Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Resiliency and application to routing protocols in wireless sensor networks ; Résilience et application aux protocoles de routage dans les réseaux de capteurs

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • Contributors:
      CITI Centre of Innovation in Telecommunications and Integration of services (CITI); Institut National des Sciences Appliquées de Lyon (INSA Lyon); Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria); INSA de Lyon; Fabrice Valois; Marine Minier
    • بيانات النشر:
      CCSD
    • الموضوع:
      2013
    • Collection:
      Université de Lyon: HAL
    • نبذة مختصرة :
      This thesis focuses on the security issues of multi-hop routing protocols for Wireless Sensor Networks (WSNs). The rapid deployment capabilities, due to the lack of infrastructure, as well as the self organized and potentially fault-tolerant nature of WSNs make them attractive for multiple applications spanning from environmental monitoring (temperature, pollution, etc.) to building industrial automation (electricity/gas/water metering, event detection, home automation etc). Security is particularly challenging in WSNs. Because of their open and unattended deployment, in possibly hostile environments, powerful adversaries can easily launch Denial-of-Service (Dos) attacks, cause physical damage to sensors, or even capture them to extract sensitive information (encryption keys, identities, addresses etc.). After node compromise, an adversary can seek to disrupt the functionality of network layer by launching attacks such as node replication, Sybil, Selective forwarding, Sinkhole, Wormhole etc. To cope with these "insider" attacks, stemming from node compromise, "beyond cryptography" algorithmic solutions must be envisaged to complement the traditional cryptographic solutions. Firstly, we propose the resiliency concept including our definition and a new metric to compare routing protocols. This method allows to aggregate meaningfully several parameters (quantitative information) and makes it easier to visually discern various tradeoffs (qualitative information), thus greatly simplifying the process of protocol comparison. Secondly, we propose the protocol behaviors enhancing resiliency. Our proposition consists in three strategies: (i) introduce random behaviors (ii) limit route length (iii) introduce data replication. These mechanisms are applied to several well known routing protocols to study their resiliency. Finally, a theoretical study of resiliency is introduced. We present an analytical study of biased random walks under attacks to confirm the results obtained through simulations. ; Les travaux réalisés ...
    • Relation:
      NNT: 2013ISAL0070
    • الدخول الالكتروني :
      https://theses.hal.science/tel-01077949
      https://theses.hal.science/tel-01077949v1/document
      https://theses.hal.science/tel-01077949v1/file/these.pdf
    • Rights:
      info:eu-repo/semantics/OpenAccess
    • الرقم المعرف:
      edsbas.EEB0D3AF