Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/362269
Title: | Modeling of Energy Efficient Secure Routing Protocols for Wireless Sensor Networks |
Researcher: | Singh, Akansha |
Guide(s): | Awasthi, Amit Kumar Singh, Karan |
Keywords: | Cryptology Mathematics Physical Sciences |
University: | Gautam Buddha University |
Completed Date: | 2018 |
Abstract: | In this thesis, we have analyzed and examined security protocols to ensure secure newlinedata routing for resource constrained Wireless sensor network (WSN). WSN is the newlinecollection of sensor nodes which has the capability to collect data and route data newlineback to the gateway node (GWN). Collected data is transferred in the form of data newlinepackets from one sensor node to other node and finally to GWN. In data routing, newlinethe foremost requirement is that every transferred message should be secured and newlineauthenticated. For that, we used cryptographic techniques to establish a session key newlinebetween two communicating parties for secure communication. Then we analyzed newlineattacking behavior of transmission of worms in WSN. newlineIn the literature review, we studied some cryptographic protocols and epidemic newlinemodels that analyze the effect of worm propagation in WSN against the identified newlineattacks, security and performance requirements. newlineKey management is the basic building block to ensure secure communication newlinebetween sensor node to sensor node, sensor node to GWN and other communicating newlineparties. The key management mechanism includes key generation, key distribution newlineand key maintenance among sensor nodes. Furthermore, we examined recently newlineproposed key management schemes on the basis of security and privacy. We have newlineproposed an elliptic curve digital logarithmic problem (ECDLP) based hybrid key management scheme for clustered system (HHWSN). For large scale sensor network newlinewe have proposed a key agreement scheme with the aid of unmanned ariel newlinevehicle(UAV). newlineAs the technology is getting more and more innovative and advanced, Internet newlineof Things (IoT) is being developed and facilitates a remote user to connect the newlinereliable sensor nodes to collect data. The main objective behind Internet of Things newline(IoT) is that everything is accessible and linked in a network. We crypt analyzed newlineTurkanovic et al. s protocol for user authentication and demonstrated its security newlineflaws. An enhanced scheme is also proposed to remove the flaws of the Turkanovic newlineet al. s protocol. |
Pagination: | All Pages |
URI: | http://hdl.handle.net/10603/362269 |
Appears in Departments: | Applied Mathematics |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 32.82 kB | Adobe PDF | View/Open |
02_certificates.pdf | 19.85 kB | Adobe PDF | View/Open | |
03_acknowledgement.pdf | 20.6 kB | Adobe PDF | View/Open | |
04_publications.pdf | 28.29 kB | Adobe PDF | View/Open | |
05_contents.pdf | 66.52 kB | Adobe PDF | View/Open | |
06_abstract.pdf | 24.12 kB | Adobe PDF | View/Open | |
07_chapter_1.pdf | 148.62 kB | Adobe PDF | View/Open | |
08_chapter_2.pdf | 77.74 kB | Adobe PDF | View/Open | |
09_chapter_3.pdf | 144.97 kB | Adobe PDF | View/Open | |
10_chapter_4.pdf | 98.14 kB | Adobe PDF | View/Open | |
11_chapter_5.pdf | 166.53 kB | Adobe PDF | View/Open | |
12_chapter_6.pdf | 790.81 kB | Adobe PDF | View/Open | |
13_conclusion.pdf | 48.7 kB | Adobe PDF | View/Open | |
14_bibliography.pdf | 80.5 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 79.86 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: