Protocol design, implementation and integration for the protection of sensor data confidentiality and integrity

dc.contributor.advisor Wensheng Zhang
dc.contributor.advisor Johnny S. Wong
dc.contributor.advisor Daji Qiao
dc.contributor.author Panchapakesan, Santosh
dc.contributor.department Computer Science
dc.date 2018-08-22T18:32:07.000
dc.date.accessioned 2020-06-30T07:44:21Z
dc.date.available 2020-06-30T07:44:21Z
dc.date.copyright Tue Jan 01 00:00:00 UTC 2008
dc.date.issued 2008-01-01
dc.description.abstract <p>Wireless sensor networks are data centric because in many applications, sensor nodes are required to generate data, collect data, storage data and process data queries. Meanwhile, wireless sensor networks are vulnerable to security attacks because they are deployed in unattended (often hostile) environments and do not have tamper resistant hardware. Therefore, secure and efficient data management schemes are necessary to sensor networks. In this thesis work, we study how to secure a representative type of sensor data management approach called data centric storage based (DCS) schemes, with focus on protecting data confidentiality and integrity.;Considerable efforts have been made for securing DCS, however, existing work has the limitations of (i) not considering user node compromise, (ii) lack of studies on real system implementation and detailed experiments, and (iii) lack of studies on integrating security schemes to defend against multiple attacks simultaneously. To overcome these limitations, we have conducted the following research: Firstly, we have designed a new data confidentiality protocol called DKVP (data and key vulnerability protection) scheme to protect sensor data confidentiality in presence of user node compromise. Secondly, we have implemented three polynomial-based sensor data confidentiality and integrity protection schemes, namely, the adaptive polynomial-based scheme for secure data storage and query (APB), the message authentication function based schemes for data integrity (MAF), and the DKVP scheme, on top of TinyOS/Mote platform. Thirdly, we have developed a prototype system that consists of (i) integrated data confidentiality and integrity protection modules (i.e., the APB, MAF and DKVP schemes), (ii) effective and friendly interfaces to application developers to facilitate inclusion of security features into application programs, and (iii) example programs to demonstrate the integration suite developed by us.;Extensive experiments have been conducted to study the feasibility and performance of the above designs and implementations. The results show that, if system parameters are properly chosen, desired security level can be achieved which is cost affordable by the current generation of sensor nodes such as MICA motes. In particular, our study shows that running the three integrated protocols together consumes only 27 msec of processing time and 60% of CPU usage.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/rtd/15417/
dc.identifier.articleid 16416
dc.identifier.contextkey 7028863
dc.identifier.doi https://doi.org/10.31274/rtd-180813-16644
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath rtd/15417
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/69048
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/rtd/15417/1457544.PDF|||Fri Jan 14 20:40:48 UTC 2022
dc.subject.disciplines Computer Sciences
dc.subject.keywords Computer science;
dc.title Protocol design, implementation and integration for the protection of sensor data confidentiality and integrity
dc.type article
dc.type.genre thesis
dspace.entity.type Publication
relation.isOrgUnitOfPublication f7be4eb9-d1d0-4081-859b-b15cee251456
thesis.degree.level thesis
thesis.degree.name Master of Science
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
1457544.PDF
Size:
1.64 MB
Format:
Adobe Portable Document Format
Description: