Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/1937Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Poornima, A.S. | - |
| dc.contributor.author | Amberker, B.B. | - |
| dc.contributor.author | Raj, H.S.Likith | - |
| dc.contributor.author | Kumar, S.Naveen | - |
| dc.contributor.author | Pradeep, K.N. | - |
| dc.contributor.author | Ravithej, S.V. | - |
| dc.date.accessioned | 2024-12-03T10:32:16Z | - |
| dc.date.available | 2024-12-03T10:32:16Z | - |
| dc.date.issued | 2010 | - |
| dc.identifier.citation | 10.1109/CISIM.2010.5643459 | en_US |
| dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/1937 | - |
| dc.description | NITW | en_US |
| dc.description.abstract | Wireless Sensor Network (WSN) consists of a large number of nodes with limited sensing, computation and communication capabilities. Due to resource constrained sensor nodes, it is important to minimize the amount of data transmission which in turn increases the overall network life time. Use of Mobile Agents for various operations like data collection and software updates in Wireless Sensor Networks is receiving significant attention recently as it increases the lifetime of the network. Security plays a very important role when mobile agents are used for data collection. In this paper we propose and prototype simple authentication schemes based on tree based key management scheme and secret sharing. The proposed schemes identify malicious nodes acting as mobile agents and used to counter the various attacks launched by malicious nodes. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010 | en_US |
| dc.subject | Mobile Data Collector | en_US |
| dc.subject | Authentication | en_US |
| dc.title | Secure Data Collection in Sensor Networks using Tree based Key management Scheme and Secret Sharing | en_US |
| dc.type | Other | en_US |
| Appears in Collections: | Computer Science & Engineering | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Secure_data_collection_in_Sensor_Networks_using_tree_based_key_management_scheme_and_secret_sharing.pdf | 210.37 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.