Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/343941
Title: | Elliptic curve cryptography based encryption algorithms for secured routing in wireless sensor networks |
Researcher: | Viswanathan S |
Guide(s): | Kannan A and Bhuvaneswaran R S |
Keywords: | Engineering and Technology Computer Science Telecommunications Encryption Algorithms Secured Routing Wireless Sensor Networks Elliptic Curve Cryptography |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | The current era has seen an explosive growth in data communications through the internet. Applications like online banking, personal digital assistants, mobile communication, smartcards, etc. have emphasized the need for security in resource constrained environments. Moreover, sensor networks provide a way to collect data from the environment for providing many essential services including vehicle movements in roads, body sensors for health monitoring, agricultural sensor for effective production, home appliances and military applications. In such a scenario, security of data communicated through wireless sensor networks is a challenging issue to be addressed for the successful implementation of sensor networks based applications. Elliptic Curve Cryptography (ECC) serves as a perfect cryptographic technique for providing security on communications in sensor networks because of its short key sizes and efficiency compared to other standard public key algorithms. However, to match the ever increasing requirement of spped in today s applications, effective key management techniques to suit the hardware acceleration of the computations for cryptographic algorithms is a necessity without compromising the overall network performance. Therefore, it is necessary to reduce the key size of public key cryptographic algorithms for fast key computation and encryption. In addition, the key generation process must involve the computation of additional functions for enhancing the security. Hence, the important functions present in mathematical theory have been used in this research work to form more secured keys for communications. newline newline |
Pagination: | xxi, 165p. |
URI: | http://hdl.handle.net/10603/343941 |
Appears in Departments: | Faculty of Science and Humanities |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 22.82 kB | Adobe PDF | View/Open |
02_certificates.pdf | 1.28 MB | Adobe PDF | View/Open | |
03_abstracts.pdf | 17.23 kB | Adobe PDF | View/Open | |
04_acknowledgements.pdf | 3.51 MB | Adobe PDF | View/Open | |
05_contents.pdf | 18.55 kB | Adobe PDF | View/Open | |
06_listoftables.pdf | 3.3 kB | Adobe PDF | View/Open | |
07_listoffigures.pdf | 6.63 kB | Adobe PDF | View/Open | |
08_listofabbreviations.pdf | 21.42 kB | Adobe PDF | View/Open | |
09_chapter1.pdf | 117.7 kB | Adobe PDF | View/Open | |
10_chapter2.pdf | 127.72 kB | Adobe PDF | View/Open | |
11_chapter3.pdf | 283.19 kB | Adobe PDF | View/Open | |
12_chapter4.pdf | 850.47 kB | Adobe PDF | View/Open | |
13_chapter5.pdf | 233.6 kB | Adobe PDF | View/Open | |
14_chapter6.pdf | 656.51 kB | Adobe PDF | View/Open | |
15_conclusion.pdf | 350.23 kB | Adobe PDF | View/Open | |
16_references.pdf | 104.98 kB | Adobe PDF | View/Open | |
17_listofpublications.pdf | 14.58 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 177.51 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: