Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/11694
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2013-10-03T08:40:34Z-
dc.date.available2013-10-03T08:40:34Z-
dc.date.issued2013-10-03-
dc.identifier.urihttp://hdl.handle.net/10603/11694-
dc.description.abstractWireless Sensor Network (WSN) is built with a large number of small battery powered device called sensor node with limited energy, memory, computation and communication capabilities. A close interaction of WSN with their physical environment and unattended deployment of sensor nodes in hostile environment makes WSN highly vulnerable to attacks. Imparting security in wireless sensor network is considered to be a tedious chore. Key management is the most important for secured data transmission in WSN. Generally in the existing key management schemes in WSN, shared keys are established for all pairs of neighbor sensor nodes without considering the communication between the nodes which degrades the secured data transmission in the network. Energy efficiency is one of the core problems due to low power support for sensor nodes. The communication module is the part consuming most energy and the Medium Access Control (MAC) protocol directly controls the communication module. The Secured Energy Efficient Key Management (SEEKM) scheme proposed in this thesis includes the key management scheme for WSN, which improves the security and energy efficiency by establishing shared keys only for active sensors in direct communication and not with other nodes. SEEKM scheme is accomplished along with routing protocols namely Ad-hoc On-demand Distance Vector (AODV), Destination Sequenced Distance Vector (DSDV), Low Energy Adaptive Clustering Hierarchy (LEACH) and Power Efficient GAthering in Sensor Information Systems (PEGASIS). Simulation is carried out with SEEKM along with routing protocols namely DSDV, AODV, LEACH and PEGASIS to find out the evaluation metrics such as resilience, energy consumption, delivery ratio and end to end delay. From the evaluation metrics it is consummate that SEEKM with PEGASIS more secure and energy efficient than other routing protocols AODV, DSDV and LEACH. newline newline newlineen_US
dc.format.extentxvi, 104en_US
dc.languageEnglishen_US
dc.relation104en_US
dc.rightsuniversityen_US
dc.titleSecured energy efficient key management scheme for wireless sensor networken_US
dc.creator.researcherGnana Kousalya Cen_US
dc.subject.keywordSecured Energy Efficient Key Management(SEEKM), Medium Access Control (MAC), Wireless Sensor Netowrk(WSN)en_US
dc.description.noteNoneen_US
dc.contributor.guideAnandha Mala, G Sen_US
dc.publisher.placeChennaien_US
dc.publisher.universityAnna Universityen_US
dc.publisher.institutionFaculty of Information and Communication Engineeringen_US
dc.date.registered1, June 2011en_US
dc.format.dimensions23.5 cm x 15 cmen_US
dc.format.accompanyingmaterialNoneen_US
dc.source.universityUniversityen_US
dc.type.degreePh.D.en_US
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File49.58 kBAdobe PDFView/Open
02_certificates.pdf1.07 MBAdobe PDFView/Open
03_abstract.pdf16.77 kBAdobe PDFView/Open
04_acknowledgement.pdf15.12 kBAdobe PDFView/Open
05_contents.pdf42.69 kBAdobe PDFView/Open
06_chapter 1.pdf51.88 kBAdobe PDFView/Open
07_chapter 2.pdf87.22 kBAdobe PDFView/Open
08_chapter 3.pdf109.26 kBAdobe PDFView/Open
09_chapter 4.pdf1.19 MBAdobe PDFView/Open
10_chapter 5.pdf25.46 kBAdobe PDFView/Open
11_references.pdf45.51 kBAdobe PDFView/Open
12_publications.pdf15.56 kBAdobe PDFView/Open
13_vitae.pdf12.57 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: