Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/343941
Title: Elliptic curve cryptography based encryption algorithms for secured routing in wireless sensor networks
Researcher: Viswanathan S
Guide(s): Kannan A and Bhuvaneswaran R S
Keywords: Engineering and Technology
Computer Science
Telecommunications
Encryption Algorithms
Secured Routing
Wireless Sensor Networks
Elliptic Curve Cryptography
University: Anna University
Completed Date: 2020
Abstract: The current era has seen an explosive growth in data communications through the internet. Applications like online banking, personal digital assistants, mobile communication, smartcards, etc. have emphasized the need for security in resource constrained environments. Moreover, sensor networks provide a way to collect data from the environment for providing many essential services including vehicle movements in roads, body sensors for health monitoring, agricultural sensor for effective production, home appliances and military applications. In such a scenario, security of data communicated through wireless sensor networks is a challenging issue to be addressed for the successful implementation of sensor networks based applications. Elliptic Curve Cryptography (ECC) serves as a perfect cryptographic technique for providing security on communications in sensor networks because of its short key sizes and efficiency compared to other standard public key algorithms. However, to match the ever increasing requirement of spped in today s applications, effective key management techniques to suit the hardware acceleration of the computations for cryptographic algorithms is a necessity without compromising the overall network performance. Therefore, it is necessary to reduce the key size of public key cryptographic algorithms for fast key computation and encryption. In addition, the key generation process must involve the computation of additional functions for enhancing the security. Hence, the important functions present in mathematical theory have been used in this research work to form more secured keys for communications. newline newline
Pagination: xxi, 165p.
URI: http://hdl.handle.net/10603/343941
Appears in Departments:Faculty of Science and Humanities

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File22.82 kBAdobe PDFView/Open
02_certificates.pdf1.28 MBAdobe PDFView/Open
03_abstracts.pdf17.23 kBAdobe PDFView/Open
04_acknowledgements.pdf3.51 MBAdobe PDFView/Open
05_contents.pdf18.55 kBAdobe PDFView/Open
06_listoftables.pdf3.3 kBAdobe PDFView/Open
07_listoffigures.pdf6.63 kBAdobe PDFView/Open
08_listofabbreviations.pdf21.42 kBAdobe PDFView/Open
09_chapter1.pdf117.7 kBAdobe PDFView/Open
10_chapter2.pdf127.72 kBAdobe PDFView/Open
11_chapter3.pdf283.19 kBAdobe PDFView/Open
12_chapter4.pdf850.47 kBAdobe PDFView/Open
13_chapter5.pdf233.6 kBAdobe PDFView/Open
14_chapter6.pdf656.51 kBAdobe PDFView/Open
15_conclusion.pdf350.23 kBAdobe PDFView/Open
16_references.pdf104.98 kBAdobe PDFView/Open
17_listofpublications.pdf14.58 kBAdobe PDFView/Open
80_recommendation.pdf177.51 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: