Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks

Sensor networks are dense wireless networks constituting of small and low-cost sensors that collect and disseminate sensory data. They have gained great attention in recent years due to their ability to offer economical and effective solutions in a variety of fields; and their profound suitability t...

Full description

Bibliographic Details
Main Author: Khalifa, Tarek
Language:en
Published: 2007
Subjects:
Online Access:http://hdl.handle.net/10012/3333
id ndltd-LACETR-oai-collectionscanada.gc.ca-OWTU.10012-3333
record_format oai_dc
spelling ndltd-LACETR-oai-collectionscanada.gc.ca-OWTU.10012-33332013-10-04T04:08:13ZKhalifa, Tarek2007-09-27T13:50:07Z2007-09-27T13:50:07Z2007-09-27T13:50:07Z2007http://hdl.handle.net/10012/3333Sensor networks are dense wireless networks constituting of small and low-cost sensors that collect and disseminate sensory data. They have gained great attention in recent years due to their ability to offer economical and effective solutions in a variety of fields; and their profound suitability to address mission critical problems that are common in health, transportation, and military applications. “Sensor networks” is a technology that is seen to change the world, and as such their deployment is expected to see a rapid growth. Effective security strategy is essential for any sensor network in order to maintain trustful and reliable functionality, protect sensory information, and ensure network component authenticity. Security models and protocols that are typically used in other types of networks, such as wired networks, are not suitable for sensor networks due to their specific hardware specifications. This thesis highlights some of the research done so far in the area of security of wireless sensor networks and proposes a solution to detect Byzantine behaviour - a challenging security threat that many sensor networks face. The proposed solution’s use of cryptography is kept at a minimum to ensure maximum secure bandwidth. Under this solution, a sensor network continues to work normally until an attack is suspected. Once an attack is suspected, a cryptography scheme is enabled to authenticate suspected nodes and to allow the identification of potential external attacks. If an attack seems to persist after the cryptography scheme has been enabled, the same mechanism is used to identify and isolate potentially compromised nodes. The goal is to introduce a degree of intelligence into such networks and consequently improve reliability of data collection, accuracy of aggregated data, and prolong network lifetime.ensecuritybyzantinesecure aggregationsensor networksSecure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor NetworksThesis or DissertationElectrical and Computer EngineeringMaster of Applied ScienceElectrical and Computer Engineering
collection NDLTD
language en
sources NDLTD
topic security
byzantine
secure aggregation
sensor networks
Electrical and Computer Engineering
spellingShingle security
byzantine
secure aggregation
sensor networks
Electrical and Computer Engineering
Khalifa, Tarek
Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks
description Sensor networks are dense wireless networks constituting of small and low-cost sensors that collect and disseminate sensory data. They have gained great attention in recent years due to their ability to offer economical and effective solutions in a variety of fields; and their profound suitability to address mission critical problems that are common in health, transportation, and military applications. “Sensor networks” is a technology that is seen to change the world, and as such their deployment is expected to see a rapid growth. Effective security strategy is essential for any sensor network in order to maintain trustful and reliable functionality, protect sensory information, and ensure network component authenticity. Security models and protocols that are typically used in other types of networks, such as wired networks, are not suitable for sensor networks due to their specific hardware specifications. This thesis highlights some of the research done so far in the area of security of wireless sensor networks and proposes a solution to detect Byzantine behaviour - a challenging security threat that many sensor networks face. The proposed solution’s use of cryptography is kept at a minimum to ensure maximum secure bandwidth. Under this solution, a sensor network continues to work normally until an attack is suspected. Once an attack is suspected, a cryptography scheme is enabled to authenticate suspected nodes and to allow the identification of potential external attacks. If an attack seems to persist after the cryptography scheme has been enabled, the same mechanism is used to identify and isolate potentially compromised nodes. The goal is to introduce a degree of intelligence into such networks and consequently improve reliability of data collection, accuracy of aggregated data, and prolong network lifetime.
author Khalifa, Tarek
author_facet Khalifa, Tarek
author_sort Khalifa, Tarek
title Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks
title_short Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks
title_full Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks
title_fullStr Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks
title_full_unstemmed Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks
title_sort secure data aggregation protocol with byzantine robustness for wireless sensor networks
publishDate 2007
url http://hdl.handle.net/10012/3333
work_keys_str_mv AT khalifatarek securedataaggregationprotocolwithbyzantinerobustnessforwirelesssensornetworks
_version_ 1716599870448467968