SRJIS/BIMONTHLY / DR. J. THIRUMARANA & S. RAJA (2754 - 2759) J AN - FEBRUARY, 2015 , VOL - III/XVI www.srjis.com Page 2754 SECURE PACKETS IN WIRELESS SENSOR NETWORKS BASED ON FREQUENCY - SELECTIVE CHANNELS
Journal: SCHOLARLY RESEARCH JOURNAL FOR INTERDISCIPLINARY STUDIES (Vol.3, No. 16)Publication Date: 2015-02-01
Authors : J.THIRUMARAN; S. RAJA;
Page : 01-06
Keywords : secured packet; wireless sensor network; key generation protocol;
- SRJIS/BIMONTHLY / DR. J. THIRUMARANA & S. RAJA (2754 - 2759) J AN - FEBRUARY, 2015 , VOL - III/XVI www.srjis.com Page 2754 SECURE PACKETS IN WIRELESS SENSOR NETWORKS BASED ON FREQUENCY - SELECTIVE CHANNELS
- SRJIS/BIMO NTHLY/ SUMANA MUKERJEE . (27 6 0 - 27 7 9) AUG - SEPT, 2015, VOL. 2/11 www.srjis.com Page 2760 INCLUSIVE EDUCATION AND ROLE OF MANUALS: FR ENCH TEACHING IN INDIAN SCHOOLS
- DEC - JAN - 201 5 , VOL - I I , ISSUE - V II www.srjis.com Page 10 50 A STUDY ON SOCIAL INTE LLIGENCE AMONG ARTS AND SCIENCE COLLEGE STUDENTS
- DEC - JAN - 201 5 , VOL - I I , ISSUE - V II www.srjis.com Page 10 5 7 INFLUENCE OF COGNITIVE STYLE, ACHIEVEMENT IN SCIENCE AND GENDER ON SCIENTIFIC CREATIVITY OF SECONDARY SCHOOL STUDENTS Teena Dhir
- Trust Based Approaches to Counter Selective Attacks on Wireless Sensor Networks
Abstract
W ireless sensor network faces several unique challenges. The scale, resource limitations, and new threats such as node capture suggest the use of in - network key generation. The wireless channel itself can be used t o generate information theoretic secure keys. By exchanging sampling messages during device movement, a bit string is derived known only to the two involved entities. Yet, movement is not the only option to generate randomness: the channel response strongly depends on the signal frequency as well. In this work, we introduce a key generation protocol based on the frequency - selectivity of multipath fading channels. We discuss in this paper how to secure packets in wireless networks.
Other Latest Articles
- A Clustering Algorithm in Two-Phase Commit Protocol for Optimizing Distributed Transaction Failure?
- ADAPTATION AS INTERSEMIOTIC TRANSLATION: A STUDY FOCUSSING ON THE VISUAL TEXT KALIYATTOM, AN ADAPTATION OF OTHELLO
- AN ESTIMATION TO SPEAKING FREQUENCY IN VIDEO STREAMING
- EFFECT OF COCONUT SHELL POWDER ON THE STRENGTH OF SOIL
- TO DETECT AND ISOLATE SELECTIVE PACKET DROP ATTACK IN OPPORTUNISTIC TYPES OF NETWORK?
Last modified: 2015-03-18 15:13:38