Please use this identifier to cite or link to this item:
Title: Security analysis of cryptographic algorithms using computational intelligence for development of secured communication protocol in wireless sensor networks
Researcher: Vimalathithan, R
Guide(s): Valarmathi, M L
Keywords: information and communication engineering
Security analysis
wireless sensor networks
Upload Date: 17-Sep-2014
University: Anna University
Completed Date: 01/06/2012
Abstract: Wireless Personal Area Network WPA consists of sensor newlinenode which are capable of sensing processing and transmitting newlineinformation WPAN finds application in control system with safety newlineapplications like nuclear plants medical application agricultural and newlineresidential monitoring Security authentication and message integrity are newlinethe important parameters to be considered in these applications since newlineworking of these systems have to be secured and preclude from the newlineattackers By considering these issues the research work done in this thesis newlinedevelops a secured communication protocol for WPAN and proposes a newlineclassical technique for key distribution among nodes newline newline
Pagination: xix,119p.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File79.92 kBAdobe PDFView/Open
02_certificates.pdf52.55 kBAdobe PDFView/Open
03_abstract.pdf68.32 kBAdobe PDFView/Open
04_acknowledgement.pdf53.21 kBAdobe PDFView/Open
05_contents.pdf96.55 kBAdobe PDFView/Open
06_chapter 1.pdf157.19 kBAdobe PDFView/Open
07_chapter 2.pdf510.67 kBAdobe PDFView/Open
08_chapter 3.pdf542.67 kBAdobe PDFView/Open
09_chapter 4.pdf334 kBAdobe PDFView/Open
10_chapter 5.pdf528.95 kBAdobe PDFView/Open
11_chapter 6.pdf86.95 kBAdobe PDFView/Open
12_appentix.pdf36.03 kBAdobe PDFView/Open
13_references.pdf89.55 kBAdobe PDFView/Open
14_publications.pdf64.73 kBAdobe PDFView/Open
15_vitae.pdf43.44 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.