Search In this Thesis
   Search In this Thesis  
العنوان
Secure key management scheme for wireless sensor network/
الناشر
Tarek Soliman Ibrahim Soliman,
المؤلف
Soliman,Tarek Soliman Ibrahim
هيئة الاعداد
باحث / طارق سليمان ابراهيم سليمان
مشرف / وجدى رفعت انيس
مشرف / احمد على عبد الحافظ
مناقش / فاروق باجى
مناقش / صلاح السيد ابراهيم العجوز
الموضوع
Wireless communication
تاريخ النشر
2011.
عدد الصفحات
xiioi,150 p.:
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2011
مكان الإجازة
جامعة عين شمس - كلية الهندسة - الكترونات و اتصالات
الفهرس
Only 14 pages are availabe for public view

from 189

from 189

Abstract

Wireless ensor Networks (WSNs) consist of small nodes with sensing,
computation, and wireless communications capabilities and it is expected to play an
essential role in upcoming age. WSNs are deployed in many applications relevant
to different areas in life as ecological, and health applications. Due its deployment
in unattended and hostile environments; individual sensors are vulnerable to
security compromise and susceptible to physical capture and are prone to different
types of malicious attacks. For example, an adversary can easily listen to the traffic,
impersonate one of the network nodes, or intentionally provide misleading
information to other nodes.
WSNs pose unique challenges, including low computation capability, small
memory, limited energy resources, and susceptibility to physical capture.
Furthermore, using insecure wireless communications channels makes security
a challenge in these networks. Because of the above mentioned constraints,
traditional security techniques used in traditional networks are inadequate and
cannot be applied directly. So, new ideas for securing WSNs are needed.
When setting up a secure WSN, one of the first requirements is to establish
cryptographic keys for later use, which requires an efficient and robust key
management protocol. The goal of key management is to establish required keys
between sensor nodes to be used to secure communication links upon the
exchanged data. The key management scheme should include the process by which
keys are generated, stored, protected, distributed, used, and destroyed.
Generally key management schemes should achieve some requirements as
connectivity, data confidentiality, node authentication, data integrity, availability,
data freshness. Moreover, in WSNs more requirements should be taken into consideration as well like: reducing of consumed power and communication
overhead, resilience against node capture, resistance against node replication,
revocation, scalability, and survivability.
The inherent properties of sensor networks result in WSNs key management is
a tradeoff between the performance and security. Researchers have proposed
a variety of protocols over several years for this well-studied problem.
In this research, first, comprehensive comparative study among the well known
recent key management schemes in WSNs will be conducted to evaluate and
compare the security strength and performance of these schemes. Second, using
the conclusions of the conducted study, a novel WSNs key management scheme
will be proposed. The proposed key management scheme resolves the security
holes in the studied schemes, and it is suitable to be deployed in the limited
resources WSN as well. Finally, the performance of the proposed novel scheme
will be studied and analyzed in terms of security strength, memory storage and
communication overhead, power consumption, simplicity, and scalability.