DACRA: A LIGHT WEIGHT HYBRID APPROACH to DEFEND against CRIPPLING ROUTING ATTACKS in WIRELESS SENSOR NETWORKS

DC Field Value Language
dc.contributor.advisorMan-pyo Hone-
dc.contributor.authorTariq, Usman-
dc.date.accessioned2019-10-21T07:14:01Z-
dc.date.available2019-10-21T07:14:01Z-
dc.date.issued2010-08-
dc.identifier.other10886-
dc.identifier.urihttps://dspace.ajou.ac.kr/handle/2018.oak/17566-
dc.description학위논문(박사)--아주대학교 정보통신전문대학원 :정보통신공학과,2010. 8-
dc.description.tableofcontentsChapter 1: INTRODUCTION 1 1.1. Motivation 2 1.1.1. Approach 3 1.1.2. Analysis of Scheme 3 1.2. Thesis Contribution 4 1.3. Organization of Thesis 8 Chapter 2: BACKGROUND AND RELATED WORK 10 2.1 Background Study 10 2.1.1 Constraints in Wireless Sensor Networks 10 2.1.2 Security Goals 24 2.3 Attacks on Wireless Sensor Network 26 2.2 Related Work 30 2.2.1 Malicious Hello Flooding 30 2.2.2 Selective Forwarding 31 2.2.3 Sybil Attack 34 2.2.4 Network Portioning and Routing Algorithm 36 2.2.5 Localization Resilient Defense 42 CHAPTER 3: ASSUMPTIONS AND NETWORK MODELS 51 3.1 Assumptions 51 3.2 Network Model 52 3.2.1 Quadratic Neighbor Finding Algorithm 55 3.2.2 Quad Tree Merge Criteria 56 CHAPTER 4: PROPOSED SCHEME 59 4.1 Witness based authentication 59 4.1 Control Packet Broadcast Authentication 59 4.2 Defense against Wormhole attack using localization scheme 63 4.2.1 Quad Localization 65 4.2.2 Defense against Wormhole attack 71 CHAPTER 5: EVALUATION 74 CONCLUSION 93-
dc.language.isoeng-
dc.publisherThe Graduate School, Ajou University-
dc.rights아주대학교 논문은 저작권에 의해 보호받습니다.-
dc.titleDACRA: A LIGHT WEIGHT HYBRID APPROACH to DEFEND against CRIPPLING ROUTING ATTACKS in WIRELESS SENSOR NETWORKS-
dc.typeThesis-
dc.contributor.affiliation아주대학교 정보통신전문대학원-
dc.contributor.department정보통신전문대학원 정보통신공학과-
dc.date.awarded2010. 8-
dc.description.degreeMaster-
dc.identifier.localId568643-
dc.identifier.urlhttp://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000010886-
dc.subject.keywordInformation and Communication-
dc.description.alternativeAbstractUbiquitous wireless sensor networks are networks consisting of several small computers operational with sensors to discover events like human movement with infrared sensors or resolve the existing state of certain parameters like temperature. These sensor nodes are assembled with a radio to commune with each other and to broadcast data to a central computer where this data can be analyzed. These new sensing computing machines come with new challenges. To eliminate the limitations imposed by wires, sensors possess limited energy sources and correspond with neighboring nodes using wireless networks. Due to critical nature of applications, securing data generated in sensor field by sensors is important. While data security is necessary, the functionality cost in terms of routing and energy needs to be assessed carefully. Limited bandwidth and memory pull the trigger to make more sophisticated and light weight cryptography models. Moreover, deployment of tiny devices like sensor nodes in hostile environment, make it easier for intruder to budge in, plant attack node or control over the legitimate node to launch an attack. In this thesis, we have analyzed the basic threat model in ubiquitous wireless sensor network (USWN), and presented a quad tree based network portioning scheme, which ensure data accuracy at primary level. Each sensor node maintains neighboring table which stores the node information, our neighbor voting based defense solution helps to authenticate clear text broadcast of control packets. Once we have identified malicious node, our localization scheme can highlight the vulnerable node locality, even most of anchors are compromised. Localization scheme also helped us to strengthen defense against Sybil attack and wormhole attack. We analyze security of proposed scheme against Hello flood, data authentication attacks, node cloning attack and routing attacks. In the existing scenarios, where diverse security services are independent from each other, each service adds an additive communication overhead. By incorporating energy-concentrated security services that are regularly required in sensor network applications, we considerably decrease the energy.-
Appears in Collections:
Special Graduate Schools > Graduate School of Information and Communication Technology > Department of Information and Communication > 3. Theses(Master)
Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Browse