Search or add a thesis

Advanced Search (Beta)
Home > Key Management in Wireless Sensor Networks

Key Management in Wireless Sensor Networks

Thesis Info

Access Option

External Link

Author

Kausar, Firdous

Program

PhD

Institute

National University of Sciences & Technology

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2009

Thesis Completion Status

Completed

Subject

Applied Sciences

Language

English

Link

http://prr.hec.gov.pk/jspui/handle/123456789/1993

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676726566864

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Wireless sensor networks(WSNs) consist of a large number of low power nodes, with limited processing, communication, and storage resources. Large scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource constrained devices communicating via wireless links.The standard security requirements in WSNs include confiden- tiality, authentication and availability. These security requirements can be provided by encryption and authentication services which in turn demands a comprehensive key management scheme. The goal of key management is to pre-distribute cryptographic keys or keying materials among the nodes prior to the deployment, revoke keys if nodes leave the network, assign new keys to the nodes joining the network and periodically refreshing the keys. However, providing key manage- ment in WSNs is difficult due to the unknown network topology prior to deployment, intermittent connectivity and resource limitations of the sensor network environment. Key management schemes consider hierarchical HSN consisting of a small number of high-end sensors (H-node) and a large number of low-end sensors (L-node). A key generation process is incorporated, where instead of generating a large pool of random keys, a key pool is represented by a small number of generation keys, in order to address storage overhead problem in the con- straint sensor nodes. For a given generation key and a publicly known seed value, a keyed-hash function generates a key chain; these key chains collectively make a key pool. In the scheme proposed, after discovering the shared pairwise keys with neighbors, all H-node and L-node de- stroy their initial key rings and generate new key rings by applying one-way hash function on node’s ID and initial key ring. As a consequence, new nodes can still be added in the network beyond the initial deployment even after the deletion of initial key rings from nodes memory. In addition, a self-healing group key distribution scheme is developed for secure multicast commu-nications in HSN environment. This scheme presents a strategy for securely distributing rekeying messages and specifies techniques for joining and leaving a group. Access control in multicast system is usually achieved by encrypting the content using an encryption key, known as the group key (session key) that is only known by the group controller and all legitimate group members. In proposed scheme, all rekeying messages, except for unicast of an individual key, are transmitted without any encryption using one-way hash function and XOR operation. Further, nodes are capa- ble of recovering lost session keys on their own, without requesting additional transmission from the group controller. Also the time-limited node revocation is achieved without any intervention from the GC. This research reports the implementation and the performance of the proposed schemes on Cross- bow’s MicaZ motes running TinyOS and evaluates the computation and storage costs of two keyed-hash algorithms for key chain generation, HMAC-SHA1 and HMAC-MD5. The results show that proposed scheme can significantly reduce the storage requirements as compared to other random key pre-distribution schemes. The performance analysis of the collusion resistant mechanism shows that even if a large number of nodes are compromised, an adversary can only exploit a small number of keys nearby the compromised nodes, while other keys in the network remain safe. Also, the resiliency against node capture is better than previous key pre-distribution schemes. The security analysis of secure group key distribution scheme shows that the proposed scheme is computationally secure and meets the security requirements for forward and backward secrecy.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

المبحث الثاني: عن المطر والإحساس

المبحث الثاني: عن المطر والإحساس

قصيدة (علی وقع المطر) ([1])لنازک الملائكة

أمطري، لا ترحمي طیفي في عمقِ الظلام
أمطري، صبّي علیّ السیل، یا روح الغمام
لا تُبالي([2]) أن تعیدیني علی الأرض حطام
وأحیلیني([3]) ، إذا شئت، جلیداً أو رُخام

أترکي ریح المساء الممطر الداجي([4]) تجنّ
ودعي الأطیار، تحت المطر القاسي، تئنّ
أغرقي الأشجار بالماءِ ولا یحزنکِ غصن
زمجري([5])، دويّ([6])، فلن أشکو، لن یأتیک لحن

أمطري فوقي، کماشئت، علی وجھي الحزین
لا تبالي جسدي الراعش، في کفّ الدجون([7])
أمطري، سیلي علی وجھي، أو غشيّ عیوني
بلّلي ما شئت کفيّ وشعري وجبیني

أغرقي، في ظلمۃ اللیل، القبور البالیہ([8])
وألطمي، ما شئتِ أبواب القُصور العالیہ
أمطري، في الجبل الناءي([9])، وفوق الھاویۃ([10])
أطفءي النیران، لا تُبقي لحيّ باقیہ


آہ ما أرھبکِ الآن، وقد ساد السکون
غیر صوتِ الرّیح، في الأعماق([11]) تدوي في جنون
لم تزل تھمي([12])، من الأمطار، في الأرض، عیون
لم یَزٖل، قلبي حزیناً، تحت أمواج الدُجون


أیّھا الأمطارُ، قد ناداکِ قلبي البشريُّ
ذلک المفرق في الأشواق، ذاک الشاعريّ
إغسلیہ، أم تری الحزنُ حماہ([13]) الأبديّ
أبداً ، مثلک یا أمطارُ، دفاقٌ نقيُّ

أبداً یسمعُ، تحت اللیل، وقعَ القطرات
ساھماً یحلم بالماضي وألغاز الممات
یسأل الأمطار: ما أنتِ؟ وما سرّ الحیاۃ؟
وأنا، فیم وجودي؟ فیم دمعي وشکاتي([14]

ما أنا؟ ما أنتِ یا أمطار؟ ما ذاک الخضمُّ(

ظہرین کے اوقات میں اشتراکات: اسلام کے پانچ بڑے فقہی مکاتب فکر کے تناظر میں

In India scholar‘s had played incredible role for ‘Hadith’. The service of Indian Muslim scholars about methodology of Hadith is much more than other countries scholars in the last 50 years of thirteenth century. Their name should be written in golden words. There services about the methodology of Hadith are great one. Muslim scholars of sub-continent had taken keen interest in the research work of Hadith and its explanation. If we evaluate the theological history of India that ; Shah Waiullah ‘and his family worked day and night for expansion and publishing of’ Hadith  ‘ Thirteenth century of hire is called a century of revolution as concerned for Hadith. Because in that era proper theological institutions were set up and very strong institutions had spread knowledge and study of methodology of Hadith

Exploring the Determinants of Web Mining and Their Evaluations in Online Reviews

Online customer reviews have become electronic word of mouth for the current generations. The product reviews play an important role in customer‘s purchase decision making process. However, there are thousands of reviews constantly being posted for online products on e-commerce websites. It is very difficult for buyers to read all the reviews before purchase decisions. Review helpfulness is attracting increasing attention of practitioners and academics. It helps in reducing risks and uncertainty faced by users in online shopping. In this dissertation, three solutions are proposed to develop an effective model for review helpfulness prediction. i.e. 1) Influences of discrete emotions embedded in review text on review helpfulness are investigated, 2) Review helpfulness as a function of linguistic, psychological, summary language, and reviewer features is examined, and 3) Significant product, review and reviewer characteristics are explored to determine the review helpfulness. For discrete emotions, an algorithm is presented that extracts four positive and four negative discrete emotions from review text using National Research Council (NRC) emotion lexicon. An effective helpfulness prediction model is build using deep neural network. The findings reveal that Trust, Joy and Anticipation (positive emotions); Anxiety and Sadness (negative emotions) are most influential emotion dimensions and have greater impact on perceived helpfulness. Secondly, the utility of linguistic, psychological, summary language and reviewer characteristics are investigated and an effective review helpfulness prediction model is constructed using stochastic gradient boosting algorithm. The results reveal that reviewer helpfulness per day and syllables in review text strongly relates to review helpfulness. Moreover, the number of space, aux verb, drives words in review text and productivity score of a reviewer are also effective predictors of review helpfulness. Thirdly, influences of important variables by exploring not only the review content indicators but also significant indicators of reviewer and product that contribute to review helpfulness are explored. The influence of product type (search and experience goods) on review helpfulness is also examined and reviews of search goods show strong relationship to review helpfulness. The findings indicate that polarity of review title, sentiment and polarity of review text and cosine similarity between review text and product title effectively contribute to the helpfulness of online reviews.