Table Of ContentAPPROVAL SHEET
TitleofDissertation: AHolisticApproachtoSecureSensorNetworks
NameofCandidate: SasikanthAvancha
DoctorofPhilosophy,2005
DissertationandAbstractApproved:
Dr.AnupamJoshi
Professor
DepartmentofComputerScienceand
ElectricalEngineering
DateApproved:
CURRICULUM VITAE
Name: SasikanthAvancha.
PermanentAddress: 4776DraytonGreen,BaltimoreMD21227.
Degreeanddatetobeconferred: DoctorofPhilosophy,2005.
DateofBirth: February8,1972.
PlaceofBirth: Chennai,India.
Collegiateinstitutionsattended:
(cid:0)
UniversityVisvesvarayaCollegeofEngineering,
BachelorofEngineering,ComputerScience&Engineering,1994.
(cid:0)
UniversityofMaryland,BaltimoreCounty,
MasterofScience,ComputerScience,2002.
(cid:0)
UniversityofMaryland,BaltimoreCounty,
DoctorofPhilosophy,ComputerScience,2005.
Major: ComputerScience.
Professionalpublications:
(cid:0)
S.Avancha,J.Undercoffer,A.JoshiandJ.Pinkston,SecurityforWirelessSensorNetworks,Chapter
12inWirelessSensorNetworks(C.S.Raghavendra,K.M.SivalingamandT.Znatieds.),May2004.
(cid:0)
S.Avancha,D.Chakraborty,F.PerichandA.Joshi,DataandServicesforMobileComputing,
PracticalHandbookofInternetComputing,(MunindarSinghed.),CRCPress,November2004.
(cid:0)
S.Avancha,J.Undercoffer,A.JoshiandJ.Pinkston,SecureSensorNetworksforPerimeter
Protection,ComputerNetworks(Elsevier),Vol.43,No.4,November2003.
(cid:0)
S.Avancha,P.D’Souza,F.Perich,A.JoshiandY.Yesha,P2PM-CommerceinPervasive
Environments,ACMSIGecomExchanges,Vol.3,No.4,January2003.
(cid:0)
S.Avancha,V.Korolev,A.Joshi,T.FininandY.Yesha,OnExperimentswithaTransportProtocolfor
PervasiveComputingEnvironments,ComputerNetworks(Elsevier),Vol. 40,No.4,November2002.
(cid:0)
L.Kagal,V.Korolev,S.Avancha,A.Joshi,T.FininandY.Yesha,Centaurus:AnInfrastructurefor
ServiceManagementinUbiquitousComputing,WirelessNetworks(Kluwer),Volume8,No.6,
November2002.
(cid:0)
T.Finin,A.Joshi,L.Kagal,O.Ratsimor,S.Avancha,V.Korolev,H.Chen,F.PerichandR.Scott
Cost,IntelligentAgentsforMobileandEmbeddedDevices,InternationalJournalofCooperative
InformationSystems,Vol. 11,Nos.3&4,Sept./Dec.2002.
(cid:0)
S.Avancha,A.JoshiandT.Finin,EnhancedServiceDiscoveryinBluetooth,IEEEComputer,Vol. 35,
No.6,June2002.
(cid:0)
S.Avancha,C.Patel,A.Joshi,Ontology-drivenAdaptiveSensorNetworks,InProc.TheFirstAnnual
InternationalConferenceonMobileandUbiquitousSystems:NetworkingandServices,August2004.
(cid:0)
F.Perich,S.Avancha,D.Chakraborty,A.JoshiandY.Yesha,Pro(cid:2)leDrivenDataManagementin
PervasiveEnvironments,InProc.13thInternationalWorkshoponDatabaseandExpertSystems
Applications,September2002.
(cid:0)
B.Bethala,A.Joshi,D.Phatak,S.AvanchaandT.Goff,SimulationofaCommonAccessPointfor
Bluetooth,802.11andWiredLANs,InProc.InternationalConferenceonParallelandDistributed
ProcessingTechniquesandApplications,June2002.
(cid:0)
S.Avancha,D.Chakraborty,H.Chen,L.Kagal,F.Perich,T.FininandA.Joshi,IssuesinData
ManagementforPervasiveEnvironments,InProc.NSFWorkshoponContextAwareMobile
DatabaseManagement(CAMM),January2002.
(cid:0)
D.Chakraborty,F.Perich,S.AvanchaandA.Joshi,AnAgentDiscoveryArchitectureusingRonin
andDReggie,InProc.1stGSFC/JPLWorkshoponRadicalAgentConcepts(WRAC),January2002.
(cid:0)
D.Chakraborty,F.Perich,S.AvanchaandA.Joshi,DReggie:SemanticServiceDiscoveryfor
M-CommerceApplications,InProc.WorkshoponReliableandSecureApplicationsinMobile
Environments,inconjunctionwith20thSymposiumonReliableDistributedSystems,October2001.
(cid:0)
S.Avancha,V.KorolevandA.Joshi,TransportProtocolsinWirelessNetworks,InProc.10thIEEE
InternationalConferenceonComputerCommunicationsandNetworks,September2001.
(cid:0)
S.Avancha,D.Chakraborty,D.Gada,T.KamdarandA.Joshi,FastandEf(cid:2)cientHandoffScheme
usingForwardingPointersandHierarchicalForeignAgents,InProc.ConferenceonDesignand
ModelingofWirelessNetworks,ITCom,August2001.
(cid:0)
S.Avancha,J.Undercoffer,A.JoshiandJ.Pinkston,AClusteringApproachtoSecureSensor
Networks,UMBCTechnicalReportTR-CS-04-01,January2004
(cid:0)
S.Avancha,A.JoshiandJ.Pinkston,OnSelf-OrganizationandSecurityinDistributedWireless
SensorNetworks,UMBCTechnicalReportTR-CS-04-03,April2004
(cid:0)
S.Avancha,A.JoshiandJ.Pinkston,SWANS:AFrameworkforAdaptiveWirelessSensorNetworks,
UMBCTechnicalReportTR-CS-05-01,March2005
Professionalpositionsheld:
(cid:0)
GraduateResearchAssistant(August2000-Present).
DepartmentofComputerScienceandElectricalEngineering,UniversityofMaryland,Baltimore
County
(cid:0)
GraduateResearchIntern(February2002-May2002).
FujitsuLabsofAmerica,Inc.
(cid:0)
GraduateResearchAssistant(August1999-August2000).
DepartmentofDiagnosticRadiology,UniversityofMarylandSchoolofMedicine
(cid:0)
SeniorSoftwareEngineer(September1997-July1997).
PeritusSoftwareServices,Inc.
(cid:0)
SystemsEngineer(February1996-September1997).
BFLSoftwareLtd.,Bangalore,India
(cid:0)
ProjectAssistant(November1994-February1996).
IndianInstituteofScience,Bangalore
ABSTRACT
TitleofDissertation: AHolisticApproachtoSecure SensorNetworks
SasikanthAvancha,DoctorofPhilosophy,2005
Dissertationdirectedby: Dr.AnupamJoshi
Professor
DepartmentofComputerScienceand
ElectricalEngineering
Wirelesssensornetworks(WSNs) formauniqueclass ofadhocnetworksconsisting ofheterogeneous
but highly resource-constraineddevices that can sense their environment and report sensed data to desig-
natednodesinthenetwork. We presenta holisticapproachtoimprovetheperformanceofwireless sensor
networkswithrespecttosecurity,longevityandconnectivityunderchangingenvironmentalconditions. Our
approachis two-fold: Wehavecreatedaframeworkforadaptabilitythatdetects,classi(cid:2)es andrespondsto
environmentalvariations affectingWSN performance. We have also designedsecuritymechanisms in our
frameworktodemonstrateWSNadaptations.Oursecuritymechanismscanbeusedasbasicbuildingblocks
inWSNdesigns. TheadaptabilityframeworkisgenericandensuresthatWSNscanrespondtoavarietyof
changesinenvironmentalconditions,suchas variationsrelatedtosecurityandnetworktopology,affecting
theirperformance.
Wehavedesignedatwo-tieradaptabilitycomponent,SWANS,usingaprincipled,ontologicalapproach
toensurebothlocalandglobalresponsestoenvironmentalvariations. Localresponsesaregeneratedbyin-
dividualsensornodes. Atnodelevel,SWANSmonitorsasetoftwenty-onelow-levelparameters(including
thoseassociatedwithsecureWSNestablishment)andemploysalocalknowledgebasetocomputethenode’s
logical state. It employsa set of rules determine the most appropriateresponsecorrespondingto a logical
state. At networklevelSWANS combinessensor nodestate informationwith user-de(cid:2)nedconstraintsand
sensordata.Itemploysanetwork-levelknowledgebasetocomputethenetwork’slogicalstateandgeneratea
globalresponsetotheobservedenvironmentalvariation.ExperimentalevaluationsshowthatWSNsemploy-
ingSWANSaremoresecure,livelongerandhavebetterconnectivitythantheirnon-adaptivecounterparts.
Wealsodesignedasetofthreesecurityprotocolsuites,SONETS,thatsecuresaWSNagainstdifferent
classesofadversaries. P-SONETSisacentralizedprotocolsuitethatsecuresWSNsdeployedtoestablisha
perimeteraroundhighvalueassetsagainstadversarieswhoseektobreachtheperimeterandattacktheasset.
C-SONETSisascalablecentralizedprotocolsuitecontaininganoveltopologydiscoveryandkeysetuppro-
tocoltothwartadversarieswithglobalpresenceintheareaofinterestcapableofattackingtheWSNbefore,
duringandafteritsformation. D-SONETSisadistributedprotocolsuitethatensuresrapidestablishmentof
asecureWSNfornon-criticalapplicationsinwhichadversarypresenceislocal. Experimentalevaluationsof
P-SONETS,C-SONETSandD-SONETSshowtheirfeasibilitytotheassociatedapplicationclassandtheir
abilitytothwartadversariescorrespondingtoeachclass.
A Holistic Approach to Secure Sensor
Networks
by
SasikanthAvancha
DissertationsubmittedtotheFacultyoftheGraduateSchool
oftheUniversityofMarylandinpartialful(cid:2)llment
oftherequirementsforthedegreeof
DoctorofPhilosophy
2005
In memory of my mother
ii
First, I would like to thank and acknowledge my brother Ravikanth and my father for their constant
encouragementandsupportduringthisendeavor. IwouldalsoliketothankAnupamJoshi,myadviser,for
hisguidanceandsupport.Mycommitteemembers,TimFinin,JohnPinkston,KrishnaSivalingam,Jonathan
Agre and Prathima Agrawal have my heartfelt thanks for their priceless intellectual contributions. To my
friendsandcolleagues: JeffreyL.Undercoffer,FilipPerich,DipanjanChakrabortyandVladimirKorolev(cid:150)
ourcollaborativeeffortshelpedshapeideasinthisresearch.
iii
Description:12 in Wireless Sensor Networks (C. S. Raghavendra, K. M. Sivalingam and T.
Znati eds.), May 2004 S. Avancha, D. Chakraborty, F. Perich and A. Joshi, Data