Secure Clustering in DSN with Key Predistribution and WCDS
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar topics
Active In SP
**

Posts: 559
Joined: Mar 2010
#1
31-03-2010, 12:31 PM


Abstract

This paper proposes an efficient approach of secure clustering in distributed sensor networks. The clusters or groups in the network are formed based on offline rank assignment and predistribution of secret keys. Our approach uses the concept of weakly connected dominating set (WCDS) to reduce the number of cluster-heads in the network. The formation of clusters in the network is secured as the secret keys are distributed and used in an efficient way to resist the inclusion of any hostile entity in the clusters. Along with the description of our approach, we present an analysis and comparison of our approach with other schemes. We also mention the limitations of our approach considering the practical implementation of the sensor networks.

Presented By:
Al-Sakib Khan Pathan and Choong Seon Hong

read full report
ieeexplore.ieeesearch/freesrchabstract.jsp?tp=&arnumber=4086809&queryText%3DSecure+Clustering+in+DSN+with+Key+Predistribution+and+WCDS%26openedRefinements%3D*%26searchField%3DSearch+All
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  secure atm by image processing pdf jaseelati 0 324 15-01-2015, 03:17 PM
Last Post: jaseelati
  secure atm by image processing jaseelati 0 397 01-01-2015, 04:15 PM
Last Post: jaseelati
  SILC(Secure Internet Live conferencing) Computer Science Clay 14 6,462 08-03-2014, 12:34 PM
Last Post: seminar project topic
  Virtual Shuffling Keypad for secure ATMs project uploader 4 1,471 16-03-2013, 09:30 AM
Last Post: study tips
  How to Break into Wi-Fi Security Key (WAP/WEP) Report study tips 0 356 22-02-2013, 11:24 AM
Last Post: study tips
  SECRET KEY GENERATION EXPLOITING CHANNEL CHARACTERISTICS IN WIRELESS COMMUNICATIONS project girl 0 413 04-02-2013, 10:17 AM
Last Post: project girl
  Smart Cards: Technology for Secure Management of Information ppt project girl 0 430 19-01-2013, 03:42 PM
Last Post: project girl
  AN IMPROVED AUTHENTICATION AND KEY AGREEMENT PROTOCOL OF 3G report project girl 0 423 18-12-2012, 03:24 PM
Last Post: project girl
  Key Ingredients for Successful Remote Infrastructure Outsourcing: A Case Study project girl 0 351 08-11-2012, 12:18 PM
Last Post: project girl
  A Secure Fingerprint Matching Technique seminar flower 0 366 02-10-2012, 04:35 PM
Last Post: seminar flower