Please use this identifier to cite or link to this item:
Title: Secure and Efficient Dealing with Node Capture Attack in Wireless Sensor Networks
Researcher: Agrwal, Sarita
Guide(s): Manik Lal Das
Keywords: Wireless Sensor Networks
Sensor Node Architecture
Node Capture Attack
University: Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT)
Completed Date: 2017
Abstract: quotWireless Sensor Networks (WSN) have found enormous applications in various newlineareas of day-to-day life such as in health-care, battle-field surveillance and disaster management. The communication amongst the sensor nodes within a WSN takes place on an unreliable wireless channel. Therefore, the nodes are vulnerable to various security attacks such as eavesdropping and message replay attack. Typically, the sensor nodes in a WSN are mostly deployed in unattended areas that render the nodes vulnerable to physical attacks. Node capture attack is one of the most precarious attacks that allows an adversary to physically capture, reprogram and redeploy a node in the network to carry out other malicious activities such as routing or cloning attacks and may badly hamper the normal functionality of the network. In this thesis, we address the node capture attack with a newlinesecure and efficient solution framework that comprises of a set of protocols for secure key establishment, detection of node capture attack and revocation of a victim of node capture attack. For secure key establishment, we worked on pairwise key establishment and key update and propose a protocol that use multiple polynomial shares based master secret and update the pair-wise key for each session using random inputs from the pair of nodes involved. We then propose selfhealing and mutual-healing enabled group key distribution protocols. First, we present a protocol using bilinear pairing and then a protocol that uses Chinese remainder newlinetheorem (CRT) based secret sharing. Detection of node capture attack is carried out using program integrity verification of suspect node by cluster heads equipped with trusted platform module (TPM). To revoke a node capture victim,we propose a node revocation and key update protocol. newline newlineWe used analytical reasoning, theorem proving technique and formal analysis with ProVerif tool to analyze the security of the proposed protocols.
Pagination: xv, 197 p.
Appears in Departments:Department of Information and Communication Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File83.62 kBAdobe PDFView/Open
02_declaration and certificate.pdf83.62 kBAdobe PDFView/Open
03_acknowledgements.pdf59.98 kBAdobe PDFView/Open
04_contents.pdf102.4 kBAdobe PDFView/Open
06_list of symbols and acronyms.pdf100.95 kBAdobe PDFView/Open
07_list of tables.pdf61.42 kBAdobe PDFView/Open
08_list of figures.pdf68.43 kBAdobe PDFView/Open
09_chapter 1.pdf634.12 kBAdobe PDFView/Open
10_chapter 2.pdf403.59 kBAdobe PDFView/Open
11_chapter 3.pdf459.25 kBAdobe PDFView/Open
12_chapter 4.pdf342.72 kBAdobe PDFView/Open
13_chapter 5.pdf636.55 kBAdobe PDFView/Open
14_chapter 6.pdf239.93 kBAdobe PDFView/Open
15_chapter 7.pdf79.1 kBAdobe PDFView/Open
16_bibliography.pdf150.94 kBAdobe PDFView/Open
17_appendix.pdf126.5 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.