Forestalling tampering of data in wireless sensor network by maintaining integerity using a keyed secure hash function

dc.contributor.guideAntonysamy, Aen_US
dc.coverage.spatialen_US
dc.creator.researcherSebastian Nixon, Jen_US
dc.date.accessioned2014-08-20T14:16:39Z
dc.date.available2014-08-20T14:16:39Z
dc.date.awardeden_US
dc.date.completedDecember 2011en_US
dc.date.issued2014-08-20
dc.date.registereden_US
dc.description.abstractWireless Sensor Networks WSNs are the recent advanced technology of newlinecomputer networks and electronics The WSNs are gaining a lot of popularity these newlinedays due to their applications in a number of areas WSNs provide an easily newlineimplementable and cheaper solution for many real world problems like data gathering newlinesurveillance, monitoring and control etc However they are also used in a number of newlineapplications where security is a prime concern like military operations or other newlinesensitive projects whereby if the network is compromised then the outcomes can be newlinedisastrous While the set of challenges in sensor networks are diverse we focus on newlinesecurity of Wireless Sensor Networks The proposed scheme Forestalling Tampering of Data in Wireless Sensor newlineNetwork by maintaining integrity using a keyed secure hash function addresses newlineconcerns like efficiency and various security parameters like authenticity newlineconfidentiality integrity and requires lesser processing power newline newlineen_US
dc.description.noteen_US
dc.format.accompanyingmaterialDVDen_US
dc.format.dimensionsen_US
dc.format.extentxi, 190p.en_US
dc.identifier.urihttp://hdl.handle.net/10603/23349
dc.languageEnglishen_US
dc.publisher.institutionDepartment of Computer Science and Engg.en_US
dc.publisher.placeTirunelvelien_US
dc.publisher.universityManonmaniam Sundaranar Universityen_US
dc.relation62en_US
dc.rightsuniversityen_US
dc.source.universityUniversityen_US
dc.subject.keywordDataen_US
dc.subject.keywordHash functionen_US
dc.subject.keywordMonitoringen_US
dc.subject.keywordSecurityen_US
dc.subject.keywordWireless sensor networksen_US
dc.titleForestalling tampering of data in wireless sensor network by maintaining integerity using a keyed secure hash functionen_US
dc.title.alternativeen_US
dc.type.degreePh.D.en_US

Files

Original bundle

Now showing 1 - 5 of 12
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
29.3 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_certificates.pdf
Size:
29.98 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_declaration.pdf
Size:
28.38 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_acknowledgement.pdf
Size:
31.01 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_contents.pdf
Size:
39.68 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: