Please use this identifier to cite or link to this item:
Guide(s): M.RAJANI
University: Bharath University
Completed Date: 2011
Abstract: newline quotWe consider the problem of secret key distribution in a sensor network with newlinemultiple scattered sensor nodes and a mobile device that can be used to bootstrap newlinethe network. Our main contribution is a set of secure protocols that rely on simple newlinenetwork coding operations to provide a robust and low complexity solution for newlinesharing secret keys among sensor nodes, including pair wise keys, cluster keys, key newlinerevocation and mobile node authentication. In spite of its role as a key enabler for newlinethis approach, the mobile node only has access to an encrypted version of the keys, newlineproviding information-theoretic security with respect to attacks focused on the newlinemobile node. Our results include performance evaluation in terms of security newlinemetrics and a detailed analysis of resource utilization. The basic scheme was newlineimplemented and tested in a real-life sensor network tested. We deem this class of newlinenetwork coding protocols to be particularly well suited for highly constrained newlinedynamic systems such as wireless sensor networks. newlineIn mobile node communications a set of secure protocols that rely on simple newlinenetwork coding operations to provide robust and low-complexity solution for newlinesharing secret keys among sensor node authentication. Key distribution refers to newlinethe problem of establishing shared secrets on sensor nodes such that secret newlinevi newlinesymmetric keys for communication privacy, integrity and authenticity can be newlinegenerated. A key distribution scheme should allow a sensor network to bootstrap newline(initialize) a secure communications infrastructure providing secrecy (i.e. newlineoutsiders cannot derive information from eavesdropping on the wireless newlinecommunications of the nodes) and preferably entity and message authentication. It newlineshould also allow for the addition of new nodes and preferably the revocation of newlineold nodes. In an early publication (SPINs) we proposed a basic symmetric key newlineestablishment protocol mediated by a base-station acting as a trusted authority. newlineThis research is an attempt to use secret key distribution for mobile node us
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
final gm thesis-index.pdfAttached File357.78 kBAdobe PDFView/Open
final_gm_thesis.pdf1.84 MBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.