Date of Award
Doctor of Philosophy
Electrical and Computer Engineering
WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious insertion of data that would alter the entire integrity of the system. The severe resource constraints in each sensor make it a challenge to secure the network. The need for new security ideas was the main inspiration and motivation of this research. While there has been a remarkable progress in many enabling technologies for sensor networking, the integrity of information received by the system has received less attention . For instance, while many methods have been developed for self-organizing the network functions, less attention was paid to ensure high data integrit
Qleibo, Haider, "Message integrity model for wireless sensor networks" (2009). Graduate Theses and Dissertations. 10637.