Show simple item record

dc.contributor.authorChorzempa, Michael Williamen_US
dc.date.accessioned2014-03-14T20:34:47Z
dc.date.available2014-03-14T20:34:47Z
dc.date.issued2006-04-28en_US
dc.identifier.otheretd-05022006-171402en_US
dc.identifier.urihttp://hdl.handle.net/10919/32105
dc.description.abstractLarge-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. These vulnerabilities are exacerbated when WSNs have to operate unattended in a hostile environment, such as battlefields. In such an environment, an adversary poses a physical threat to all the sensor nodes. An adversary may capture any node, compromising critical security data including keys used for encryption and authentication. Consequently, it is necessary to provide security services to these networks to ensure their survival. We propose a novel, self-organizing key management scheme for large-scale and long-lived WSNs, called Survivable and Efficient Clustered Keying (SECK). SECK provides administrative services that ensures the survivability of the network. SECK is suitable for managing keys in a hierarchical WSN consisting of low-end sensor nodes clustered around more capable gateway nodes. Using cluster-based administrative keys, SECK provides five efficient security administration mechanisms: 1) clustering and key setup, 2) node addition, 3) key renewal, 4) recovery from multiple node captures, and 5) re-clustering. All of these mechanisms have been shown to localize the impact of attacks and considerably improve the efficiency of maintaining fresh session keys. Using simulation and analysis, we show that SECK is highly robust against node capture and key compromise while incurring low communication and storage overhead.en_US
dc.publisherVirginia Techen_US
dc.relation.haspartchorzempa_thesis_v2.pdfen_US
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to Virginia Tech or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.subjectWireless Sensor Networksen_US
dc.subjectHostile Environmentsen_US
dc.subjectAdministrative Keysen_US
dc.subjectKey Managementen_US
dc.titleKey Management for Wireless Sensor Networks in Hostile Environmentsen_US
dc.typeThesisen_US
dc.contributor.departmentElectrical and Computer Engineeringen_US
dc.description.degreeMaster of Scienceen_US
thesis.degree.nameMaster of Scienceen_US
thesis.degree.levelmastersen_US
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen_US
thesis.degree.disciplineElectrical and Computer Engineeringen_US
dc.contributor.committeechairPark, Jung-Min Jerryen_US
dc.contributor.committeememberHou, Yiwei Thomasen_US
dc.contributor.committeememberHa, Dong Samen_US
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-05022006-171402/en_US
dc.date.sdate2006-05-02en_US
dc.date.rdate2006-06-09
dc.date.adate2006-06-09en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record