Study and development of authentication and key management scheme in wireless sensor networks

dc.contributor.guideGoswami, Rajat Subhra and Banerjee, Subhasish
dc.coverage.spatialKey management scheme in wireless sensor networks
dc.creator.researcherChunka, Chukhu
dc.date.accessioned2022-07-19T08:43:19Z
dc.date.available2022-07-19T08:43:19Z
dc.date.awarded2020
dc.date.completed2020
dc.date.registered2016
dc.description.abstractSecurity and Privacy has turned into a challenging issue in public network regarding shared information, authentication, and key management. Thus, to overcome such challenges some cryptographic protocols can be designed which could secure the shared information over the uncertain public network. The unique characteristic of the sensor node is resource constraints, minimal storage capabilities, tiny size, lower battery capacities pose, and many other challenges in the WSN. In this context, broadly investigations on existing remote user authentication and key agreement schemes have done in the WSNs environment. Remote client, sensor node and Gateway Node (and#119866;and#119882;and#119873;) must be authenticated in WSNs for secure communication. User authentication and key agreement are the dominated methods which verify the users and sensor nodes before offering access to any network/internet. The primary objectives of this research are extensive studies of remote user authentication in WSNs using smart card, session key agreement between the entities with the help of trusted third party, dynamic keys management and further, designed some new protocols for overcome the shortcoming of related existing schemes to enhance the security features. Hence, as a first contribution in this research, a new improve and secure biometrics-based user authentication scheme in wireless sensor networks has been proposed using smart card in which attacker not just oppose against attacks like replay attack, Denial of service attack (DoS), masquerade attack, and man-in-the-middle (MITM) attack, but also can maintain the low computational overhead as well. Later, the proposed scheme is compared with other related schemes and found remarkably low computation and less communication overhead too. To prove the authentication among the participants, ProVerif simulation tool is used and to justify security properties, Burrows-Abadi-Needham (BAN) logic has been defined. Consequently, during this research, it has been found that to make a session key more secure.
dc.description.note
dc.format.accompanyingmaterialNone
dc.format.dimensions30cm
dc.format.extentxxi, 176
dc.identifier.urihttp://hdl.handle.net/10603/393165
dc.languageEnglish
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.publisher.placeJote
dc.publisher.universityNational Institute of Technology Arunachal Pradesh
dc.relation117
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordAsymmetric key encryption
dc.subject.keywordComputer Science
dc.subject.keywordEngineering and Technology
dc.subject.keywordWireless sensor network
dc.titleStudy and development of authentication and key management scheme in wireless sensor networks
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 15
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
287.96 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_certificate.pdf
Size:
331.48 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_acknowledgment.pdf
Size:
193.13 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_contents.pdf
Size:
726.96 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_list of figures and tables.pdf
Size:
236.55 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: