Chained Identity Attestation (CIA) method in preventing node impersonation attack in wireless sensor network / Norhaflyza Marbukhari

A Wireless Sensor Network (WSN) system incorporates a gateway that provides wireless connectivity back to the wired environment and distributed nodes. The nature of the sensor nodes that are located remotely and unattended has exposed itself to node impersonation attack. This kind of attack can be f...

Full description

Saved in:
Bibliographic Details
Main Author: Marbukhari, Norhaflyza
Format: Thesis
Language:English
Published: 2018
Online Access:https://ir.uitm.edu.my/id/eprint/86348/1/86348.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uitm-ir.86348
record_format uketd_dc
spelling my-uitm-ir.863482024-04-17T04:22:23Z Chained Identity Attestation (CIA) method in preventing node impersonation attack in wireless sensor network / Norhaflyza Marbukhari 2018 Marbukhari, Norhaflyza A Wireless Sensor Network (WSN) system incorporates a gateway that provides wireless connectivity back to the wired environment and distributed nodes. The nature of the sensor nodes that are located remotely and unattended has exposed itself to node impersonation attack. This kind of attack can be further classified into physical and active attack where the nodes identity are being copied or stolen and in worst case scenario, it can be removed from their locations and duplicated in the lab. Several node identity authentication methods have been developed and proposed by few researchers to overcome or mitigate their problem. However, with the nature of Wireless Sensor Network (WSN) nodes that are left unattended, the problem still exits. This work presents new method in mitigating node impersonation attack. This method is called Chained Identity Attestation (CIA). The main objective of this project is to mitigate node impersonation attack in WSN environment, in term of identity cloning. A test bed consisting of two sensor nodes and a base station is set up to verify and analyse its feasibility in a real environment using mathematical analysis, the developed protocol is proven to overcome node cloning or node impersonation attack. Successful authentication between sensor nodes and base station are reported to confirm the functionality of the proposed new method. Feasibility of the proposed method in term of processing time and energy consumption is presented and compared with the original DHKE method. The results prove the security and feasibility of the developed protocol. 2018 Thesis https://ir.uitm.edu.my/id/eprint/86348/ https://ir.uitm.edu.my/id/eprint/86348/1/86348.pdf text en public masters Universiti Teknologi MARA (UiTM) Faculty of Electrical Engineering Mohd Yussoff, Yusnani
institution Universiti Teknologi MARA
collection UiTM Institutional Repository
language English
advisor Mohd Yussoff, Yusnani
description A Wireless Sensor Network (WSN) system incorporates a gateway that provides wireless connectivity back to the wired environment and distributed nodes. The nature of the sensor nodes that are located remotely and unattended has exposed itself to node impersonation attack. This kind of attack can be further classified into physical and active attack where the nodes identity are being copied or stolen and in worst case scenario, it can be removed from their locations and duplicated in the lab. Several node identity authentication methods have been developed and proposed by few researchers to overcome or mitigate their problem. However, with the nature of Wireless Sensor Network (WSN) nodes that are left unattended, the problem still exits. This work presents new method in mitigating node impersonation attack. This method is called Chained Identity Attestation (CIA). The main objective of this project is to mitigate node impersonation attack in WSN environment, in term of identity cloning. A test bed consisting of two sensor nodes and a base station is set up to verify and analyse its feasibility in a real environment using mathematical analysis, the developed protocol is proven to overcome node cloning or node impersonation attack. Successful authentication between sensor nodes and base station are reported to confirm the functionality of the proposed new method. Feasibility of the proposed method in term of processing time and energy consumption is presented and compared with the original DHKE method. The results prove the security and feasibility of the developed protocol.
format Thesis
qualification_level Master's degree
author Marbukhari, Norhaflyza
spellingShingle Marbukhari, Norhaflyza
Chained Identity Attestation (CIA) method in preventing node impersonation attack in wireless sensor network / Norhaflyza Marbukhari
author_facet Marbukhari, Norhaflyza
author_sort Marbukhari, Norhaflyza
title Chained Identity Attestation (CIA) method in preventing node impersonation attack in wireless sensor network / Norhaflyza Marbukhari
title_short Chained Identity Attestation (CIA) method in preventing node impersonation attack in wireless sensor network / Norhaflyza Marbukhari
title_full Chained Identity Attestation (CIA) method in preventing node impersonation attack in wireless sensor network / Norhaflyza Marbukhari
title_fullStr Chained Identity Attestation (CIA) method in preventing node impersonation attack in wireless sensor network / Norhaflyza Marbukhari
title_full_unstemmed Chained Identity Attestation (CIA) method in preventing node impersonation attack in wireless sensor network / Norhaflyza Marbukhari
title_sort chained identity attestation (cia) method in preventing node impersonation attack in wireless sensor network / norhaflyza marbukhari
granting_institution Universiti Teknologi MARA (UiTM)
granting_department Faculty of Electrical Engineering
publishDate 2018
url https://ir.uitm.edu.my/id/eprint/86348/1/86348.pdf
_version_ 1804889755802927104