Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/199618
Title: Centralized and Decentralized Timestamp Based Approach for Wireless Sensor Networks
Researcher: Pandya Sharnil
Guide(s): Wandra k.h.
Keywords: Castallia Simulator
Elgamal Digital Signature Scheme
ID Based Authentication
NesC
Secure and Efficient Data Transmission Protocol
Secure and Efficient Transmission
Secure End to End Communication
TinyOS
University: RK University
Completed Date: 2015
Abstract: Abstract newlineIn today s extravagant era, humans are blessed with innumerable technological advancements and inventions to automate their daily routine and time consuming complicated tasks. Wireless Sensor Networks are one of the most promising advancement of 21st century. They have picked up the notoriety of turning into the most guaranteeing engineering of 21st century because of its ease and capacity to cross longer distances in unattended unfriendly situations. In general, wireless sensor networks are mixture of low cost, low power, distributed or centralized, reusable or rechargeable devices which can transmit sensory information present in the surrounding environment to their neighbouring sensor nodes. Nevertheless, along with such innovations, the introduction of wireless sensor networks have also evolved certain security hazards in both centralized and decentralized sensor network environments. newlineIn many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications [15 45], the issue of end to end secure communications is largely ignored. Authentication in Wireless Sensor Networks (WSNs) is a challenging process. Providing authentication for the Nodes in WSN is a vital issue in Secure Group communication among WSNs. Massive group of tiny sensor Nodes forms WSNs and these are placed in open, unattended environment. Due to this reason, nodes in WSN can endure exclusive encounters. WSNs are more vulnerable to active and passive attacks than wired ones due to their broadcasting nature, limitations in resources and unrestrained environments. However, security will be a significant factor for their complete implementation. In this conducted research, a new approach has been introduced to achieve secure authentication among nodes in WSNs in both centralized and clustered wireless scenarios. newline
Pagination: 112
URI: http://hdl.handle.net/10603/199618
Appears in Departments:Faculty of Technology

Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: