Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/353369
Title: A Lightweight energy efficient and QoS centric protocol with multifactor authentication in integrating wireless sensor networks with IoT
Researcher: Tabassum Ara
Guide(s): M, Prabhakar
Keywords: Computer Science
Computer Science Cybernetics
Engineering and Technology
University: REVA University
Completed Date: 2021
Abstract: Verification of the identity of a person, organization or a system as a whole is defined newlineas Authentication. The verification mechanism generally involves many factors and newlinethe level of security is proportional to the number and types of factors involved. newlineMutual authentication is a type of authentication that allows the entities involved to newlinesimultaneously authenticate each other by establishing a communication channel that newlineis secure between them. In Wireless Sensor Network(WSN), authentication plays a newlinecritical role as only registered should gain access to the SNs for data. In this scenario, newlineany new user is authenticated first by sensor node and then the gateway node in the newlineWSN. However, on account of the resource constraint nature and vulnerability of newlineSensor Nodes(SNs), there is always challenges lurking around in terms of physical newlinecapture by any intruders and compromise. Therefore, over the years designing WSN newlinethat is both secure with multi-factor user-authentication techniques has been a newlinechallenging proposition for researchers. newlineThe thesis broadly studies the importance of two key parameters - Security newline(confidentiality and authentication) and Quality-of-Service (QoS) while integrating newlineIoT in a multi-gateway based WSN. The first study deals with simple power analysis newlineattacks. Elliptic Curve Cryptography (ECC) is based on one fundamental operation newlinecalled scalar multiplication which in turn is based on two operations called point newlineaddition and point doubling. It is known that both the operation consumes different newlineamount of power. In WSNs where ECC is implemented, each node requires to perform newlinethese two operations. In general, addition is represented as 1 and doubling as 0. And newlinethe same binary notations are used for recording the keys too which are normally newlineprivate. An attacker can utilize this knowledge to try any side channel attacks. These newlinekind of attacks help the attacker to determine the key easily just by analyzing the newlinepower consumption during the encryption and decryption process in the network and newlinetime taken to
Pagination: 
URI: http://hdl.handle.net/10603/353369
Appears in Departments:School of Computing and Information Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File285.81 kBAdobe PDFView/Open
02_declaration.pdf475.6 kBAdobe PDFView/Open
03_acknoweledgements.pdf303.31 kBAdobe PDFView/Open
04_abstarct.pdf129.42 kBAdobe PDFView/Open
05_table of contents.pdf442.48 kBAdobe PDFView/Open
06_list of tables-figures-abbreviations.pdf381.11 kBAdobe PDFView/Open
07_chapter.1.pdf842.23 kBAdobe PDFView/Open
08_chapter.2.pdf519.7 kBAdobe PDFView/Open
09_chapter.3.pdf1.04 MBAdobe PDFView/Open
10_chapter.4.pdf641.27 kBAdobe PDFView/Open
11_chapter.5.pdf723.25 kBAdobe PDFView/Open
12_chapter.6.pdf757.97 kBAdobe PDFView/Open
13_chapter.7.pdf1.04 MBAdobe PDFView/Open
14_chapter.8.pdf485.46 kBAdobe PDFView/Open
15_references.pdf466.12 kBAdobe PDFView/Open
80_recommendation.pdf1.25 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: