Secure connectivity model in wireless sensor networks (WSN) using first order Reed-Muller codes
Sarkar, Pinaki, Saha, Amrita and Chowdhury, Morshed U. 2010, Secure connectivity model in wireless sensor networks (WSN) using first order Reed-Muller codes, in IEEE MASS 2010 : Proceedings of the 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, IEEE, Piscataway, N.J., pp. 507-512.
In this paper, we suggest the idea of separately treating the connectivity and communication model of a Wireless Sensor Network (WSN). We then propose a novel connectivity model for a WSN using first order Reed-Muller Codes. While the model has a hierarchical structure, we have shown that it works equally well for a Distributed WSN. Though one can use any communication model, we prefer to use the communication model suggested by Ruj and Roy  for all computations and results in our work. Two suitable secure (symmetric) cryptosystems can then be applied for the two different models, connectivity and communication respectively. By doing so we have shown how resiliency and scalability are appreciably improved as compared to Ruj and Roy .
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Field of Research
080503 Networking and Communications
Socio Economic Objective
890199 Communication Networks and Services not elsewhere classified
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO.
If you believe that your rights have been infringed by this repository, please contact firstname.lastname@example.org.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact email@example.com.