Doctoral Dissertations

Problems and solutions for handling attacks in sensor networks

Author

Jian Yin

Abstract

"A sensor network consists of thousands of low-power, low-cost sensor nodes with limited computation, communication, and sensing capabilities. Many sensor network applications are security sensitive. Traditional security protocols are designed for resource rich machines to support large computation and are not applicable to sensor networks due to resource limitations and their ad hoc nature. It is necessary to explore the light weight security protocols used against the different types of attacks. This dissertation proposes secure routing protocols to be used against different types of attacks for sensor networks"--Abstract, page iii.

Advisor(s)

Madria, Sanjay Kumar

Committee Member(s)

Erçal, Fikret
Cheng, Maggie Xiaoyan
Liu, Xiaoqing Frank
Sarangapani, Jagannathan, 1965-

Department(s)

Computer Science

Degree Name

Ph. D. in Computer Science

Publisher

University of Missouri--Rolla

Publication Date

Spring 2007

Journal article titles appearing in thesis/dissertation

  • ESECROUT: an energy efficient secure routing protocol for sensor networks
  • Hierarchical secure routing protocol against black hole attacks in sensor networks
  • SERWA: a secure routing protocol against the wormhole attack for sensor networks
  • Hierarchical architecture based Sybil attack detection in sensor networks

Pagination

xi, 127 pages

Note about bibliography

Includes bibliographical references (pages 120-126).

Rights

© 2007 Jian Yin, All rights reserved.

Document Type

Dissertation - Citation

File Type

text

Language

English

Subject Headings

Routers (Computer networks) -- Design
Sensor networks -- Security measures
Wireless communication systems -- Security measures

Thesis Number

T 9185

Print OCLC #

173275045

Link to Catalog Record

Full-text not available: Request this publication directly from Missouri S&T Library or contact your local library.

http://merlin.lib.umsystem.edu/record=b5973144~S5

This document is currently not available here.

Share My Dissertation If you are the author of this work and would like to grant permission to make it openly accessible to all, please click the button above.

Share

 
COinS