WSN Key Management Secrecy Technique Using Local FM Radio
Wireless sensor network services rely on two elements, secure communication. and symmetric key distribution. As \VSN use svtnnmetric key crvptographv to protect data confidentiality, each sensor node has to keep a copy olthe secret key to be used in encryption decryption process. 'I he secret...
Saved in:
id |
my-usim-ddms-12636 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Sains Islam Malaysia |
collection |
USIM Institutional Repository |
language |
English |
topic |
Sensor networks Wireless LANs Computer networks Security systems Security measures |
spellingShingle |
Sensor networks Wireless LANs Computer networks Security systems Security measures Ahmad Mohammad Lutfi Al-Zuraiqi WSN Key Management Secrecy Technique Using Local FM Radio |
description |
Wireless sensor network services rely on two elements, secure communication. and symmetric key
distribution. As \VSN use svtnnmetric key crvptographv to protect data confidentiality, each sensor
node has to keep a copy olthe secret key to be used in encryption decryption process. 'I he secret
key can he sent wired or wireless. but wire solution is impassible especially in remote areas, while
current wireless solutions have either coveraw)e or cost issues or they require a lone implementation
time. Most studies try to 1111(s1o lutions for remote WSN network reachability by using solutions
like satellite connections. others turn out to use other wireless solutions to create point -to-point
connection. But such solutions lack durability in had weather or require a long time and effort in
addition to high cost to setup. This research will solve the issue ofsending secret key securely to
\VSN nodes in remote areas using commercial I'M stations. Since \V'SN node lacks processing
power, memory and energy capacity. l[Iliptic Curve ('rv}ptographv (F(C) will be used to encrypt
the secret key, as it has Cast computational time and smaller key size that can be transmitted easily
through FM radio. The encrypted spread has simple NOR encryption before modulating it to the
SO kl Iz. then it is embedded in the commercial FM band and broadcasted using commercial FM
stations, to hide the key within the FM band. This research seeks to solve key management issues
by providing multi-layers 01' security, to make certain that key is delivered without being snilied
or compromised. Through the implementation. we have tested that the technique being tested is
successlül in sending the secret key to \VSN base station. |
format |
Thesis |
author |
Ahmad Mohammad Lutfi Al-Zuraiqi |
author_facet |
Ahmad Mohammad Lutfi Al-Zuraiqi |
author_sort |
Ahmad Mohammad Lutfi Al-Zuraiqi |
title |
WSN Key Management Secrecy Technique Using Local FM Radio |
title_short |
WSN Key Management Secrecy Technique Using Local FM Radio |
title_full |
WSN Key Management Secrecy Technique Using Local FM Radio |
title_fullStr |
WSN Key Management Secrecy Technique Using Local FM Radio |
title_full_unstemmed |
WSN Key Management Secrecy Technique Using Local FM Radio |
title_sort |
wsn key management secrecy technique using local fm radio |
granting_institution |
Universiti Sains Islam Malaysia |
url |
https://oarep.usim.edu.my/bitstreams/1bab26e2-b83e-43b4-b97f-2429a3db76cc/download https://oarep.usim.edu.my/bitstreams/d38f49f8-6c8b-466e-bb8a-80074e925087/download https://oarep.usim.edu.my/bitstreams/3b456f0e-1c4b-44ce-9dc5-16976b7df4fb/download https://oarep.usim.edu.my/bitstreams/cf80fc70-9460-4ca1-a464-4bed9e3f1838/download https://oarep.usim.edu.my/bitstreams/0e5621e5-8cdb-419a-8265-bbb343aa2b77/download https://oarep.usim.edu.my/bitstreams/afcfc1e6-10bf-4e60-bb4a-68b0d78328e2/download https://oarep.usim.edu.my/bitstreams/61a999c8-8982-4946-b3fa-30da74a251df/download https://oarep.usim.edu.my/bitstreams/2edcd0a8-3a75-48f2-a80b-f7f92b90b580/download https://oarep.usim.edu.my/bitstreams/fd4c03e4-0343-43f9-9c71-50d226ea171d/download |
_version_ |
1812444722712543232 |
spelling |
my-usim-ddms-126362024-05-29T18:57:44Z WSN Key Management Secrecy Technique Using Local FM Radio Ahmad Mohammad Lutfi Al-Zuraiqi Wireless sensor network services rely on two elements, secure communication. and symmetric key distribution. As \VSN use svtnnmetric key crvptographv to protect data confidentiality, each sensor node has to keep a copy olthe secret key to be used in encryption decryption process. 'I he secret key can he sent wired or wireless. but wire solution is impassible especially in remote areas, while current wireless solutions have either coveraw)e or cost issues or they require a lone implementation time. Most studies try to 1111(s1o lutions for remote WSN network reachability by using solutions like satellite connections. others turn out to use other wireless solutions to create point -to-point connection. But such solutions lack durability in had weather or require a long time and effort in addition to high cost to setup. This research will solve the issue ofsending secret key securely to \VSN nodes in remote areas using commercial I'M stations. Since \V'SN node lacks processing power, memory and energy capacity. l[Iliptic Curve ('rv}ptographv (F(C) will be used to encrypt the secret key, as it has Cast computational time and smaller key size that can be transmitted easily through FM radio. The encrypted spread has simple NOR encryption before modulating it to the SO kl Iz. then it is embedded in the commercial FM band and broadcasted using commercial FM stations, to hide the key within the FM band. This research seeks to solve key management issues by providing multi-layers 01' security, to make certain that key is delivered without being snilied or compromised. Through the implementation. we have tested that the technique being tested is successlül in sending the secret key to \VSN base station. Universiti Sains Islam Malaysia 2015-12 Thesis en https://oarep.usim.edu.my/handle/123456789/12636 https://oarep.usim.edu.my/bitstreams/a1f41bb2-eefd-4c4e-9aad-d72f1a951265/download 8a4605be74aa9ea9d79846c1fba20a33 https://oarep.usim.edu.my/bitstreams/1bab26e2-b83e-43b4-b97f-2429a3db76cc/download ed36514bf7c2724c8b24e728fd2f2b57 https://oarep.usim.edu.my/bitstreams/d38f49f8-6c8b-466e-bb8a-80074e925087/download 113daa76293a250bb3b0f99a1f08ac2f https://oarep.usim.edu.my/bitstreams/3b456f0e-1c4b-44ce-9dc5-16976b7df4fb/download 40d52b4d5dff94dd792475bcdb82504d https://oarep.usim.edu.my/bitstreams/cf80fc70-9460-4ca1-a464-4bed9e3f1838/download 90aa9f81244da19eca10414762345478 https://oarep.usim.edu.my/bitstreams/0e5621e5-8cdb-419a-8265-bbb343aa2b77/download 0475deeb6dbb1e8a3c53056d9cf4380e https://oarep.usim.edu.my/bitstreams/afcfc1e6-10bf-4e60-bb4a-68b0d78328e2/download 00b83a21ad2c56a7de4e6a5854825519 https://oarep.usim.edu.my/bitstreams/61a999c8-8982-4946-b3fa-30da74a251df/download be77d72bce13a09552b8fcc47f3a2aa0 https://oarep.usim.edu.my/bitstreams/2edcd0a8-3a75-48f2-a80b-f7f92b90b580/download f5ed1477c996318d83c71c7257d03a91 https://oarep.usim.edu.my/bitstreams/fd4c03e4-0343-43f9-9c71-50d226ea171d/download 4b9aef67f6873f28dd07f2aff0fa202c https://oarep.usim.edu.my/bitstreams/d89cb1e5-da7b-491d-867e-c3eb25284fdf/download ab999c7ff2c2b2c5e68c497f1a45ad86 https://oarep.usim.edu.my/bitstreams/4144bac3-d26c-4092-8f06-fe4bac666cf8/download 856239dd26c97b20de8dfffd0b8f5e1e https://oarep.usim.edu.my/bitstreams/5e426096-1ea8-4773-9dc5-9651fdb5aecb/download ab7032757f10a12451fe27f0c3adaf20 https://oarep.usim.edu.my/bitstreams/3a2e7bd6-b201-4045-abb1-6fe845981475/download 51d6c6ccf3efc2fd81adf79683b331ca https://oarep.usim.edu.my/bitstreams/de1f4f28-1a4b-47c4-8e45-4cdd4808470c/download 766a6ae0e5f80f2602ada9b6eb57f42b https://oarep.usim.edu.my/bitstreams/6e328ef8-1726-47a6-9f51-fce16b53a657/download 89e255c34573ee10f4494c5ebc77faba https://oarep.usim.edu.my/bitstreams/673ffeb2-2848-4217-9fa7-c853205ab2e9/download 9aaf1dd0edc0e39bab56748c7a1da5df https://oarep.usim.edu.my/bitstreams/558f8e6f-597c-4dab-9de4-4c16e2fad0ac/download 99de10a7364b46a530a94f924e91ab3d https://oarep.usim.edu.my/bitstreams/9fae5c6b-3c6f-43b2-9155-43ae7b73fdbb/download 19e93ad1f13fc0e36d524e06a27d2c95 Sensor networks Wireless LANs Computer networks Security systems Security measures |