Type of Material: | Thesis |
Title: | RELIABLE COMMUNICATION IN SENSOR NETWORKS USING KDC |
Researcher: | G.MURUGABOOPATHI |
Guide: | M.RAJANI |
Department: | Department of Engineering and Technology(Computer Science and Engineering) |
Publisher: | Bharath University, Chennai |
Place: | Chennai |
Year: | 2011 |
Language: | English |
Subject: | Verifiable Multilateration | Cryptography | Asymmetric algorithms | Computer Science and Information Technology | Engineering and Technology |
Dissertation/Thesis Note: | PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2011 |
Fulltext: | Shodhganga |
000 | 00000ntm a2200000ua 4500 | |
001 | 454597 | |
003 | IN-AhILN | |
005 | 2024-09-17 17:41:49 | |
008 | __ | 240917t2011||||ii#||||g|m||||||||||eng|| |
035 | __ | |a(IN-AhILN)th_454597 |
040 | __ | |aBHAU_600073|dIN-AhILN |
041 | __ | |aeng |
100 | __ | |aG.MURUGABOOPATHI|eResearcher |
110 | __ | |aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein |
245 | __ | |aRELIABLE COMMUNICATION IN SENSOR NETWORKS USING KDC |
260 | __ | |aChennai|bBharath University, Chennai|c2011 |
300 | __ | |dDVD |
502 | __ | |cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2011|bPhD |
518 | __ | |oDate of Registration|d2005-01-21 |
520 | __ | |aWe consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main contribution is a set of secure protocols that rely on simple network coding operations to provide a robust and low complexity solution for sharing secret keys among sensor nodes, including pair wise keys, cluster keys, key revocation and mobile node authentication. In spite of its role as a key enabler for this approach, the mobile node only has access to an encrypted version of the keys, providing information-theoretic security with respect to attacks focused on the mobile node. Our results include performance evaluation in terms of security metrics and a detailed analysis of resource utilization. The basic scheme was implemented and tested in a real-life sensor network tested. We deem this class of network coding protocols to be particularly well suited for highly constrained dynamic systems such as wireless sensor networks. In |
650 | __ | |aComputer Science and Information Technology|2UGC |
650 | __ | |aEngineering and Technology|2AIU |
653 | __ | |aVerifiable Multilateration |
653 | __ | |aCryptography |
653 | __ | |aAsymmetric algorithms |
700 | __ | |aM.RAJANI|eGuide |
856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/10603/170930|yShodhganga |
905 | __ | |afromsg |
User Feedback Comes Under This section.