Threshold Cryptography Based Light Weight Key Management Technique for Hierarchical WSNs

Author(s):  
K. Hamsha ◽  
G. S. Nagaraja
2018 ◽  
pp. 107-112
Author(s):  
Lydia M Cranston ◽  
Peter D Kemp ◽  
Steve T Morris ◽  
Brennon A Wood

An on-farm study investigated the herbage quality and sward characteristics of plantain-clover mixes and resulting lamb growth rates during late summer and autumn. Three farms were chosen, each with a minimum of 10 ha of plantain-clover mix (Plantago lanceolata ‘Ceres Tonic’, Trifolium pratense, Trifolium repens) used for lamb finishing. Each farm managed the plantain-clover mix area using their routine management without advice or comment from research staff. Throughout autumn, at approximately monthly intervals on the three farms, the pre- and post-grazing herbage masses, botanical composition, herbage quality, plantain dry matter content, secondary chemical composition and lamb growth rates were monitored. A low percentage of clover in the sward, a high percentage of dead stem material and a low crude protein concentration in plantain during dry periods, were identified as the most likely causes of low lamb liveweight gains during autumn. Grazing management during spring that maintains control of plantain stems and encourages the presence of clover, appears to be a key management technique for ensuring high lamb liveweight gains on plantain-clover mixes in late summer and autumn.


2004 ◽  
Author(s):  
Scott D. Dexter ◽  
Roman Belostotskiy ◽  
Ahmet M. Eskicioglu

Author(s):  
Tamizhselvan C. ◽  
V. Vijayalakshmi

Abstract:: Internet of Things (IoT) faces a variety of challenges and issues in administering security due to its heterogeneous nature and open communication medium. The fundamental security requirement of authentication is expected to secure the communication between the devices from anonymous access. In this article, we present a distributed time-dependent key management (DTKM) technique for securing the communication sessions of the IoT devices. This key management technique considers the communication time and interval of the devices independently to generate session keys for authentication. Key management is preceded by the consideration of request authentication and resource utilization. Based on the communication time session, the validity of the keys is determined and is updated with the current random number consideration for authentication. This helps to prevent unnecessary exploitation of storage and also reduces computation time.


Author(s):  
Md. Habibur Rahman ◽  
Md. Ibrahim Abdullah

The nodes within a cluster of Wireless Sensor Network deployed in adverse areas face the security threats of eavesdropping and capturing. The fundamental issue in wireless sensor network security is to initialize secure communication between sensor nodes by setting up secret keys between communicating nodes. Because of limited hardware capacity, conventional network cryptography is infeasible for sensor network. In this paper a key management technique is proposed for clustered sensor network that uses some cryptographic operation to generate secret keys. This key is updated in response to the message of cluster head or base station. The key update instructions are stored in each sensor nodes before deployed in sensor field. The updated secret key is used to communicate between nodes and cluster head.


Author(s):  
Punithavathi P ◽  
Geetha Subbiah

Images are becoming an inevitable part of knowledge in the modern day society. As data is growing at a rapid rate, costs involved in storing and maintaining data is also raising rapidly. The best alternate solution to reduce the storage cost is outsourcing all the data to the cloud. To ensure confidentiality and integrity of the data, a security technique has to be provided to the data even before it is stored on the cloud using cryptography. An attempt is made to explore the possibility of usage of visual cryptography for providing robust security to the secret image. Visual cryptography proves to be more efficient than other cryptography techniques because it is simple and does not require any key management technique.


2018 ◽  
pp. 360-380
Author(s):  
Punithavathi P. ◽  
Geetha Subbiah

Images are becoming an inevitable part of knowledge in the modern day society. As data is growing at a rapid rate, costs involved in storing and maintaining data is also raising rapidly. The best alternate solution to reduce the storage cost is outsourcing all the data to the cloud. To ensure confidentiality and integrity of the data, a security technique has to be provided to the data even before it is stored on the cloud using cryptography. An attempt is made to explore the possibility of usage of visual cryptography for providing robust security to the secret image. Visual cryptography proves to be more efficient than other cryptography techniques because it is simple and does not require any key management technique.


Sign in / Sign up

Export Citation Format

Share Document