Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/206141
Title: | On security and Opportunistic Routing in Wireless Sensor Networks |
Researcher: | Kumar, Nagesh |
Guide(s): | Singh, Yashwant and Singh, Pradeep Kumar |
Keywords: | Energy efficiency Load balancing Opportunistic Routing Trust management Wireless sensor networks |
University: | Jaypee University of Information Technology, Solan |
Completed Date: | 2018 |
Abstract: | The sensor networks are the result of advancements in micro-technologies and are increasing in demand. This is because of the abilities of sensors to operate in unattended and hostile environments. Due to advancements in nanotechnology and micro-system developments, researchers can now develop small sensor nodes which may be deployed to collect field data. Sensor nodes are able to gather data from the area of interest and communicate the same to high processing capacity nodes. Sensor nodes are able to communicate any type of chemical or physical data collected from their surroundings. The data collection and communication is not easy as it will be difficult to reach certain areas of interests like dense forests or deep in the sea or inside the core of the earth. These types of environments may be monitored by using wireless sensor networks, which consists of small-sized sensor nodes with limited resources. In wireless sensor networks (WSN), the data must reach to an infrastructure processing node. The sensor nodes follow a common communication pattern by using routing mechanisms. Routing is the most important phase of network operations because the sensor nodes have limited resources to perform all the network operations. Traditional routing protocols cannot cope up with the failures and malicious activities in unstable application environments. Therefore alternative methods must be designed and researched to achieve performance goals. newlineThe opportunistic routing (OR) in wireless sensor networks (WSN) is gaining popularity due to high throughput, low delays, and good packet delivery ratios. Providing data integrity, availability and reliability with less energy exhaustion are very important in WSN. To achieve all of these properties, the routing protocols must ensure the security of route selection process to avoid the participation of malicious nodes. Also, there is a need for energy conservation while providing security to increase the network lifetime and throughput. |
Pagination: | |
URI: | http://hdl.handle.net/10603/206141 |
Appears in Departments: | Department of Computer Science Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 51.54 kB | Adobe PDF | View/Open |
02_certificate.pdf | 617.41 kB | Adobe PDF | View/Open | |
03_table of contents.pdf | 763.33 kB | Adobe PDF | View/Open | |
04_chapter 1.pdf | 324.26 kB | Adobe PDF | View/Open | |
05_chapter 2.pdf | 749.16 kB | Adobe PDF | View/Open | |
06_chapter 3.pdf | 347.25 kB | Adobe PDF | View/Open | |
07_chapter 4.pdf | 468.34 kB | Adobe PDF | View/Open | |
08_chapter 5.pdf | 317.58 kB | Adobe PDF | View/Open | |
09_chapter 6.pdf | 485.9 kB | Adobe PDF | View/Open | |
10_chapter 7.pdf | 417.26 kB | Adobe PDF | View/Open | |
11_chapter 8.pdf | 206.11 kB | Adobe PDF | View/Open | |
12_references.pdf | 228.08 kB | Adobe PDF | View/Open | |
13_appendix a.pdf | 242.24 kB | Adobe PDF | View/Open | |
14_appendix b.pdf | 5.27 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).