Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/362269
Title: Modeling of Energy Efficient Secure Routing Protocols for Wireless Sensor Networks
Researcher: Singh, Akansha
Guide(s): Awasthi, Amit Kumar
Singh, Karan
Keywords: Cryptology
Mathematics
Physical Sciences
University: Gautam Buddha University
Completed Date: 2018
Abstract: In this thesis, we have analyzed and examined security protocols to ensure secure newlinedata routing for resource constrained Wireless sensor network (WSN). WSN is the newlinecollection of sensor nodes which has the capability to collect data and route data newlineback to the gateway node (GWN). Collected data is transferred in the form of data newlinepackets from one sensor node to other node and finally to GWN. In data routing, newlinethe foremost requirement is that every transferred message should be secured and newlineauthenticated. For that, we used cryptographic techniques to establish a session key newlinebetween two communicating parties for secure communication. Then we analyzed newlineattacking behavior of transmission of worms in WSN. newlineIn the literature review, we studied some cryptographic protocols and epidemic newlinemodels that analyze the effect of worm propagation in WSN against the identified newlineattacks, security and performance requirements. newlineKey management is the basic building block to ensure secure communication newlinebetween sensor node to sensor node, sensor node to GWN and other communicating newlineparties. The key management mechanism includes key generation, key distribution newlineand key maintenance among sensor nodes. Furthermore, we examined recently newlineproposed key management schemes on the basis of security and privacy. We have newlineproposed an elliptic curve digital logarithmic problem (ECDLP) based hybrid key management scheme for clustered system (HHWSN). For large scale sensor network newlinewe have proposed a key agreement scheme with the aid of unmanned ariel newlinevehicle(UAV). newlineAs the technology is getting more and more innovative and advanced, Internet newlineof Things (IoT) is being developed and facilitates a remote user to connect the newlinereliable sensor nodes to collect data. The main objective behind Internet of Things newline(IoT) is that everything is accessible and linked in a network. We crypt analyzed newlineTurkanovic et al. s protocol for user authentication and demonstrated its security newlineflaws. An enhanced scheme is also proposed to remove the flaws of the Turkanovic newlineet al. s protocol.
Pagination: All Pages
URI: http://hdl.handle.net/10603/362269
Appears in Departments:Applied Mathematics

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File32.82 kBAdobe PDFView/Open
02_certificates.pdf19.85 kBAdobe PDFView/Open
03_acknowledgement.pdf20.6 kBAdobe PDFView/Open
04_publications.pdf28.29 kBAdobe PDFView/Open
05_contents.pdf66.52 kBAdobe PDFView/Open
06_abstract.pdf24.12 kBAdobe PDFView/Open
07_chapter_1.pdf148.62 kBAdobe PDFView/Open
08_chapter_2.pdf77.74 kBAdobe PDFView/Open
09_chapter_3.pdf144.97 kBAdobe PDFView/Open
10_chapter_4.pdf98.14 kBAdobe PDFView/Open
11_chapter_5.pdf166.53 kBAdobe PDFView/Open
12_chapter_6.pdf790.81 kBAdobe PDFView/Open
13_conclusion.pdf48.7 kBAdobe PDFView/Open
14_bibliography.pdf80.5 kBAdobe PDFView/Open
80_recommendation.pdf79.86 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: