Building Automation System (BAS) was proposed to have the automatic centralized control of various appliances in the building such as heating, ventilating, air conditioning and other systems. Providing high security for the network layer in BAS was the major concern in recent times of studies. Researchers have been proposing different authentication protocols to stop the intruders from attacking the network, of which Time Efficient Stream Loss Authentication (TESLA) was the most secured protocol. Apart from its low computational and communicational overhead, there are few possible ways from which an intruder can attack a BAS network. Hence, to overcome this drawback we used a proposed algorithm in this paper, which uses the concept of Zero – Knowledge Protocol (ZKP) in addition to TESLA for security. This combination of ZKP with time synchronization provides high authentication of packets in the network, thus making the network more secure and reliable.
To test the security of the algorithm, we implement different wireless sensor network attacks such as sinkhole attack, and gray hole attack. Our proposed security algorithm is implemented by various WSN’s. We use Network Simulator 2 for simulation of the proposed algorithm. During the simulation, we observe detection of malicious nodes (intruders), thus proving the security of the proposed algorithm that in turn secures BAS.
|Commitee:||Aliasgari, Mehrdad, Ary, James|
|School:||California State University, Long Beach|
|School Location:||United States -- California|
|Source:||MAI 55/01M(E), Masters Abstracts International|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be