Search In this Thesis
   Search In this Thesis  
العنوان
Secure Key Management Scheme for Wireless
Sensor Networks\
الناشر
Ain Shams university.
المؤلف
Soliman,Tarek Soliman Ibrahim.
هيئة الاعداد
مشرف / Ahmed Ali Abdelhafez
مشرف / Wagdy Refaat Anis
مشرف / Ahmed Ali Abdelhafez
باحث / Tarek Soliman Ibrahim Soliman
الموضوع
Secure Key. Wireless Sensor Networks.
تاريخ النشر
2011
عدد الصفحات
p.:168
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2011
مكان الإجازة
جامعة عين شمس - كلية الهندسة - Electronics and Communications Engineering.
الفهرس
Only 14 pages are availabe for public view

from 168

from 168

Abstract

In this dissertation, a brief survey on WSNs aspects including WSNs key management and some important and recent proposed WSNs key management schemes was given. Key management is a critical aspect for communication security particularly in WSNs due to its limited resources.
Then two recent hierarchical key management schemes were analyzed and compared, Kausar et al and Shen et al schemes.
Comparison results showed that Kausar et al scheme is better in network resilience and scalability metrics, while Shen et al scheme is better in memory and communication overhead metrics.
Since Shen et al scheme doesn’t have revocation or rekeying mechanism, it may be better to be used in short time mission as in a temporary military mission in a specific area. While Kausar et al scheme can be used for long life applications with replacing the depleted WSN nodes to overcome the short life time of nodes due to
power consumption in computation and communication overhead.
Finally, based on the results of the conducted comparison between Kausar et al and Shen et al schemes with studying the advantages and drawbacks of each,a novel secure, scalable, simple, and efficient WSNs hierarchical deterministic key management scheme for WSNs has been proposed that based on a three-tier
network hierarchy (BS, CH, and SN) with simple computations and low communications. In addition, add new nodes, and key revocation and re-keying mechanisms have been proposed which are considered complementary features for
the proposed scheme.Then the security property of the proposed scheme was analyzed comparatively with other recent previous schemes to explore the features of the proposed scheme.
The results of analysis show that the proposed scheme is secure in all secret key establishment phases and re-keying processes, very efficient and scalable for adding new nodes in particular after deployment of WSN nodes which is a major
feature in the proposed scheme, and provides the most strongest network resilience.
The proposed scheme has been also compared with LEAP, Kausar et al, and Shen et al schemes to assess its performance, power consumption, scalability, and simplicity using NS-2 tool.
The results of comparison showed that the proposed scheme may be a good contribution for some sensitive exchanged data applications because it gives better attitude in all of scheme performance in terms of key storage overhead and
communication overhead, power consumption that means a longer WSN nodes life,
scalability that allows containing of huge number of nodes in a network or the capability to add new nodes after network deployment, and simplicity in computation operations and processes.
8.2. Future Work In future work, a study may be conducted to select from the existence or to
propose an appropriate intrusion detection algorithm to be linked with the proposed
key revocation and rekeying mechanism in this dissertation. The selected or proposed intrusion detection algorithm should fit the limited resources of WSNs.
It is also recommended to experiment the proposed scheme in real environment
applications exposing it to different types of attacks to measure its immunity against various security attacks and its practical efficiency to work well in a hostile area.