Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/353369
Title: | A Lightweight energy efficient and QoS centric protocol with multifactor authentication in integrating wireless sensor networks with IoT |
Researcher: | Tabassum Ara |
Guide(s): | M, Prabhakar |
Keywords: | Computer Science Computer Science Cybernetics Engineering and Technology |
University: | REVA University |
Completed Date: | 2021 |
Abstract: | Verification of the identity of a person, organization or a system as a whole is defined newlineas Authentication. The verification mechanism generally involves many factors and newlinethe level of security is proportional to the number and types of factors involved. newlineMutual authentication is a type of authentication that allows the entities involved to newlinesimultaneously authenticate each other by establishing a communication channel that newlineis secure between them. In Wireless Sensor Network(WSN), authentication plays a newlinecritical role as only registered should gain access to the SNs for data. In this scenario, newlineany new user is authenticated first by sensor node and then the gateway node in the newlineWSN. However, on account of the resource constraint nature and vulnerability of newlineSensor Nodes(SNs), there is always challenges lurking around in terms of physical newlinecapture by any intruders and compromise. Therefore, over the years designing WSN newlinethat is both secure with multi-factor user-authentication techniques has been a newlinechallenging proposition for researchers. newlineThe thesis broadly studies the importance of two key parameters - Security newline(confidentiality and authentication) and Quality-of-Service (QoS) while integrating newlineIoT in a multi-gateway based WSN. The first study deals with simple power analysis newlineattacks. Elliptic Curve Cryptography (ECC) is based on one fundamental operation newlinecalled scalar multiplication which in turn is based on two operations called point newlineaddition and point doubling. It is known that both the operation consumes different newlineamount of power. In WSNs where ECC is implemented, each node requires to perform newlinethese two operations. In general, addition is represented as 1 and doubling as 0. And newlinethe same binary notations are used for recording the keys too which are normally newlineprivate. An attacker can utilize this knowledge to try any side channel attacks. These newlinekind of attacks help the attacker to determine the key easily just by analyzing the newlinepower consumption during the encryption and decryption process in the network and newlinetime taken to |
Pagination: | |
URI: | http://hdl.handle.net/10603/353369 |
Appears in Departments: | School of Computing and Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 285.81 kB | Adobe PDF | View/Open |
02_declaration.pdf | 475.6 kB | Adobe PDF | View/Open | |
03_acknoweledgements.pdf | 303.31 kB | Adobe PDF | View/Open | |
04_abstarct.pdf | 129.42 kB | Adobe PDF | View/Open | |
05_table of contents.pdf | 442.48 kB | Adobe PDF | View/Open | |
06_list of tables-figures-abbreviations.pdf | 381.11 kB | Adobe PDF | View/Open | |
07_chapter.1.pdf | 842.23 kB | Adobe PDF | View/Open | |
08_chapter.2.pdf | 519.7 kB | Adobe PDF | View/Open | |
09_chapter.3.pdf | 1.04 MB | Adobe PDF | View/Open | |
10_chapter.4.pdf | 641.27 kB | Adobe PDF | View/Open | |
11_chapter.5.pdf | 723.25 kB | Adobe PDF | View/Open | |
12_chapter.6.pdf | 757.97 kB | Adobe PDF | View/Open | |
13_chapter.7.pdf | 1.04 MB | Adobe PDF | View/Open | |
14_chapter.8.pdf | 485.46 kB | Adobe PDF | View/Open | |
15_references.pdf | 466.12 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 1.25 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: