| Type of Material: | Thesis |
| Title: | RELIABLE COMMUNICATION IN SENSOR NETWORKS USING KDC |
| Researcher: | G.MURUGABOOPATHI |
| Guide: | M.RAJANI |
| Department: | Department of Engineering and Technology(Computer Science and Engineering) |
| Publisher: | Bharath University, Chennai |
| Place: | Chennai |
| Year: | 2011 |
| Language: | English |
| Subject: | Verifiable Multilateration | Cryptography | Asymmetric algorithms | Computer Science and Information Technology | Engineering and Technology |
| Dissertation/Thesis Note: | PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2011 |
| Fulltext: | Shodhganga |
| 000 | 00000ntm a2200000ua 4500 | |
| 001 | 454597 | |
| 003 | IN-AhILN | |
| 005 | 2024-09-17 17:41:49 | |
| 008 | __ | 240917t2011||||ii#||||g|m||||||||||eng|| |
| 035 | __ | |a(IN-AhILN)th_454597 |
| 040 | __ | |aBHAU_600073|dIN-AhILN |
| 041 | __ | |aeng |
| 100 | __ | |aG.MURUGABOOPATHI|eResearcher |
| 110 | __ | |aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein |
| 245 | __ | |aRELIABLE COMMUNICATION IN SENSOR NETWORKS USING KDC |
| 260 | __ | |aChennai|bBharath University, Chennai|c2011 |
| 300 | __ | |dDVD |
| 502 | __ | |cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2011|bPhD |
| 518 | __ | |oDate of Registration|d2005-01-21 |
| 520 | __ | |aWe consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main contribution is a set of secure protocols that rely on simple network coding operations to provide a robust and low complexity solution for sharing secret keys among sensor nodes, including pair wise keys, cluster keys, key revocation and mobile node authentication. In spite of its role as a key enabler for this approach, the mobile node only has access to an encrypted version of the keys, providing information-theoretic security with respect to attacks focused on the mobile node. Our results include performance evaluation in terms of security metrics and a detailed analysis of resource utilization. The basic scheme was implemented and tested in a real-life sensor network tested. We deem this class of network coding protocols to be particularly well suited for highly constrained dynamic systems such as wireless sensor networks. In |
| 650 | __ | |aComputer Science and Information Technology|2UGC |
| 650 | __ | |aEngineering and Technology|2AIU |
| 653 | __ | |aVerifiable Multilateration |
| 653 | __ | |aCryptography |
| 653 | __ | |aAsymmetric algorithms |
| 700 | __ | |aM.RAJANI|eGuide |
| 856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/10603/170930|yShodhganga |
| 905 | __ | |afromsg |
User Feedback Comes Under This section.