Dr H Shaheen Profile Dr H Shaheen

Secured message exchange in mission critical infrastructure using conditional privacy preserving authentication

  • Authors Details :  
  • Dr. H. Shaheen

779 Views Research reports

Wireless Sensor Networks (WSNs) received enormous attention in recent years due to its phenomenal ability of implementation in various fields. WSNs consist of a large number of small sensor nodes. These nodes are very cheap in terms of cost. In military operations, there is always a threat of being attacked by enemies. So, the use of these cheap sensor nodes will help to reduce the loss. In this project, the security of data transmission in WSNs for military applications is analyzed. It discusses the available scenarios of using sensor nodes in the military uses. The aim is to present a better deployment of sensor nodes for military purposes with the help of cryptographic techniques. This project will try to identify different areas in which we can reduce the damage in case of militant’s attack or enemy’s outbreak using an intelligent deployment of nodes. It is proposed to use the WSNs in battlefield surveillance to closely monitor the critical areas and borders to obtain information about enemy activity in that area. Hence, militant’s will gather information quickly which will result in quick response. Border monitoring is an essential component of military surveillance to prevent enemy’s intrusion. Here the proposed work provides security using several techniques to encrypt and decrypt the data in WSNs. Elliptic Curve cryptography involves Attribute based encryption which is more complicate to hack. As well as skipjack is used to create digital signature to avoid unauthorized users.

Article Subject Details

Article File

Full Text PDF

More Article by Dr H Shaheen

A pervasive multi-distribution perceptron and hidden markov model for context aware systems

Fueled by the recent advancements in pervasive environment, affluent context aware systems is among the rousing in computing today, including embedded environment, different wirele...

An improved scheme for organizing ecommercebased websites using semantic web mining

In the running of the internet world, ecommerce industry has its own benchmark in terms of its rapid growth and has made itself an established sector that is indispensable for ever...

Secured data transmission in vanet using vehicular digital hash gen model

Vehicular adhoc structures (vanets) handle the public key infrastructure (pki) and certificate revocation lists (crls) for their security. in any pki structure, the check of a got ...

Open iot service platform technology with semantic web

This paper centers around how innovations adds to enhancing interoperability between iot gadgets, and making effectively utilization of iot gadgets. the proposed stage innovation g...