WSN Key Management Secrecy Technique Using Local FM Radio

Wireless sensor network services rely on two elements, secure communication. and symmetric key distribution. As \VSN use svtnnmetric key crvptographv to protect data confidentiality, each sensor node has to keep a copy olthe secret key to be used in encryption decryption process. 'I he secret...

Full description

Saved in:
Bibliographic Details
Main Author: Ahmad Mohammad Lutfi Al-Zuraiqi
Format: Thesis
Language:English
Subjects:
Online Access:https://oarep.usim.edu.my/bitstreams/1bab26e2-b83e-43b4-b97f-2429a3db76cc/download
https://oarep.usim.edu.my/bitstreams/d38f49f8-6c8b-466e-bb8a-80074e925087/download
https://oarep.usim.edu.my/bitstreams/3b456f0e-1c4b-44ce-9dc5-16976b7df4fb/download
https://oarep.usim.edu.my/bitstreams/cf80fc70-9460-4ca1-a464-4bed9e3f1838/download
https://oarep.usim.edu.my/bitstreams/0e5621e5-8cdb-419a-8265-bbb343aa2b77/download
https://oarep.usim.edu.my/bitstreams/afcfc1e6-10bf-4e60-bb4a-68b0d78328e2/download
https://oarep.usim.edu.my/bitstreams/61a999c8-8982-4946-b3fa-30da74a251df/download
https://oarep.usim.edu.my/bitstreams/2edcd0a8-3a75-48f2-a80b-f7f92b90b580/download
https://oarep.usim.edu.my/bitstreams/fd4c03e4-0343-43f9-9c71-50d226ea171d/download
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-usim-ddms-12636
record_format uketd_dc
institution Universiti Sains Islam Malaysia
collection USIM Institutional Repository
language English
topic Sensor networks
Wireless LANs
Computer networks
Security systems
Security measures
spellingShingle Sensor networks
Wireless LANs
Computer networks
Security systems
Security measures
Ahmad Mohammad Lutfi Al-Zuraiqi
WSN Key Management Secrecy Technique Using Local FM Radio
description Wireless sensor network services rely on two elements, secure communication. and symmetric key distribution. As \VSN use svtnnmetric key crvptographv to protect data confidentiality, each sensor node has to keep a copy olthe secret key to be used in encryption decryption process. 'I he secret key can he sent wired or wireless. but wire solution is impassible especially in remote areas, while current wireless solutions have either coveraw)e or cost issues or they require a lone implementation time. Most studies try to 1111(s1o lutions for remote WSN network reachability by using solutions like satellite connections. others turn out to use other wireless solutions to create point -to-point connection. But such solutions lack durability in had weather or require a long time and effort in addition to high cost to setup. This research will solve the issue ofsending secret key securely to \VSN nodes in remote areas using commercial I'M stations. Since \V'SN node lacks processing power, memory and energy capacity. l[Iliptic Curve ('rv}ptographv (F(C) will be used to encrypt the secret key, as it has Cast computational time and smaller key size that can be transmitted easily through FM radio. The encrypted spread has simple NOR encryption before modulating it to the SO kl Iz. then it is embedded in the commercial FM band and broadcasted using commercial FM stations, to hide the key within the FM band. This research seeks to solve key management issues by providing multi-layers 01' security, to make certain that key is delivered without being snilied or compromised. Through the implementation. we have tested that the technique being tested is successlül in sending the secret key to \VSN base station.
format Thesis
author Ahmad Mohammad Lutfi Al-Zuraiqi
author_facet Ahmad Mohammad Lutfi Al-Zuraiqi
author_sort Ahmad Mohammad Lutfi Al-Zuraiqi
title WSN Key Management Secrecy Technique Using Local FM Radio
title_short WSN Key Management Secrecy Technique Using Local FM Radio
title_full WSN Key Management Secrecy Technique Using Local FM Radio
title_fullStr WSN Key Management Secrecy Technique Using Local FM Radio
title_full_unstemmed WSN Key Management Secrecy Technique Using Local FM Radio
title_sort wsn key management secrecy technique using local fm radio
granting_institution Universiti Sains Islam Malaysia
url https://oarep.usim.edu.my/bitstreams/1bab26e2-b83e-43b4-b97f-2429a3db76cc/download
https://oarep.usim.edu.my/bitstreams/d38f49f8-6c8b-466e-bb8a-80074e925087/download
https://oarep.usim.edu.my/bitstreams/3b456f0e-1c4b-44ce-9dc5-16976b7df4fb/download
https://oarep.usim.edu.my/bitstreams/cf80fc70-9460-4ca1-a464-4bed9e3f1838/download
https://oarep.usim.edu.my/bitstreams/0e5621e5-8cdb-419a-8265-bbb343aa2b77/download
https://oarep.usim.edu.my/bitstreams/afcfc1e6-10bf-4e60-bb4a-68b0d78328e2/download
https://oarep.usim.edu.my/bitstreams/61a999c8-8982-4946-b3fa-30da74a251df/download
https://oarep.usim.edu.my/bitstreams/2edcd0a8-3a75-48f2-a80b-f7f92b90b580/download
https://oarep.usim.edu.my/bitstreams/fd4c03e4-0343-43f9-9c71-50d226ea171d/download
_version_ 1812444722712543232
spelling my-usim-ddms-126362024-05-29T18:57:44Z WSN Key Management Secrecy Technique Using Local FM Radio Ahmad Mohammad Lutfi Al-Zuraiqi Wireless sensor network services rely on two elements, secure communication. and symmetric key distribution. As \VSN use svtnnmetric key crvptographv to protect data confidentiality, each sensor node has to keep a copy olthe secret key to be used in encryption decryption process. 'I he secret key can he sent wired or wireless. but wire solution is impassible especially in remote areas, while current wireless solutions have either coveraw)e or cost issues or they require a lone implementation time. Most studies try to 1111(s1o lutions for remote WSN network reachability by using solutions like satellite connections. others turn out to use other wireless solutions to create point -to-point connection. But such solutions lack durability in had weather or require a long time and effort in addition to high cost to setup. This research will solve the issue ofsending secret key securely to \VSN nodes in remote areas using commercial I'M stations. Since \V'SN node lacks processing power, memory and energy capacity. l[Iliptic Curve ('rv}ptographv (F(C) will be used to encrypt the secret key, as it has Cast computational time and smaller key size that can be transmitted easily through FM radio. The encrypted spread has simple NOR encryption before modulating it to the SO kl Iz. then it is embedded in the commercial FM band and broadcasted using commercial FM stations, to hide the key within the FM band. This research seeks to solve key management issues by providing multi-layers 01' security, to make certain that key is delivered without being snilied or compromised. Through the implementation. we have tested that the technique being tested is successlül in sending the secret key to \VSN base station. Universiti Sains Islam Malaysia 2015-12 Thesis en https://oarep.usim.edu.my/handle/123456789/12636 https://oarep.usim.edu.my/bitstreams/a1f41bb2-eefd-4c4e-9aad-d72f1a951265/download 8a4605be74aa9ea9d79846c1fba20a33 https://oarep.usim.edu.my/bitstreams/1bab26e2-b83e-43b4-b97f-2429a3db76cc/download ed36514bf7c2724c8b24e728fd2f2b57 https://oarep.usim.edu.my/bitstreams/d38f49f8-6c8b-466e-bb8a-80074e925087/download 113daa76293a250bb3b0f99a1f08ac2f https://oarep.usim.edu.my/bitstreams/3b456f0e-1c4b-44ce-9dc5-16976b7df4fb/download 40d52b4d5dff94dd792475bcdb82504d https://oarep.usim.edu.my/bitstreams/cf80fc70-9460-4ca1-a464-4bed9e3f1838/download 90aa9f81244da19eca10414762345478 https://oarep.usim.edu.my/bitstreams/0e5621e5-8cdb-419a-8265-bbb343aa2b77/download 0475deeb6dbb1e8a3c53056d9cf4380e https://oarep.usim.edu.my/bitstreams/afcfc1e6-10bf-4e60-bb4a-68b0d78328e2/download 00b83a21ad2c56a7de4e6a5854825519 https://oarep.usim.edu.my/bitstreams/61a999c8-8982-4946-b3fa-30da74a251df/download be77d72bce13a09552b8fcc47f3a2aa0 https://oarep.usim.edu.my/bitstreams/2edcd0a8-3a75-48f2-a80b-f7f92b90b580/download f5ed1477c996318d83c71c7257d03a91 https://oarep.usim.edu.my/bitstreams/fd4c03e4-0343-43f9-9c71-50d226ea171d/download 4b9aef67f6873f28dd07f2aff0fa202c https://oarep.usim.edu.my/bitstreams/d89cb1e5-da7b-491d-867e-c3eb25284fdf/download ab999c7ff2c2b2c5e68c497f1a45ad86 https://oarep.usim.edu.my/bitstreams/4144bac3-d26c-4092-8f06-fe4bac666cf8/download 856239dd26c97b20de8dfffd0b8f5e1e https://oarep.usim.edu.my/bitstreams/5e426096-1ea8-4773-9dc5-9651fdb5aecb/download ab7032757f10a12451fe27f0c3adaf20 https://oarep.usim.edu.my/bitstreams/3a2e7bd6-b201-4045-abb1-6fe845981475/download 51d6c6ccf3efc2fd81adf79683b331ca https://oarep.usim.edu.my/bitstreams/de1f4f28-1a4b-47c4-8e45-4cdd4808470c/download 766a6ae0e5f80f2602ada9b6eb57f42b https://oarep.usim.edu.my/bitstreams/6e328ef8-1726-47a6-9f51-fce16b53a657/download 89e255c34573ee10f4494c5ebc77faba https://oarep.usim.edu.my/bitstreams/673ffeb2-2848-4217-9fa7-c853205ab2e9/download 9aaf1dd0edc0e39bab56748c7a1da5df https://oarep.usim.edu.my/bitstreams/558f8e6f-597c-4dab-9de4-4c16e2fad0ac/download 99de10a7364b46a530a94f924e91ab3d https://oarep.usim.edu.my/bitstreams/9fae5c6b-3c6f-43b2-9155-43ae7b73fdbb/download 19e93ad1f13fc0e36d524e06a27d2c95 Sensor networks Wireless LANs Computer networks Security systems Security measures