Harbin, James R (2011) Security Strategies In Wireless Sensor Networks. PhD thesis, University of York.
Abstract
This thesis explores security issues in wireless sensor networks (WSNs), and network-layer countermeasures to threats involving routing metrics. Before WSNs can
mature to the point of being integrated into daily infrastructure, it is vital that the sensor network technologies involved become sufficiently mature and robust against malicious attack to be trustworthy.
Although cryptographic approaches and dedicated security modules are vital, it is important to employ defence in depth via a suite of approaches. A productive approach
is to integrate security awareness into the network-layer delivery mechanisms, such as multihop routing or longer-range physical layer approaches. An ideal approach would be workable within realistic channel conditions, impose no complexity for additional control packets or sentry packets, while being fully distributed and scalable.
A novel routing protocol is presented (disturbance-based routing) which attempts to avoid wormholes via their static and dynamic topology properties. Simulation results demonstrate its avoidance performance advantages in a variety of topologies. A reputation-based routing approach is introduced, drawing insights from reinforcement learning, which retains routing decisions from an earlier stabilisation phase. Results again demonstrate favourable avoidance properties at a reduced energy cost.
Distributed beamforming is explored at the system level, with an architecture provided allowing it to support data delivery in a predominantly multihop routing topology. The vulnerability of beamforming data transmission to jamming attacks is considered analytically and via simulation, and contrasted with multihop routing. A cross-layer approach (physical reputation-based routing) which feeds physical-layer information into the reputation-based routing algorithm is presented, permitting candidate routes that make use of the best beamforming relays to be discovered.
Finally, consideration is given to further work on how cognitive security can save energy by allowing nodes to develop a more efficient awareness of their threat environment.
Metadata
Supervisors: | Mitchell, Paul and Pearce, Dave |
---|---|
Awarding institution: | University of York |
Academic Units: | The University of York > School of Physics, Engineering and Technology (York) |
Academic unit: | Electronics |
Identification Number/EthosID: | uk.bl.ethos.550253 |
Depositing User: | Mr James R Harbin |
Date Deposited: | 27 Feb 2012 11:05 |
Last Modified: | 21 Mar 2024 14:10 |
Open Archives Initiative ID (OAI ID): | oai:etheses.whiterose.ac.uk:2103 |
Download
handin
Filename: handin.pdf
Licence:
This work is licensed under a Creative Commons Attribution-ShareAlike 2.5 License
Export
Statistics
You do not need to contact us to get a copy of this thesis. Please use the 'Download' link(s) above to get a copy.
You can contact us about this thesis. If you need to make a general enquiry, please see the Contact us page.