Title : RELIABLE COMMUNICATION IN SENSOR NETWORKS USING KDC

Type of Material: Thesis
Title: RELIABLE COMMUNICATION IN SENSOR NETWORKS USING KDC
Researcher: G.MURUGABOOPATHI
Guide: M.RAJANI
Department: Department of Engineering and Technology(Computer Science and Engineering)
Publisher: Bharath University, Chennai
Place: Chennai
Year: 2011
Language: English
Subject: Verifiable Multilateration
Cryptography
Asymmetric algorithms
Computer Science and Information Technology
Engineering and Technology
Dissertation/Thesis Note: PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2011
Fulltext: Shodhganga

00000000ntm a2200000ua 4500
001454597
003IN-AhILN
0052024-09-17 17:41:49
008__240917t2011||||ii#||||g|m||||||||||eng||
035__|a(IN-AhILN)th_454597
040__|aBHAU_600073|dIN-AhILN
041__|aeng
100__|aG.MURUGABOOPATHI|eResearcher
110__|aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein
245__|aRELIABLE COMMUNICATION IN SENSOR NETWORKS USING KDC
260__|aChennai|bBharath University, Chennai|c2011
300__|dDVD
502__|cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2011|bPhD
518__|oDate of Registration|d2005-01-21
520__|aWe consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main contribution is a set of secure protocols that rely on simple network coding operations to provide a robust and low complexity solution for sharing secret keys among sensor nodes, including pair wise keys, cluster keys, key revocation and mobile node authentication. In spite of its role as a key enabler for this approach, the mobile node only has access to an encrypted version of the keys, providing information-theoretic security with respect to attacks focused on the mobile node. Our results include performance evaluation in terms of security metrics and a detailed analysis of resource utilization. The basic scheme was implemented and tested in a real-life sensor network tested. We deem this class of network coding protocols to be particularly well suited for highly constrained dynamic systems such as wireless sensor networks. In
650__|aComputer Science and Information Technology|2UGC
650__|aEngineering and Technology|2AIU
653__|aVerifiable Multilateration
653__|aCryptography
653__|aAsymmetric algorithms
700__|aM.RAJANI|eGuide
856__|uhttp://shodhganga.inflibnet.ac.in/handle/10603/170930|yShodhganga
905__|afromsg

User Feedback Comes Under This section.