Search In this Thesis
   Search In this Thesis  
العنوان
Secure cluster formation for Wireless Sensor Networks\
الناشر
Ain Shams university.
المؤلف
El-Saadawy,Mona Essam Ibrahim.
هيئة الاعداد
مشرف / Eman M. Shaaban
مشرف / Hossam M. Faheem
مشرف / Eman M. Shaaban
باحث / Mona Essam Ibrahim El-Saadawy
الموضوع
Secure cluster. Wireless Sensor Networks
تاريخ النشر
2012
عدد الصفحات
p.:113
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Information Systems
تاريخ الإجازة
1/1/2012
مكان الإجازة
اتحاد مكتبات الجامعات المصرية - Computer Systems.
الفهرس
Only 14 pages are availabe for public view

from 113

from 113

Abstract

Recent advances in micro-electro-mechanical systems (MEMS) technology, wireless communications, and digital electronics have enabled the development of the wireless sensor networks (WSN). WSN can be used for various application areas (e.g., military, home, environment).
Several design challenges present themselves to designers of WSN applications. The limited resources available to individual sensor nodes imply that designers must develop highly distributed, fault-tolerant, and energy-efficient applications in a small memory-footprint.
Sensor networks are self organized networks, which makes them exposed to dangerous and harmful situations. This in turn makes them easy targets for attacks. It is important to apply some level of security such that sensor networks will be difficult to be attacked, especially when they are used in critical applications.
In large sensor networks, clustering sensor nodes into small groups is an effective technique to achieve scalability, self-organization, power saving, channel access, routing, etc. However, clustered WSNs are vulnerable to a number of attacks specially those involving cluster heads (CHs). The impact of these attacks are particularly damaging, because CHs are responsible for critical functions such as data aggregation and routing.
A number of cluster formation protocols have been proposed recently. However, most existing protocols assume benign environments. Studies that aim at securing clustered WSNs have grown significantly and it’s still an open research area. A secure clustering protocol that achieves the desired security goals while keeping an acceptable level of energy consumption is a challenging problem in wireless sensor network.
S-LEACH is the first modified version of LEACH (Low Energy Adaptive Clustering Hierarchy) with cryptographic protection against outsider attacks.
With an inspiration from S-LEACH protocol, we proposed MS-LEACH protocol to enhance the security of S-LEACH by providing data confidentiality and node-CH authentication using pairwise keys shared between CHs and their cluster members. A simulation based on performance evaluation of MS-LEACH protocol by employing different cryptographic functions is conducted and compared against original S-LEACH. MS-LEACH has adopted the cryptographic function of blowfish algorithm due to its efficiency over other cryptographic functions.
The security analysis of proposed MS-LEACH shows that it has comprehensive security properties and achieves a large set of WSN security goals compared to the existing secured solutions of LEACH protocol.
The experimental results has shown the effectiveness of proposed MS-LEACH protocol and show this protocol can provide the intended security goals while keeping an acceptable level of energy consumption and outperform other protocols in terms of energy consumption, network lifetime, network throughput and normalized routing load.