Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6278
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSaini, Shantanu-
dc.contributor.authorVasudeva, Amol [Guided by]-
dc.date.accessioned2022-09-22T06:28:39Z-
dc.date.available2022-09-22T06:28:39Z-
dc.date.issued2017-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6278-
dc.description.abstractIn this project, cryptography is implemented using pairwise key generation technique. When a node wants to communicate with some other node in the network without sharing the information with any other node in the network, it will first check whether the node is in its range or not . If they are not in range, they can communicate implicitly i.e. via a node in between them. They both will then find a private key between them. Using this key, they will be able to share the personal information or data. After receiving the message, the key will be destroyed. In cased of a sybill attack a malicious node attack the whole wireless sensor network and Blom’s Scheme will help up to detect and destroy any malicious node in the network . In this project, we can take the number of nodes as per our choiceen_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectSybil attacken_US
dc.subjectCryptographyen_US
dc.subjectBlom’s schemeen_US
dc.titleBlom’s Scheme of Pairwise key Distribution Technique to prevent the Sybil Attack in Wireless Sensor Networken_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.