Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/177287
Title: | Secure and Efficient Dealing with Node Capture Attack in Wireless Sensor Networks |
Researcher: | Agrwal, Sarita |
Guide(s): | Manik Lal Das |
Keywords: | Wireless Sensor Networks Sensor Node Architecture Node Capture Attack |
University: | Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT) |
Completed Date: | 2017 |
Abstract: | quotWireless Sensor Networks (WSN) have found enormous applications in various newlineareas of day-to-day life such as in health-care, battle-field surveillance and disaster management. The communication amongst the sensor nodes within a WSN takes place on an unreliable wireless channel. Therefore, the nodes are vulnerable to various security attacks such as eavesdropping and message replay attack. Typically, the sensor nodes in a WSN are mostly deployed in unattended areas that render the nodes vulnerable to physical attacks. Node capture attack is one of the most precarious attacks that allows an adversary to physically capture, reprogram and redeploy a node in the network to carry out other malicious activities such as routing or cloning attacks and may badly hamper the normal functionality of the network. In this thesis, we address the node capture attack with a newlinesecure and efficient solution framework that comprises of a set of protocols for secure key establishment, detection of node capture attack and revocation of a victim of node capture attack. For secure key establishment, we worked on pairwise key establishment and key update and propose a protocol that use multiple polynomial shares based master secret and update the pair-wise key for each session using random inputs from the pair of nodes involved. We then propose selfhealing and mutual-healing enabled group key distribution protocols. First, we present a protocol using bilinear pairing and then a protocol that uses Chinese remainder newlinetheorem (CRT) based secret sharing. Detection of node capture attack is carried out using program integrity verification of suspect node by cluster heads equipped with trusted platform module (TPM). To revoke a node capture victim,we propose a node revocation and key update protocol. newline newlineWe used analytical reasoning, theorem proving technique and formal analysis with ProVerif tool to analyze the security of the proposed protocols. |
Pagination: | xv, 197 p. |
URI: | http://hdl.handle.net/10603/177287 |
Appears in Departments: | Department of Information and Communication Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 83.62 kB | Adobe PDF | View/Open |
02_declaration and certificate.pdf | 83.62 kB | Adobe PDF | View/Open | |
03_acknowledgements.pdf | 59.98 kB | Adobe PDF | View/Open | |
04_contents.pdf | 102.4 kB | Adobe PDF | View/Open | |
06_list of symbols and acronyms.pdf | 100.95 kB | Adobe PDF | View/Open | |
07_list of tables.pdf | 61.42 kB | Adobe PDF | View/Open | |
08_list of figures.pdf | 68.43 kB | Adobe PDF | View/Open | |
09_chapter 1.pdf | 634.12 kB | Adobe PDF | View/Open | |
10_chapter 2.pdf | 403.59 kB | Adobe PDF | View/Open | |
11_chapter 3.pdf | 459.25 kB | Adobe PDF | View/Open | |
12_chapter 4.pdf | 342.72 kB | Adobe PDF | View/Open | |
13_chapter 5.pdf | 636.55 kB | Adobe PDF | View/Open | |
14_chapter 6.pdf | 239.93 kB | Adobe PDF | View/Open | |
15_chapter 7.pdf | 79.1 kB | Adobe PDF | View/Open | |
16_bibliography.pdf | 150.94 kB | Adobe PDF | View/Open | |
17_appendix.pdf | 126.5 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: