Degree Type

Dissertation

Date of Award

2009

Degree Name

Doctor of Philosophy

Department

Electrical and Computer Engineering

First Advisor

Doug Jacobson

Abstract

WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious insertion of data that would alter the entire integrity of the system. The severe resource constraints in each sensor make it a challenge to secure the network. The need for new security ideas was the main inspiration and motivation of this research. While there has been a remarkable progress in many enabling technologies for sensor networking, the integrity of information received by the system has received less attention [50]. For instance, while many methods have been developed for self-organizing the network functions, less attention was paid to ensure high data integrit

DOI

https://doi.org/10.31274/etd-180810-3059

Copyright Owner

Haider Qleibo

Language

en

Date Available

2012-04-29

File Format

application/pdf

File Size

48 pages

Share

COinS