In this dissertation, we focus on the security and reliability of wireless sensor networks (WSNs). We specifically address attacks which target the availability of the wireless communication medium. Due to their unattended functioning and over-the-air communication, WSNs are particularly vulnerable to link-level denial-of-service (DoS) attacks against the communication channel. Our main contribution is to design reactive solutions that can achieve a higher throughput out of an attacked region via the use of parallel communication paths.
Our approach uses a hybrid Medium Access Control layer consisting of both CSMA and time-slotted channel access mechanisms. We define and analyze a set of distributed transmission scheduling algorithms for use in the attacked region, ranging from management-free to precise coordinated scheduling. To implement our techniques, we develop a distributed data exfiltration protocol which has two variants, one to act as a response against single-hop attacks and another which provides resilience against attacks affecting multi-hop regions.
Extensive experimental evaluation shows that under many attack scenarios our approach achieves a data delivery rate comparable to pre-attack conditions and far lower latency than other similar approaches. Furthermore, a simulation-based evaluation of the data exfiltration methods and protocols as a fault-tolerance mechanism in protecting a critical infrastructure has demonstrated that its incorporation in the application’s design will lead to increased reliability and robustness in WSNs.
|School:||George Mason University|
|School Location:||United States -- Virginia|
|Source:||DAI-B 69/12, Dissertation Abstracts International|
|Keywords:||Denial-of-service attacks, Multichannel defenses, Network security, Wireless communication, Wireless networks|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be