Energy Efficient Authentication and Authorization for Multinode Cooperative Connectivity and Reliability

Vandana M. Rohokale

Publikation: Ph.d.-afhandling

1456 Downloads (Pure)

Abstract

Wireless communication is a great revolution but it still suffers from limited battery life, broken connections from multi-path fading and insufficient coverage. Simple cooperation can mak a big difference in coverage range, energy and battery life. In CWC, the active nodes may increase their effective QoS via cooperation. The performance of wireless networks is greatly affected by some of the channel parameters such as bandwidth and power scarcity, multi-user interference, non-reliability due to signal fading, vulnerability to the attacks, etc. The cooperative diversity mechanism makes use of the benefits of wireless sensor network scalability in terms of cooperative resource sharing wherein multiple diversity channels are created that results into the higher transmission rates, increased throughput and coverage range, improvement in reliability and end-to-end performance and much more. Cooperative wireless communication (CWC) greatly improves the cross layer optimizations.

The cooperative wireless communication (CWC) concept is more applicable to wireless sensor networks and cognitive ad-hoc networks than that of cellular networks. In CWC, the active nodes may increase their effective QoS via cooperation. Cooperative diversity is a strong technique, which can provide the maximum throughput. Opportunistic Large Array (OLA) is nothing but a cluster of network nodes, which use active scattering mechanism in response to the signal of the source called leader. The intermediate nodes opportunistically relay the messages from the leader to the sink. Cooperative OLA algorithms can improve the reliability as well as the energy efficiency of the communication.

Security of private key cryptosystems depends on the secrecy of the secret key. In case of public key systems, it is infeasible to derive private key from the public key. Breaking of a public key is a complex and timely task. Wireless adhoc network nodes are inherently memory and energy constrained. Today’s commonly utilized algorithms such as RSA, Diffie-Hellman, NTRU and Elliptic Curve Cryptography make use of large numbers for multiplication in their encryption and decryption mechanisms. Due to their huge demand of memory and energy, these cryptographic algorithms can’t be employed to wireless sensor nodes. This research work proposes a novel secure lightweight protocol making use of cryptographic and Information Theoretic Security.
OriginalsprogEngelsk
ISBN'er, trykt978-87-7152-018-7
StatusUdgivet - 2 sep. 2013

Fingeraftryk

Dyk ned i forskningsemnerne om 'Energy Efficient Authentication and Authorization for Multinode Cooperative Connectivity and Reliability'. Sammen danner de et unikt fingeraftryk.

Citationsformater