Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/45892
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | en_US | |
dc.date.accessioned | 2015-08-04T06:06:26Z | - |
dc.date.available | 2015-08-04T06:06:26Z | - |
dc.date.issued | 2015-08-04 | - |
dc.identifier.uri | http://hdl.handle.net/10603/45892 | - |
dc.description.abstract | Wireless network security involves a group of nodes with cryptographic technique to maintain trustworthiness and deliver guaranteed data protection metrics This research work focuses on reducing the contention and congestion and ensures reliable and secure transmission in the network A set of nodes is configured to use explicitly or implicitly optimal routing mechanisms to determine alive nodes in the network It uses a hardware based check bits interleaved and each packet is transmitted through hardware to provide consistent and protected node security The primary issues considered in this work are the security of nodes traffic reduction non blocking communication and error detection Each node is intrinsically assigned a fixed cycle code pattern which should match with database entry for node authentication The research work involves use of reconfigurable hardware modules that use check bits send data packets to another node and perform node authentication in the network Basically the aim of the research is to sustain this data protection and enhance the node network connectivity to provide reliable QoS and extend the network lifetime or longevity An important and basic requirement of a network that it must check for the link state is also done in this work Route detection is a necessary operation with many applications in wireless networks A source node broadcasts a message to all linked nodes with packets encrypted The existing network can recognize the trusted nodes and continue with the normal transmission without a tradeoff with the functional exposure of the network In this research a novel CSCU hardware algorithm is implemented and tested such that the non performing node itself opts out from the network thereby avoiding the need for an extra logical or physical layer module to perform the detection Also a novel encryption scheme namely polarization encryption EP coexists without a third party vendor as it does not require any additional firewall security architecture The geometrical phase encryption scheme has the advantage of digital watermarking to coexist Thus a data filter which is required in conventional encryption techniques is eliminated in this research The polarization encryption technique is implemented in Linux kernel FL Two thousand four hundred and forty based hardware with the code written in python uses open source tools The studied metrics include but not limited to latency throughput shortest path eliminate the contention and congestion problems ambiguity between nodes packets among the broadcasting nodes error reduction queuing model study multicasting of packets newline | en_US |
dc.format.extent | en_US | |
dc.language | English | en_US |
dc.relation | en_US | |
dc.rights | university | en_US |
dc.title | Wireless node network security using Cycle state capture and polarization encryption with hardware implementation | en_US |
dc.title.alternative | en_US | |
dc.creator.researcher | Kuldeep Chouhan | en_US |
dc.subject.keyword | Network Security Cycle State Capture Unit FL Two thousand four hundred and forty Hardware Polarization Encryption scheme Link state algorithm Queue model Multicasting | en_US |
dc.description.note | en_US | |
dc.contributor.guide | Dr.S.Ravi | en_US |
dc.publisher.place | Chennai | en_US |
dc.publisher.university | Dr. M.G.R. Educational and Research Institute | en_US |
dc.publisher.institution | Department of Electronics and Communication Engineering | en_US |
dc.date.registered | 15/02/2011 | en_US |
dc.date.completed | 17/04/2014 | en_US |
dc.date.awarded | - | en_US |
dc.format.dimensions | en_US | |
dc.format.accompanyingmaterial | None | en_US |
dc.source.university | University | en_US |
dc.type.degree | Ph.D. | en_US |
Appears in Departments: | Department of Electronics and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 148.34 kB | Adobe PDF | View/Open |
02_certificate.pdf | 282.5 kB | Adobe PDF | View/Open | |
03_toc,lot,lof&loa.pdf | 213.89 kB | Adobe PDF | View/Open | |
04_chapter1.pdf | 180.78 kB | Adobe PDF | View/Open | |
05_chapter2.pdf | 219.66 kB | Adobe PDF | View/Open | |
06_chapter3.pdf | 478.18 kB | Adobe PDF | View/Open | |
07_chapter4.pdf | 630.31 kB | Adobe PDF | View/Open | |
08_chapter5.pdf | 586.77 kB | Adobe PDF | View/Open | |
09_chapter6.pdf | 959.89 kB | Adobe PDF | View/Open | |
10_chapter7.pdf | 102.47 kB | Adobe PDF | View/Open | |
11_references.pdf | 262.87 kB | Adobe PDF | View/Open | |
12_list of publications.pdf | 207.35 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: