Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/253122
Title: Certain investigations on performance analysis of enhancedenergy efficient routing protocols for wireless sensor networks
Researcher: Bharathidasan S
Guide(s): Ramamoorthy P
Keywords: Engineering and Technology,Engineering,Engineering Electrical and Electronic
Enhancedenergy Efficient Routing Protocols
Routing Protocols
Wireless Sensor Networks
University: Anna University
Completed Date: 2018
Abstract: This research work proposed the methods for data gathering and also for discovering the suspicious nodes in the network. This thesis newlineillustrates the energy based routing schemes, scheduling based data gathering newlinemethods for energy efficiency, fuzzy logic based energy efficient protocols newlineand its various applications. Wireless Sensor Network (WSN) comprises of a cluster of Sensor Nodes which are functioning in uncontrolled areas and are sorted into newlinea combined network. The key challenge in designing these types of sensor newlinenetworks are the enactment of routing protocols with the plan of bring about newlinethe typical and flexible platforms for diverse applications. These protocols newlinemust be designed with the facility of efficient load balancing, data gathering, newlineand Quality of Service assurance concerning reliability, service differentiation, and timing delivery. The protocol should analyze the suspicious nodes in the network. It should also locate the adjacent nodes that are free from diverse newlineattacks. This is considered as the complicated job to find the nearby nodes newlinethat are trustworthy. The goal of this research is to keep track of sensor node for the period of packet transmission in the existence of attackers. It is desired to newlinedistinguish the network attackers by means of reliable trust model. In order to newlinesecure data, there is necessitating of optimized balance routing to provide the newlineauthentication. In these positions, a conventional scheme of security methods newlineare not be satisfactory and to deal with these issues it is obligatory to make newlineintelligent proposals. This research work makes three main contributions newline newline
Pagination: xxi, 176p.
URI: http://hdl.handle.net/10603/253122
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File17.42 kBAdobe PDFView/Open
02_certificate.pdf11.6 MBAdobe PDFView/Open
03_abstract.pdf108.87 kBAdobe PDFView/Open
04_acknowledgment.pdf80.55 kBAdobe PDFView/Open
05_contents.pdf12.82 MBAdobe PDFView/Open
06_chapter1.pdf250.72 kBAdobe PDFView/Open
07_chapter2.pdf437.3 kBAdobe PDFView/Open
08_chapter3.pdf480.87 kBAdobe PDFView/Open
09_chapter4.pdf299.62 kBAdobe PDFView/Open
10_chapter5.pdf1.1 MBAdobe PDFView/Open
11_conclusion.pdf104.41 kBAdobe PDFView/Open
12_references.pdf174.68 kBAdobe PDFView/Open
13_publications.pdf132.97 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: