RPSE - reenactment of data using polynomial-variant cryptographic scheme in sensor environment
by N. Ambika
International Journal of High Performance Computing and Networking (IJHPCN), Vol. 11, No. 2, 2018

Abstract: Sensor environment relieves the hassle by monitoring the environment under study and providing results to the investigator in time. The users have to only endeavour about the whereabouts of the installations of these tiny elements in the environment under study. Such networks without any management and control can be intruded by the adversary. As a precautionary measure, encryption can be adopted. These encrypted messages are self-insured from being exposed unless the intruders have acquired the decryption keys. In this study, polynomial-variant is generated and used to encrypt the transmitted data. The variant is calculated using various properties of the nodes deployed. Adopting this protocol helps the base station to originate the manipulated data. The study preserves backward and forward secrecy. The work minimises wormhole attack and sinkhole attack in the network.

Online publication date: Fri, 16-Feb-2018

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of High Performance Computing and Networking (IJHPCN):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com