Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/11694
Title: Secured energy efficient key management scheme for wireless sensor network
Researcher: Gnana Kousalya C
Guide(s): Anandha Mala, G S
Keywords: Secured Energy Efficient Key Management(SEEKM), Medium Access Control (MAC), Wireless Sensor Netowrk(WSN)
Upload Date: 3-Oct-2013
University: Anna University
Abstract: Wireless Sensor Network (WSN) is built with a large number of small battery powered device called sensor node with limited energy, memory, computation and communication capabilities. A close interaction of WSN with their physical environment and unattended deployment of sensor nodes in hostile environment makes WSN highly vulnerable to attacks. Imparting security in wireless sensor network is considered to be a tedious chore. Key management is the most important for secured data transmission in WSN. Generally in the existing key management schemes in WSN, shared keys are established for all pairs of neighbor sensor nodes without considering the communication between the nodes which degrades the secured data transmission in the network. Energy efficiency is one of the core problems due to low power support for sensor nodes. The communication module is the part consuming most energy and the Medium Access Control (MAC) protocol directly controls the communication module. The Secured Energy Efficient Key Management (SEEKM) scheme proposed in this thesis includes the key management scheme for WSN, which improves the security and energy efficiency by establishing shared keys only for active sensors in direct communication and not with other nodes. SEEKM scheme is accomplished along with routing protocols namely Ad-hoc On-demand Distance Vector (AODV), Destination Sequenced Distance Vector (DSDV), Low Energy Adaptive Clustering Hierarchy (LEACH) and Power Efficient GAthering in Sensor Information Systems (PEGASIS). Simulation is carried out with SEEKM along with routing protocols namely DSDV, AODV, LEACH and PEGASIS to find out the evaluation metrics such as resilience, energy consumption, delivery ratio and end to end delay. From the evaluation metrics it is consummate that SEEKM with PEGASIS more secure and energy efficient than other routing protocols AODV, DSDV and LEACH. newline newline newline
Pagination: xvi, 104
URI: http://hdl.handle.net/10603/11694
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File49.58 kBAdobe PDFView/Open
02_certificates.pdf1.07 MBAdobe PDFView/Open
03_abstract.pdf16.77 kBAdobe PDFView/Open
04_acknowledgement.pdf15.12 kBAdobe PDFView/Open
05_contents.pdf42.69 kBAdobe PDFView/Open
06_chapter 1.pdf51.88 kBAdobe PDFView/Open
07_chapter 2.pdf87.22 kBAdobe PDFView/Open
08_chapter 3.pdf109.26 kBAdobe PDFView/Open
09_chapter 4.pdf1.19 MBAdobe PDFView/Open
10_chapter 5.pdf25.46 kBAdobe PDFView/Open
11_references.pdf45.51 kBAdobe PDFView/Open
12_publications.pdf15.56 kBAdobe PDFView/Open
13_vitae.pdf12.57 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: