodes all have similar capabilities. Our work establishes that better performance can be achieved in a heterogeneous sensor network environment. We present a key management scheme for establishing pair-wise keys after deployment in a heterogeneous wireless sensor network. We take advantage of the more powerful nodes present in a heterogeneous network to reduce the communication overhead and ultimately the power consumption necessary to perform these services to the network. Additionally, by taking advantage of these nodes we are able to increase the overall network connectivity and resiliency against node capture attacks.Item Anonymity and Hostile Node Identification in Wireless Sensor Networks(North Dakota State University, 2010) Reindl, Phillip StevenIn many secure wireless network attack scenarios, the source of a data packet is as sensitive as the data it contains. Existing work to provide source anonymity in wireless sensor networks (WSN) are not frugal in terms of transmission overhead. We present a set of schemes to provide secure source anonymity. As the state of the art in WSN advances, researchers increasingly look to heterogeneous network topologies. We leverage high powered cluster head nodes to further reduce transmission overhead and provide excellent scalability. A significant threat to WSN is the insider attack due to the ease of tampering with low-cost sensors. Should a node become compromised and start making malicious collisions, it is desirable to identify the corrupt node and revoke its keys. We present schemes to identify the source of an arbitrary transmission in a reliable and distributed fashion.