Font Size: a A A

Candidate Base Stations A Security Solution For Compromised Base Stations In Wireless Sensor Networks

Posted on:2007-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:Nabaasa EvaristFull Text:PDF
GTID:2178360185465494Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The purpose of this research thesis has been to investigate the current state of base station security in wireless sensor networks and to evaluate the potential effectiveness of how candidate base stations can be utilized in delivering interactive enhanced base station security by improving the existing security protocols currently in use. Base station security protocols are evaluated, candidate base stations are extensively discussed, including the suggested candidate base station algorithms. Features and structures of currently available base stations and sensor nodes are addressed. Possibilities of compromising base stations and their possible solutions are discussed.The major contribution of this thesis is it's furthering of the understanding of the security protocols, models, methodologies and algorithms that can be used in ensuring base station security, availability, efficiency and effectiveness in wireless sensor networks. This thesis demonstrates how candidate base stations are fitted in the base station security protocols and how they can be used to provide a meaningful analysis of increased base station security. In addition to the specific results presented, the collective wisdom provided by the discussion of the methodologies, protocols, models and algorithms throughout this thesis, provides valuable insight for others in the same area of research.
Keywords/Search Tags:Compromised
PDF Full Text Request
Related items