Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1937
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPoornima, A.S.-
dc.contributor.authorAmberker, B.B.-
dc.contributor.authorRaj, H.S.Likith-
dc.contributor.authorKumar, S.Naveen-
dc.contributor.authorPradeep, K.N.-
dc.contributor.authorRavithej, S.V.-
dc.date.accessioned2024-12-03T10:32:16Z-
dc.date.available2024-12-03T10:32:16Z-
dc.date.issued2010-
dc.identifier.citation10.1109/CISIM.2010.5643459en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/1937-
dc.descriptionNITWen_US
dc.description.abstractWireless Sensor Network (WSN) consists of a large number of nodes with limited sensing, computation and communication capabilities. Due to resource constrained sensor nodes, it is important to minimize the amount of data transmission which in turn increases the overall network life time. Use of Mobile Agents for various operations like data collection and software updates in Wireless Sensor Networks is receiving significant attention recently as it increases the lifetime of the network. Security plays a very important role when mobile agents are used for data collection. In this paper we propose and prototype simple authentication schemes based on tree based key management scheme and secret sharing. The proposed schemes identify malicious nodes acting as mobile agents and used to counter the various attacks launched by malicious nodes.en_US
dc.language.isoenen_US
dc.publisher2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010en_US
dc.subjectMobile Data Collectoren_US
dc.subjectAuthenticationen_US
dc.titleSecure Data Collection in Sensor Networks using Tree based Key management Scheme and Secret Sharingen_US
dc.typeOtheren_US
Appears in Collections:Computer Science & Engineering



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.