Pitt Logo LinkContact Us

Security in Wireless Sensor Networks Employing MACGSP6

Nitipaichit, Yuttasart (2011) Security in Wireless Sensor Networks Employing MACGSP6. Doctoral Dissertation, University of Pittsburgh.

[img]
Preview
PDF - Primary Text
Download (1963Kb) | Preview

    Abstract

    Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the security of WSNs is often not practical. At the same time, the need for security in WSNs is unavoidable. Applications such as military, medical care, structural monitoring, and surveillance systems require information security in the network. As current security mechanisms for WSNs are not sufficient, development of new security schemes for WSNs is necessary. New security schemes may be able to take advantage of the unique properties of WSNs, such as the large numbers of nodes typical in these networks to mitigate the need for cryptographic algorithms and key distribution and management. However, taking advantage of these properties must be done in an energy efficient manner. The research examines how the redundancy in WSNs can provide some security elements. The research shows how multiple random delivery paths (MRDPs) can provide data integrity for WSNs. Second, the research employs multiple sinks to increase the total number of duplicate packets received by sinks, allowing sink voting to mitigate the packet discard rate issue of a WSN with a single sink. Third, the research examines the effectiveness of using multiple random paths in maintaining data confidentiality in WSNs. Last, the research examines the use of a rate limit to cope with packet flooding attacks in WSNs.


    Share

    Citation/Export:
    Social Networking:

    Details

    Item Type: University of Pittsburgh ETD
    Creators/Authors:
    CreatorsEmailORCID
    Nitipaichit, Yuttasartyuttasart@gmail.com
    ETD Committee:
    ETD Committee TypeCommittee MemberEmailORCID
    Committee ChairKabara, Joseph
    Committee MemberRizzo, Piervincenzo
    Committee MemberKrishnamurthy, Prashant
    Committee MemberThompson, Richard
    Committee MemberZadorozhny, Vladimir
    Title: Security in Wireless Sensor Networks Employing MACGSP6
    Status: Unpublished
    Abstract: Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the security of WSNs is often not practical. At the same time, the need for security in WSNs is unavoidable. Applications such as military, medical care, structural monitoring, and surveillance systems require information security in the network. As current security mechanisms for WSNs are not sufficient, development of new security schemes for WSNs is necessary. New security schemes may be able to take advantage of the unique properties of WSNs, such as the large numbers of nodes typical in these networks to mitigate the need for cryptographic algorithms and key distribution and management. However, taking advantage of these properties must be done in an energy efficient manner. The research examines how the redundancy in WSNs can provide some security elements. The research shows how multiple random delivery paths (MRDPs) can provide data integrity for WSNs. Second, the research employs multiple sinks to increase the total number of duplicate packets received by sinks, allowing sink voting to mitigate the packet discard rate issue of a WSN with a single sink. Third, the research examines the effectiveness of using multiple random paths in maintaining data confidentiality in WSNs. Last, the research examines the use of a rate limit to cope with packet flooding attacks in WSNs.
    Date: 06 January 2011
    Date Type: Completion
    Defense Date: 09 December 2010
    Approval Date: 06 January 2011
    Submission Date: 15 December 2010
    Access Restriction: No restriction; The work is available for access worldwide immediately.
    Patent pending: No
    Institution: University of Pittsburgh
    Thesis Type: Doctoral Dissertation
    Refereed: Yes
    Degree: PhD - Doctor of Philosophy
    URN: etd-12152010-231221
    Uncontrolled Keywords: energy use; gossiping; MAC; multiple paths; routing protocols; security; Wireless sensor networks
    Schools and Programs: School of Information Sciences > Information Science
    Date Deposited: 10 Nov 2011 15:11
    Last Modified: 29 May 2012 13:06
    Other ID: http://etd.library.pitt.edu/ETD/available/etd-12152010-231221/, etd-12152010-231221

    Actions (login required)

    View Item

    Document Downloads