Key Related Work Reference Network Security Model Limitations Arc hitecture LIGER Flat hws Hybrid key management scheme .Large numbers of (LIGER) keys stored and key .Unbalanced key distribution exchanges LION-standalone key mgmt Increased node .TIGER-KDC based key mgmt compromise with increased key storas Kejie lu Flat hWsn 2 key management schemes Large numbers of Random key pool-based pre keys stored and key distribution exchanges Polynomial-based pre-distribution enei Du-Scheme Hierarchical Key management scheme .Location dependent egion-based .C-neighbor concept network architecture HWSN ECC supports exchange of symmetric No energy analysis for secure routing
Key Related Work 6 Reference Network Architecture Security Model Limitations LIGER Flat HWSN Hybrid key management scheme (LIGER) •Unbalanced key distribution •LION-standalone key mgmt. •TIGER-KDC based key mgmt. •Large numbers of keys stored and key exchanges •Increased node compromise with increased key storage Kejie Lu Flat HWSN 2 key management schemes •Random key pool-based predistribution •Polynomial-based pre-distribution •Large numbers of keys strored and key exchanges •No analysis for energy usage Du-Scheme Hierarchical Region-based HWSN Key management scheme •C-neighbor concept •ECC supports exchange of symmetric key •Location dependent network architecture •No energy analysis for secure routing
Key Related Work(cont d) Summary of limitations a No security oriented network hierarchy a Random key pre-distribution schemes encounter the key exchange Issue Large storage of pre-loaded keys Large number of key exchanges O Localization information needed for establishing network architecture O No energy analysis for secure routing a Resilience against node compromise w/o tamper resistant hardware
Key Related Work (cont’d) Summary of Limitations ❑ No security oriented network hierarchy ❑ Random key pre-distribution schemes encounter the key exchange issue ➢ Large storage of pre-loaded keys ➢ Large number of key exchanges ❑ Localization information needed for establishing network architecture ❑ No energy analysis for secure routing ❑ Resilience against node compromise w/o tamper resistant hardware 7
Problem statement Novel security methods and models are needed for hwsns to function in the presence of an attack. Heterogeneity provides hierarchy that leverages resource efficient security tasks This dissertation research focuses on developing a robust networking architecture and secure communication scheme with an efficient key management system and secure routing protocol
Problem Statement Novel security methods and models are needed for HWSNs to function in the presence of an attack. Heterogeneity provides hierarchy that leverages resource efficient security tasks. This dissertation research focuses on developing a robust networking architecture and secure communication scheme with an efficient key management system and secure routing protocol. 8
Research Goal and obiectives Goal Address security challenges and develop a robust networking architecture and secure communication scheme for HWSNS with resource saving key management system and provide secure data communication and resilience against node compromise Obiectives a Define and develop robust hierarchical heterogeneous networking architecture a Design secure communication scheme based on the defined hierarchical hws Key management system Cryptographic algorithms Secure and efficient routing protocol a Test and evaluate robust networking architecture and secure communication scheme
Research Goal and Objectives Goal Address security challenges and develop a robust networking architecture and secure communication scheme for HWSNs with resource saving key management system and provide secure data communication and resilience against node compromise. Objectives ❑ Define and develop robust hierarchical heterogeneous networking architecture ❑ Design secure communication scheme based on the defined hierarchical HWSN ➢ Key management system ➢ Cryptographic algorithms ➢ Secure and efficient routing protocol ❑ Test and evaluate robust networking architecture and secure communication scheme 9
Conceptual Design Security system that integrates a robust networking architecture an d secure communication scheme for hwsns Securit System for HWSNS Robust Secure Networking Communication Architecture Scheme
Conceptual Design Security system that integrates a robust networking architecture and secure communication scheme for HWSNs 10 Security System for HWSNs Secure Communication Scheme Robust Networking Architecture