Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/363622
Title: Design of efficient algorithms for secure group communication in wireless sensor networks
Researcher: H S Annapurna
Guide(s): M Siddappa
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Sri Siddhartha Academy of Higher Education
Completed Date: 2019
Abstract: Security plays a significant role in wireless sensor networks. The communication in the network must be reliable and kept confidential owing to the nature of communication and type of data handled by them. Encryption is one primary method through which we can provide confidentiality for the messages communicated in a network. There may be set of sensor nodes that wish to have such confidential communication. This scenario is referred to as Secure Group Communication (SGC). newline newlineSGC uses a key that is shared between the group members for achieving confidentiality of messages. This key is used for encrypting and decrypting messages communicated among a set of sensor nodes and is known as group key. As the groups are dynamic by nature, it is necessary to update the group key every time there is a variation in group membership. The technique of modifying the group key and sending it to existing nodes of a group securely is referred to as rekeying. Although rekeying becomes simple for join operation because new key can be distributed to current members by means of old key, it becomes difficult for leave operation as it is not possible to use old key for distributing new key. Therefore, as efficient technique is required for rekeying during addition/eviction operation. Hence, key management is an important issue to address in SGC. It is necessary to use a key management approach that provides security to messages with a lesser amount of overhead on sensor nodes.In this thesis, we discuss the issues pertaining to key management and develop schemes for managing the keys used for secure communication in a group. We address the concept of message authentication and provide schemes for authentication of the messages. We also address data aggregation techniques and achieving fault tolerance during aggregation. newline newline newline
Pagination: 15003
URI: http://hdl.handle.net/10603/363622
Appears in Departments:Computer science & Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File27.97 kBAdobe PDFView/Open
02_certificate.pdf8.31 kBAdobe PDFView/Open
03_preliminary pages.pdf116.23 kBAdobe PDFView/Open
04_chapter 1.pdf392.7 kBAdobe PDFView/Open
05_chapter 2.pdf93.89 kBAdobe PDFView/Open
06_chapter 3.pdf14.66 kBAdobe PDFView/Open
07_chapter 4.pdf609.94 kBAdobe PDFView/Open
08_chapter 5.pdf2.19 MBAdobe PDFView/Open
09_chapter 6.pdf692.6 kBAdobe PDFView/Open
10_chapter 7.pdf381.57 kBAdobe PDFView/Open
12_bibiliography.pdf374.21 kBAdobe PDFView/Open
80_recommendation.pdf17.67 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: