Show simple item record

dc.contributor.advisorKuri, Joy
dc.contributor.advisorKumar, Anurag
dc.contributor.authorAgrawal, Pranav
dc.date.accessioned2011-05-19T12:11:19Z
dc.date.accessioned2018-07-31T04:34:11Z
dc.date.available2011-05-19T12:11:19Z
dc.date.available2018-07-31T04:34:11Z
dc.date.issued2011-05-19
dc.date.submitted2009
dc.identifier.urihttps://etd.iisc.ac.in/handle/2005/1214
dc.identifier.abstracthttp://etd.iisc.ac.in/static/etd/abstracts/1577/G23824-Abs.pdfen_US
dc.description.abstractOur work focuses on wireless networks in general, but deals specifically with security in wireless sensor networks and energy consumption in IEEE 802.11 infrastructure WLANs. In the first part of our work, we focus on secure communication among sensor nodes in a wireless sensor network. These networks consists of large numbers of devices having limited energy and memory. Public key cryptography is too demanding for these resource-constrained devices because it requires high computation. So, we focus on symmetric key cryptography to achieve secure communication among nodes. For this cryptographic technique to work, two nodes have to agree upon a common key. To achieve this, many key distribution schemes have been proposed in the literature. Recently, several researchers have proposed schemes in which they have used group-based deployment models and assumed predeployment knowledge of the expected locations of nodes. They have shown that these schemes achieve better performance than the earlier schemes, in terms of connectivity, resilience against node capture and storage requirements. But in many situations expected locations of nodes are not available. We propose a solution which does not use the group-based deployment model and predeployment knowledge of the locations of nodes, and yet performs better than schemes which make the aforementioned assumptions. In our scheme, groups are formed after the deployment of sensor nodes on the basis of their physical locations. Nodes in different groups sample keys from disjoint key pools, so that compromise of a node affects secure links of its group only. Because of this reason, our scheme performs better than earlier schemes as well as the schemes using predeployment knowledge, in terms of connectivity, storage requirement, and security. Moreover, the post-deployment key generation process completes sooner than in schemes like LEAP+. In the second part of our work, we develop analytical models for estimating the energy spent by stations (STAs) in infrastructure WLANs when performing TCP-controlled file downloads. We focus on the energy spent in radio communication when the STAs are in the Continuously Active Mode (CAM), or in the static Power Save Mode (PSM). Our approach is to develop accurate models for obtaining the fractions of times the STA radios spend in idling, receiving and transmitting. We discuss two traffic models for each mode of operation: (i) each STA performs one large file download, and (ii) the STAs perform short file transfers with think times (short duration of inactivity)between two transfers. We evaluate the rate of STA energy expenditure with long file downloads, and show that static PSM is worse than using just CAM. For short file downloads, we compute the number of file downloads that can be completed with a given battery capacity, and show that PSM performs better than CAM for this case. We provide a validation of our analytical models using the NS-2 simulator. Although the PSM performs better than the CAM when the STAs download short files over TCP with think times, its performance degrades as the number of STAs associated to the access point (AP) increases. To address this problem, we propose an algorithm, which we call opportunistic PSM (OPSM). We show through simulations that OPSM performs better than PSM. The performance gain achieved by OPSM increases as the file size requested by the STAs or the number of STAs associated with the AP increases. We implemented OPSM in NS-2.33, and to compare the performance of OPSM and PSM, we evaluate the number of file downloads that can be completed with a given battery capacity and the average time taken to download a file.en_US
dc.language.isoen_USen_US
dc.relation.ispartofseriesG23824en_US
dc.subjectSensor Networken_US
dc.subjectWireless Sensor Networksen_US
dc.subjectWireless Local Area Networksen_US
dc.subjectIEEE 802.11en_US
dc.subjectWireless Sensor Networks - Security Measuresen_US
dc.subjectWireless Local Area Networks - Energy Consumptionen_US
dc.subjectOPSM Opportunistic Power Save Modeen_US
dc.subjectWLANsen_US
dc.subject.classificationCommunication Engineeringen_US
dc.titleTopics On Security In Sensor Networks And Energy Consumption In IEEE 802.11 WLANsen_US
dc.typeThesisen_US
dc.degree.nameMSc Enggen_US
dc.degree.levelMastersen_US
dc.degree.disciplineFaculty of Engineeringen_US


Files in this item

This item appears in the following Collection(s)

Show simple item record