7 research outputs found

    Non-repudiable authentication and billing architecture for wireless mesh networks

    Get PDF
    Wireless mesh networks (WMNs) are a kind of wireless ad hoc networks that are multi-hop where packets are forwarded from source to destination by intermediate notes as well as routers that form a kind of network infrastructure backbone. We investigate the security of the recently proposed first known secure authentication and billing architecture for WMNs which eliminates the need for bilateral roaming agreements and that for traditional home-foreign domains. We show that this architecture does not securely provide incontestable billing contrary to designer claims and furthermore it does not achieve entity authentication. We then present an enhanced scheme that achieves entity authentication and nonrepudiable billing

    Key Establishment Protocol for Wireless Sensor Networks

    Get PDF

    Key Management in Static and Mobile Sensor Networks

    Get PDF
    Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. These networks are dynamic in nature that they allow addition of nodes to the network thus increasing the size of the network over time. The nodes communicate with each other in a secure manner and send processed data to the base station. This thesis concerns Key management in static and mobile sensor nodes. The network of sensor nodes is divided into clusters based on their physical locations in both cases. In addition, efficient ways of key distribution among the nodes within the cluster and among heads of clusters are discussed. The security of the network is considered through efficient key management by taking into consideration the network's power capabilities is discussed.Computer Science Departmen

    Key Management and Encryption in Wireless Sensor Networks Using Hadamard Transforms

    Get PDF
    This thesis deals with key management in wireless sensor networks. The shortcomings of existing schemes include poor resilience against node capture, low secure connectivity and memory overhead. After analyzing the problems in existing key management schemes, a modified model of the Blom's scheme is proposed in this thesis. The new model helps to overcome the prominent problems such as memory cost and computation overhead. The modified key management scheme not only enhances the efficiency of the existing Blom's scheme but also provides a new way of generating keys in wireless sensor networks. In our work, we also propose a new encryption technique which can be used in wireless sensor networks to provide security to the data. The encryption technique can be used either on binary or non-binary data and the chaining strategy used in this scheme makes it difficult for intruders to break the message.Computer Science Departmen

    A Two-Layer Key Establishment Scheme for Wireless Sensor Networks

    No full text
    In a large scale sensor network, it is infeasible to assign a unique Transport Layer Key (TLK) for each pair of nodes to provide the end-to-end security due to the huge memory cost per node. Thus, conventional key establishment schemes follow a key predistribution approach to establish a Link Layer Key (LLK) infrastructure between neighboring nodes and rely on multihop paths to provide the end-to-end security. Their drawbacks include vulnerability to the node compromise attack, large memory cost, and energy inefficiency in the key establishment between neighboring nodes. In this paper, we propose a novel key establishment scheme, called LAKE, for sensor networks. LAKE uses a t-degree trivariate symmetric polynomial to facilitate the establishment of both TLKs and LLKs between sensor nodes in a two-dimensional space, where each node can calculate direct TLKs and LLKs with some logically neighboring nodes and rely on those nodes to negotiate indirect TLKs and LLKs with other nodes. Any two end nodes can negotiate a TLK on demand directly or with the help of only one intermediate node, which can be determined in advance. As for the LLK establishment, LAKE is more secure under the node compromise attack with much less memory cost than conventional solutions. Due to the location-based deployment, LAKE is also energy efficient in that each node has direct LLKs with most neighbors without spending too much energy on the establishment of indirect LLKs with neighbors through multihop routing

    A Two-Layer Key Establishment Scheme for Wireless Sensor Networks

    No full text
    corecore