Search Results (1 - 2 of 2 Results)

Sort By  
Sort Dir
 
Results per page  

Gottumukkala, Venkata Praneeth VarmaProviding Location Privacy to Base Station in Wireless Sensor Networks
MS, University of Cincinnati, 2012, Engineering and Applied Science: Computer Science
Wireless sensor networks are ad hoc networks with sensing capabilities. Robustness and Scalability of WSNs make them effective in many critical application areas like defense. Security is the top most priority in such applications to keep the WSN functional for a long period of time. In our study, we attempted to counter a subset of the security issues in WSNs - Location privacy of Base station(BS) in a WSN. We proposed three novel methods- BLAST, APCAPT and hybrid method that combines the two techniques to provide location privacy to the Base station using power control (varying the power with which sensor nodes transmit their packets in a WSN). These techniques protect the BS against Packet Tracing and Traffic Analysis attacks from a Local attacker and against a Global attacker to a certain extent. Through these techniques, we provide security while optimizing the use of energy throughout the network while maintaining an optimal delay for reporting events to the BS. The idea is to vary the transmission ranges of a few or all of the sensor nodes in the WSN. By doing so, we ensure that the attacker cannot trace the packets to the BS using the strength and angle of arrival of the signal. We evaluate the performance of our techniques based on extra energy consumed and the network delay incurred while providing secured communication.

Committee:

Dharma Agrawal, D.Sc. (Committee Chair); Yizong Cheng, Ph.D. (Committee Member); Chia Han, Ph.D. (Committee Member)

Subjects:

Computer Science

Keywords:

Wireless Sensor Networks;Security;Physical Location Privacy;Base Station Protection;Packet Tracer Attack;Traffic Analysis Attack;

GUPTA, ANANYADECENTRALIZED KEY GENERATION SCHEME FOR CELLULAR-BASED HETEROGENEOUS WIRELESS Ad Hoc NETWORKS
MS, University of Cincinnati, 2006, Engineering : Computer Engineering
A majority of group communication applications in cellular-based heterogeneous wireless setups entail secure data exchange. The problem can be effectively tackled if the underlying cellular infrastructure is used to provide an authentication backbone to the security associations. We propose a novel distributed ID based key exchange mechanism using shared polynomials in which the shares are generated by the communicating groups. Our idea employs a mechanism where the Base Stations (BSs) carry out an initial key generation by a polynomial in a distributed manner and then pass on the key material to the Mobile Stations (MSs). The multi-interface MSs can now securely communicate over interfaces other than cellular. The scheme incorporates symmetric polynomials, which are chosen by the BS acting as polynomial distributors. Simulations done to measure performance have shown encouraging results.

Committee:

Dr. Agrawal Dharma (Advisor)

Subjects:

Computer Science

Keywords:

Ad hoc networks; Base Station; Cellular networks; Distributed algorithm; Heterogeneous networks; Multi-interface Mobile Station; Pairwise key; Polynomial; Symmetric key