Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Secure Connectivity Through Key Predistribution Under Jamming Attacks In Ad Hoc and Sensor Networks

Panyim, Korporn (2010) Secure Connectivity Through Key Predistribution Under Jamming Attacks In Ad Hoc and Sensor Networks. Doctoral Dissertation, University of Pittsburgh. (Unpublished)

[img]
Preview
PDF
Primary Text

Download (7MB) | Preview

Abstract

Wireless ad hoc and sensor networks have received attention from research communities over the last several years. The ability to operate without a fixed infrastructure is suitable for a wide range of applications which in many cases require protection from security attacks. One of the first steps to provide security is to distribute cryptographic keys among nodes for bootstrapping security. The unique characteristics of ad hoc networks create a challenge in distributing keys among limited resource devices. In this dissertation we study the impact on secure connectivity achieved through key pre-distribution, of jamming attacks which form one of the easiest but efficient means for disruption of network connectivity. In response to jamming, networks can undertake different coping strategies (e.g., using power adaptation, spatial retreats, and directional antennas). Such coping techniques have impact in terms of the changing the initial secure connectivity created by secure links through key predistribution. The objective is to explore how whether predistribution techniques are robust enough for ad hoc/sensor networks that employ various techniques to cope with jamming attacks by taking into account challenges that arise with key predistribution when strategies for coping with jamming attacks are employed. In the first part of this dissertation we propose a hybrid key predistribution scheme that supports ad hoc/sensor networks that use mobility to cope with jamming attacks. In the presence of jamming attacks, this hybrid scheme provides high key connectivity while reducing the number of isolated nodes (after coping with jamming using spatial retreats). The hybrid scheme is a combination of random key predistribution and deployment-based key predistribution schemes that have complementary useful features for secure connectivity. In the second part we study performance of these key predistribution schemes under other jamming coping techniques namely power adaptation and directional antennas. We show that the combination of the hybrid key predistribution and coping techniques can help networks in maintaining secure connectivity even under jamming attacks.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: University of Pittsburgh ETD
Status: Unpublished
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Panyim, Korpornkorporn@gmail.com
ETD Committee:
TitleMemberEmail AddressPitt UsernameORCID
Committee ChairKrishnamurthy, Prashantprashant@mail.sis.pitt.eduPRASHK
Committee MemberTipper, Davidtipper@tele.pitt.eduDTIPPER
Committee MemberJoshi, James B.Djjoshi@pitt.eduJJOSHI
Committee MemberThompson, Richard A.rthompso@pitt.eduRTHOMPSO
Committee MemberQian, Yiyqian@mail.unomaha.edu
Date: 23 December 2010
Date Type: Completion
Defense Date: 2 September 2010
Approval Date: 23 December 2010
Submission Date: 5 October 2010
Access Restriction: No restriction; Release the ETD for access worldwide immediately.
Institution: University of Pittsburgh
Schools and Programs: School of Information Sciences > Information Science
Degree: PhD - Doctor of Philosophy
Thesis Type: Doctoral Dissertation
Refereed: Yes
Uncontrolled Keywords: Ad hoc Networks; Jamming Attacks; Key predistribution; Sensor Networks
Other ID: http://etd.library.pitt.edu/ETD/available/etd-10052010-022731/, etd-10052010-022731
Date Deposited: 10 Nov 2011 20:02
Last Modified: 15 Nov 2016 13:50
URI: http://d-scholarship.pitt.edu/id/eprint/9439

Metrics

Monthly Views for the past 3 years

Plum Analytics


Actions (login required)

View Item View Item