Robust Networking Architecture and Secure communication scheme for Heterogeneous wireless sensor Networks McKenzie mcneal ll Ph. D Candidate for Computer Information Systems Engineering Advisor: dr. Wei chen College of Engineering, Technology, and Computer Science March 15th 2012
Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks McKenzie McNeal III Ph.D. Candidate for Computer & Information Systems Engineering Advisor: Dr. Wei Chen College of Engineering, Technology, and Computer Science March 15th, 2012 1
Outline o Research Background and challenges 口 Problem statement a Research Goal and objectives 口 Key related Work a Conceptual and Preliminary Design a Detailed Design and Implementation Robust networking architecture Secure communication scheme a System Evaluation and Test results Evaluation of robust networking architecture Analysis of secure communication scheme 口 Benchmarking o Conclusion recommendations
Outline ❑ Research Background and Challenges ❑ Problem Statement ❑ Research Goal and Objectives ❑ Key Related Work ❑ Conceptual and Preliminary Design ❑ Detailed Design and Implementation ➢ Robust networking architecture ➢ Secure communication scheme ❑ System Evaluation and Test Results ➢ Evaluation of robust networking architecture ➢ Analysis of secure communication scheme ❑ Benchmarking ❑ Conclusion & Recommendations 2
Research Background Wireless Sensor Networks(WSNS a Large collection of small wireless devices with the ability to sense, process, and transmit data Low-end node L-node ow cost solution to distributed applications Milita CiⅤ ilian Limited resources 88=2(: Power 9: Storage Processing H-node Communication Unreliable communication Unattended operation Operate autonomously Heterogerkhousoyaneleas Sisde Nesermsdr NEWSk O Homogeneous or Heterogeneous
Research Background – Wireless Sensor Networks (WSNs) ❑ Large collection of small wireless devices with the ability to sense, process, and transmit data. ➢ Low cost solution to distributed applications • Military • Civilian ➢ Limited resources • Power • Storage • Processing • Communication ➢ Unreliable communication ➢ Unattended operation • Operate autonomously ❑ Homogeneous or Heterogeneous 3 Low-end node (L-node) Homogeneous Wireless Sensor Network H H H High-end node (H-node) Low-end node (L-node) Heterogeneous Wireless Sensor Network (HWSN)
Research Background Security concerns for WsNs a General security concerns for communication networks Data needs to be protected Unauthorized access Protection against various attacks a Specific security concerns for WSNs Resource constraints do not support traditional security methods Attacks can drain network resources Uncontrollable/hostile environment
❑ General security concerns for communication networks ➢ Data needs to be protected ➢ Unauthorized access ➢ Protection against various attacks ❑ Specific security concerns for WSNs ➢ Resource constraints do not support traditional security methods ➢ Attacks can drain network resources ➢ Uncontrollable/hostile environment 4 Research Background – Security Concerns for WSNs
Research Challenges a Network Infrastructure Reliability and availability High performance Leverage security tasks a Secured data communication Data confidentiality, integrity, freshness authentication WSNS do not support traditional security methods Function in presence of node compromise
Research Challenges ❑ Network Infrastructure ➢ Reliability and availability ➢ High performance ➢ Leverage security tasks ❑ Secured Data Communication ➢ Data confidentiality, integrity, freshness & authentication ➢ WSNs do not support traditional security methods ➢ Function in presence of node compromise 5