Openly accessible

Secure connectivity model in wireless sensor networks (WSN) using first order Reed-Muller codes

Sarkar, Pinaki, Saha, Amrita and Chowdhury, Morshed U. 2010, Secure connectivity model in wireless sensor networks (WSN) using first order Reed-Muller codes, in IEEE MASS 2010 : Proceedings of the 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, IEEE, Piscataway, N.J., pp. 507-512.

Attached Files
Name Description MIMEType Size Downloads
chowdhury-secureconnectivity-2010.pdf Published version application/pdf 290.45KB 4

Title Secure connectivity model in wireless sensor networks (WSN) using first order Reed-Muller codes
Author(s) Sarkar, Pinaki
Saha, Amrita
Chowdhury, Morshed U.
Conference name IEEE International Conference on Mobile Ad-hoc and Sensor Systems (7th : 2010 : San Francisco, California)
Conference location San Francisco, Calif.
Conference dates 8-12 Nov. 2010
Title of proceedings IEEE MASS 2010 : Proceedings of the 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems
Editor(s) [Unknown]
Publication date 2010
Conference series International Conference on Mobile Ad Hoc and Sensor Systems
Start page 507
End page 512
Total pages 6
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) security
connectivity
Reed-Muller codes
communication
Reed-Solomon codes
Summary In this paper, we suggest the idea of separately treating the connectivity and communication model of a Wireless Sensor Network (WSN). We then propose a novel connectivity model for a WSN using first order Reed-Muller Codes. While the model has a hierarchical structure, we have shown that it works equally well for a Distributed WSN. Though one can use any communication model, we prefer to use the communication model suggested by Ruj and Roy [1] for all computations and results in our work. Two suitable secure (symmetric) cryptosystems can then be applied for the two different models, connectivity and communication respectively. By doing so we have shown how resiliency and scalability are appreciably improved as compared to Ruj and Roy [1].
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 1424474892
9781424474899
ISSN 2155-6806
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890199 Communication Networks and Services not elsewhere classified
HERDC Research category E1 Full written paper - refereed
HERDC collection year 2010
Copyright notice ©2010, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30034573

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 150 Abstract Views, 12 File Downloads  -  Detailed Statistics
Created: Fri, 13 May 2011, 11:43:42 EST by Sandra Dunoon

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.