Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/347053
Title: | An efficient method for disaster management Through trust with conditional privacy Preserving authentication using wsn |
Researcher: | Uma Priyadarsini P S |
Guide(s): | P Sriramya |
Keywords: | Automation and Control Systems Computer Science Engineering and Technology |
University: | Saveetha University |
Completed Date: | 2021 |
Abstract: | In recent years an efficient design of a Wireless Sensor Network newlinehas become a leading area of research. Wireless Sensor Networks (WSNs) newlineare self-configured and does not require any infrastructure. They are used to newlinemonitor physical or environmental conditions, such as temperature, sound, newlinevibration, pressure, motion or pollutants and to willingly pass their data through the network to a core location or sink where the data can be detected and scrutinized.Today the mobile subscribers can access the internet service newlinewhenever they want or wherever they are because of the roaming service. newlineThe necessity of accessing pervasively for the developing paradigm of newlinenetworking is accomplished through this facility. In order to provide universal newlineroaming service which is secure and privacy preserving at the multilevel, a newlineprivacy-preserving validation which is conditional with access likability called newlineCPAL for roaming service is suggested in second phase. By utilizing a newlinemethod of group signature, it provides linking function of an anonymous newlineuser. This method has the capability to keep the identity of the users newlineconcealed and makes the authorized bodies possible to connect all the newlineaccess information of the same user even without knowing the user s real newlineidentity. In order to connect the access information from the user for newlineenhancing the service, the foreign operators who are authorized or the newlineservice providers particularly uses the master linking key possessed by the newlinetrust linking server. In order to examine user s likings, the individual access newlineinformation is used but user s identity is not disclosed. Subscribers can newlinefurther make use of this functionality to probe the service usage without newlinebeing identified. The proposed method also has the efficiency to newlinesimultaneously revoke a group of users. Comprehensive analysis of CPAL newlinedemonstrates that it can withstand many security threats and more newlineadjustable in privacy preservation as compared to the other techniques. newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/347053 |
Appears in Departments: | Department of Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf.pdf | Attached File | 94.98 kB | Adobe PDF | View/Open |
02_certificate.pdf.pdf | 140.37 kB | Adobe PDF | View/Open | |
03_abstract.pdf.pdf | 155.22 kB | Adobe PDF | View/Open | |
04_declaration.pdf.pdf | 138.92 kB | Adobe PDF | View/Open | |
05_acknowledgement.pdf.pdf | 87.92 kB | Adobe PDF | View/Open | |
06_contents.pdf.pdf | 96.72 kB | Adobe PDF | View/Open | |
07_list_of_tables.pdf.pdf | 89.55 kB | Adobe PDF | View/Open | |
08_list_of_figures.pdf.pdf | 97.56 kB | Adobe PDF | View/Open | |
09_abbreviations.pdf.pdf | 122.85 kB | Adobe PDF | View/Open | |
10_chapter1.pdf.pdf | 334.05 kB | Adobe PDF | View/Open | |
11_chapter2.pdf.pdf | 343.22 kB | Adobe PDF | View/Open | |
12_chapter3.pdf.pdf | 438.47 kB | Adobe PDF | View/Open | |
13_chapter4.pdf.pdf | 479.87 kB | Adobe PDF | View/Open | |
14_chapter5.pdf.pdf | 661.49 kB | Adobe PDF | View/Open | |
15_conclusion.pdf | 166.52 kB | Adobe PDF | View/Open | |
16_bibliography.pdf | 350.9 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 166.52 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: