Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/406749
Title: | Hashed ID Based Security in Wireless Sensor Networks |
Researcher: | Lakshmanarao, K |
Guide(s): | Hima Bindu Maringanti |
Keywords: | Computer Science Computer Science Cybernetics Engineering and Technology |
University: | Maharaja Sriram Chandra Bhanja Deo University |
Completed Date: | 2020 |
Abstract: | Authentication of sensor nodes, confidentiality of data to be transmitted and no modification of data during its transmission are the important security services of WSNs. In this dissertation, three techniques such as A Sturdy Compression based Cryptography Algorithm using Self-Key(ASCCA), Hashed Identity Based Secure Key and Data Exchange(HISKDE) in WSN and Identity-based pairing free authenticated key and data exchange protocol(IbPaKdE) for wireless sensor networks are proposed. ASCCA compresses input data for the effective utilization of memory space and ensures confidentiality to the compressed data through self-key. Data compression is performed based on SDBED. The lengthy words of input data are replaced with small integers, the subsequent phases convert data into binary and finally compress the input data. Self-Key generation process uses DRDP to share secret key between nodes. Hashed Identity Based Secure Key and Data Exchange (HISKDE) for WSNs using IEEE 802.15.4 Standard is proposed to provide light-weight and secure authentication, data and key management. In HISKDE, each sensor node is assigned with a unique string-identity, the hashed identity is used for the authenticity of a communicating nodes, the generated random prime number act as a key and finally, spiral grid approach is used to obtain secure secret key through the random prime number. Security analysis shows that the HISKDE is lightweight, secure and performs better in terms of authentication, node revocation and capture problems compared to RKP-H. SKC is lightweight, efficient in providing confidentiality to the huge amount of data than PKC approaches and also reduces key maintenance burden. Research proves that the combination of SKC with IBC performs well in providing confidentiality, integrity and authentication to the resource constrained sensor nodes. IbPaKdE incorporates secure key distribution quality from IBC and the feature of high data confidentiality from SKC, performing better compared to HISKDE. newline |
Pagination: | Initial Page: 16 , All pages:121 |
URI: | http://hdl.handle.net/10603/406749 |
Appears in Departments: | Dept. of Computer Application |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 292.76 kB | Adobe PDF | View/Open |
02_declaration.pdf | 48.03 kB | Adobe PDF | View/Open | |
03_certificate.pdf | 60.7 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 94.77 kB | Adobe PDF | View/Open | |
05_content.pdf | 370.3 kB | Adobe PDF | View/Open | |
06_list of graph and table.pdf | 197.98 kB | Adobe PDF | View/Open | |
07_abstract.pdf | 320.09 kB | Adobe PDF | View/Open | |
08_introduction.pdf | 1.66 MB | Adobe PDF | View/Open | |
09_literature survey.pdf | 3.23 MB | Adobe PDF | View/Open | |
10_ascca.pdf | 4.67 MB | Adobe PDF | View/Open | |
11_hiskde.pdf | 2.08 MB | Adobe PDF | View/Open | |
12_ibpakde.pdf | 2.45 MB | Adobe PDF | View/Open | |
13_conclusion and future scope.pdf | 535.49 kB | Adobe PDF | View/Open | |
14_appendix a.pdf | 1.02 MB | Adobe PDF | View/Open | |
15_appendix b.pdf | 136.34 kB | Adobe PDF | View/Open | |
16_references.pdf | 1.53 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 650.66 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: