Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1568
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPoornima, A.S-
dc.contributor.authorAmberker, B.B-
dc.date.accessioned2024-11-20T10:01:14Z-
dc.date.available2024-11-20T10:01:14Z-
dc.date.issued2008-
dc.identifier.citation10.1109/ICYCS.2008.451en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/1568-
dc.descriptionNITWen_US
dc.description.abstractWireless Sensor Networks have a wide spectrum of applications ranging from health care to war fare. Applications like network query, software updates, time synchronization and network management demand for broadcast security. In these applications if same key is used to encrypt every packet that we send, then various attacks can be launched to derive the key. In order to avoid this it is required to encrypt every packet using different key. In this paper we are proposing a method that is based on Shamir's secret sharing scheme, which ensures the freshness of the key. In the proposed method every packet is encrypted using different key and the key used for encryption is derived by the receiver using the additional information sent along with the packet.en_US
dc.language.isoenen_US
dc.publisherProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008en_US
dc.subjectShamir’s secret sharingen_US
dc.subjectBroadcasten_US
dc.subjectSensor nodesen_US
dc.subjectPolynomialen_US
dc.subjectActivating shareen_US
dc.titleA New Approach to Securing Broadcast data in Sensor Networksen_US
dc.typeOtheren_US
Appears in Collections:Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
A_New_Approach_to_Securing_Broadcast_Data_in_Sensor_Networks.pdf242.14 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.