Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/333921
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialRobust symmetric key management techniques for next generation networks
dc.date.accessioned2021-07-29T10:19:17Z-
dc.date.available2021-07-29T10:19:17Z-
dc.identifier.urihttp://hdl.handle.net/10603/333921-
dc.description.abstractIn the 21st century, wireless broadband technology is evolving through services and applications accessed at high speed, therefore, it is changing the way we live, work, and communicate. Wireless broadband communication has proven to be cost-effective, easy to access, fast, reliable and quick to deploy for applications and services. Nowadays, wireless newlinecommunication has become an important component of a network acting as a backbone for government sectors, large enterprises, telecom, military, universities, etc. The broadband wireless network is better than wireline in terms of cost, performance, and services with respect to deployment. Though, with the globe trending towards technologies such as 4th Generation (4G)/Long Term Evolution (LTE) and 5th Generation (5G), worries about security and lack of privacy protection should not turn as a barrier for adoption of Next Generation Networks (NGN). Though wireless broadband technologies aim to provide last mile connectivity, end-to-end security is needed at all levels of communication. Since most of the wireless technologies are based on shared Radio Frequencies (RF), the chance for intrusion is high when compared to wired deployments. Hence, securing the end users and protecting the network resources are the most interesting challenges for researchers and service providers in NGN. In NGN, privacy theft, Denial of Service (DoS) and Manin- the-Middle (MitM) attack are the major security challenges need to be addressed in order to benefits the end users. Confidentiality, integrity, and availability are the main goals of security solutions to protect the end user privacy. To overcome the existing network security issues and to protect system for future attacks, a secure framework for NGNs is required. newline newline
dc.format.extentxxvi,149p.
dc.languageEnglish
dc.relationp.136-148
dc.rightsuniversity
dc.titleRobust symmetric key management techniques for next generation networks
dc.title.alternative
dc.creator.researcherRajakumar, A
dc.subject.keywordNetworks
dc.subject.keywordWireless communication
dc.subject.keyword5th Generation
dc.description.note
dc.contributor.guideGunasekaran, R
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registered
dc.date.completed2020
dc.date.awarded2020
dc.format.dimensions21cm
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File149.64 kBAdobe PDFView/Open
02_certificates.pdf77.47 kBAdobe PDFView/Open
03_vivaproceedings.pdf67.26 kBAdobe PDFView/Open
04_bonafidecertificate.pdf42.29 kBAdobe PDFView/Open
05_abstracts.pdf55.77 kBAdobe PDFView/Open
06_acknowledgements.pdf62.07 kBAdobe PDFView/Open
07_contents.pdf64.62 kBAdobe PDFView/Open
08_listoftables.pdf41.94 kBAdobe PDFView/Open
09_listoffigures.pdf49.69 kBAdobe PDFView/Open
10_listofabbreviations.pdf65.3 kBAdobe PDFView/Open
11_chapter1.pdf567.3 kBAdobe PDFView/Open
12_chapter2.pdf1.79 MBAdobe PDFView/Open
13_chapter3.pdf1.5 MBAdobe PDFView/Open
14_chapter4.pdf1.65 MBAdobe PDFView/Open
15_conclusion.pdf126.73 kBAdobe PDFView/Open
16_appendices.pdf526.36 kBAdobe PDFView/Open
17_references.pdf321.39 kBAdobe PDFView/Open
18_listofpublications.pdf81.25 kBAdobe PDFView/Open
80_recommendation.pdf196.76 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: