Multistage security mechanism for hybrid, large scale wireless sensor networks

Download
Author
Katsis, Grigorios
Date
2007-06Second Reader
Tummala, Murali
Karunasiri, Gamani
Michael, J. Bret
Walker, Owens
Metadata
Show full item recordAbstract
A wide area network consisting of ballistic missile defense satellites and terrestrial nodes can be viewed as a hybrid, large-scale mobile wireless sensor network. Building on research in the areas of the wireless sensor networks (WSN) and the mobile ad hoc networks (MANET), this thesis proposes an efficient multistage security mechanism for node and data authentication and data confidentiality. Node authentication is provided by digital signatures and the public key infrastructure (PKI). The TESLA algorithm and IPSec are utilized for data authentication and confidentiality, respectively. Performance analysis and simulation results demonstrate that the proposed mechanism meets the real-time data dissemination requirements of a ballistic missile defense system while maintaining throughput commensurate with unencrypted Internet Protocol (IP).
Collections
Related items
Showing items related by title, author, creator and subject.
-
The classification of e-authentication protocols for targeted applicability
Chia, Wan Yin. (Monterey, California. Naval Postgraduate School, 2009-12);Authentication is a fundamental aspect of information security in enabling the authenticity of the source of information to be determined. Among several electronic authentication mechanisms available today, deploying the ... -
National authentication framework implementation study
Mok, Chuan-Hao. (Monterey, California. Naval Postgraduate School, 2009-12);The move toward e-government has seen many institutions put special focus on the need for security, especially that of authentication. Single-factor password-based systems have been proven inadequate in safeguarding online ... -
A comparison of password techniques
Beedenbender, Mark G. (Monterey, California. Naval Postgraduate School, 1992-03);A widely used access control mechanism is the password. Passwords are normally composed of a meaningful detail, such as a name of a person or a sequence of numbers such as birthdate. Any person attempting to gain unauthorized ...