Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/406749
Title: Hashed ID Based Security in Wireless Sensor Networks
Researcher: Lakshmanarao, K
Guide(s): Hima Bindu Maringanti
Keywords: Computer Science
Computer Science Cybernetics
Engineering and Technology
University: Maharaja Sriram Chandra Bhanja Deo University
Completed Date: 2020
Abstract: Authentication of sensor nodes, confidentiality of data to be transmitted and no modification of data during its transmission are the important security services of WSNs. In this dissertation, three techniques such as A Sturdy Compression based Cryptography Algorithm using Self-Key(ASCCA), Hashed Identity Based Secure Key and Data Exchange(HISKDE) in WSN and Identity-based pairing free authenticated key and data exchange protocol(IbPaKdE) for wireless sensor networks are proposed. ASCCA compresses input data for the effective utilization of memory space and ensures confidentiality to the compressed data through self-key. Data compression is performed based on SDBED. The lengthy words of input data are replaced with small integers, the subsequent phases convert data into binary and finally compress the input data. Self-Key generation process uses DRDP to share secret key between nodes. Hashed Identity Based Secure Key and Data Exchange (HISKDE) for WSNs using IEEE 802.15.4 Standard is proposed to provide light-weight and secure authentication, data and key management. In HISKDE, each sensor node is assigned with a unique string-identity, the hashed identity is used for the authenticity of a communicating nodes, the generated random prime number act as a key and finally, spiral grid approach is used to obtain secure secret key through the random prime number. Security analysis shows that the HISKDE is lightweight, secure and performs better in terms of authentication, node revocation and capture problems compared to RKP-H. SKC is lightweight, efficient in providing confidentiality to the huge amount of data than PKC approaches and also reduces key maintenance burden. Research proves that the combination of SKC with IBC performs well in providing confidentiality, integrity and authentication to the resource constrained sensor nodes. IbPaKdE incorporates secure key distribution quality from IBC and the feature of high data confidentiality from SKC, performing better compared to HISKDE. newline
Pagination: Initial Page: 16 , All pages:121
URI: http://hdl.handle.net/10603/406749
Appears in Departments:Dept. of Computer Application

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File292.76 kBAdobe PDFView/Open
02_declaration.pdf48.03 kBAdobe PDFView/Open
03_certificate.pdf60.7 kBAdobe PDFView/Open
04_acknowledgement.pdf94.77 kBAdobe PDFView/Open
05_content.pdf370.3 kBAdobe PDFView/Open
06_list of graph and table.pdf197.98 kBAdobe PDFView/Open
07_abstract.pdf320.09 kBAdobe PDFView/Open
08_introduction.pdf1.66 MBAdobe PDFView/Open
09_literature survey.pdf3.23 MBAdobe PDFView/Open
10_ascca.pdf4.67 MBAdobe PDFView/Open
11_hiskde.pdf2.08 MBAdobe PDFView/Open
12_ibpakde.pdf2.45 MBAdobe PDFView/Open
13_conclusion and future scope.pdf535.49 kBAdobe PDFView/Open
14_appendix a.pdf1.02 MBAdobe PDFView/Open
15_appendix b.pdf136.34 kBAdobe PDFView/Open
16_references.pdf1.53 MBAdobe PDFView/Open
80_recommendation.pdf650.66 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: