Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6278
Title: Blom’s Scheme of Pairwise key Distribution Technique to prevent the Sybil Attack in Wireless Sensor Network
Authors: Saini, Shantanu
Vasudeva, Amol [Guided by]
Keywords: Sybil attack
Cryptography
Blom’s scheme
Issue Date: 2017
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: In this project, cryptography is implemented using pairwise key generation technique. When a node wants to communicate with some other node in the network without sharing the information with any other node in the network, it will first check whether the node is in its range or not . If they are not in range, they can communicate implicitly i.e. via a node in between them. They both will then find a private key between them. Using this key, they will be able to share the personal information or data. After receiving the message, the key will be destroyed. In cased of a sybill attack a malicious node attack the whole wireless sensor network and Blom’s Scheme will help up to detect and destroy any malicious node in the network . In this project, we can take the number of nodes as per our choice
URI: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6278
Appears in Collections:B.Tech. Project Reports



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.