Key research themes
1. How do routing attacks manifest in wireless sensor networks and what detection techniques effectively mitigate them?
This theme explores the prevalence of routing attacks in wireless sensor networks (WSNs), their characteristics, mechanisms, and the corresponding detection methodologies. Due to WSNs’ decentralized architecture, constrained resources, and broadcast nature, routing protocols are particularly vulnerable to a variety of attacks that can severely degrade network performance and security. Understanding these attacks and developing robust detection frameworks is critical to ensuring network reliability and data integrity.
2. What cryptographic and key management schemes are optimal for resource-constrained wireless sensor networks to enhance security?
This research focus addresses the design and evaluation of cryptographic protocols tailored to the limited energy, processing capability, and memory of sensor nodes in WSNs. It scrutinizes the trade-offs between public key cryptography and symmetric key schemes, key distribution protocols, and their impact on network resilience and scalability. Given the critical role of encryption in ensuring confidentiality, authentication, and data integrity, this theme develops guidelines for selecting and implementing security protocols suited to WSN constraints.
3. How do secure routing architectures and protocol frameworks address diverse security threats in wireless sensor networks?
The theme investigates the design of comprehensive security architectures and secure routing protocols that collectively address multiple attack vectors in WSNs, including DoS, node capture, denial of service, and unauthorized access. It evaluates frameworks’ capability to provide confidentiality, integrity, authentication, availability, and resilience through layered protocol designs, trust models, and access controls, supporting secure operation even in hostile and resource-constrained environments.