Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/253122
Title: | Certain investigations on performance analysis of enhancedenergy efficient routing protocols for wireless sensor networks |
Researcher: | Bharathidasan S |
Guide(s): | Ramamoorthy P |
Keywords: | Engineering and Technology,Engineering,Engineering Electrical and Electronic Enhancedenergy Efficient Routing Protocols Routing Protocols Wireless Sensor Networks |
University: | Anna University |
Completed Date: | 2018 |
Abstract: | This research work proposed the methods for data gathering and also for discovering the suspicious nodes in the network. This thesis newlineillustrates the energy based routing schemes, scheduling based data gathering newlinemethods for energy efficiency, fuzzy logic based energy efficient protocols newlineand its various applications. Wireless Sensor Network (WSN) comprises of a cluster of Sensor Nodes which are functioning in uncontrolled areas and are sorted into newlinea combined network. The key challenge in designing these types of sensor newlinenetworks are the enactment of routing protocols with the plan of bring about newlinethe typical and flexible platforms for diverse applications. These protocols newlinemust be designed with the facility of efficient load balancing, data gathering, newlineand Quality of Service assurance concerning reliability, service differentiation, and timing delivery. The protocol should analyze the suspicious nodes in the network. It should also locate the adjacent nodes that are free from diverse newlineattacks. This is considered as the complicated job to find the nearby nodes newlinethat are trustworthy. The goal of this research is to keep track of sensor node for the period of packet transmission in the existence of attackers. It is desired to newlinedistinguish the network attackers by means of reliable trust model. In order to newlinesecure data, there is necessitating of optimized balance routing to provide the newlineauthentication. In these positions, a conventional scheme of security methods newlineare not be satisfactory and to deal with these issues it is obligatory to make newlineintelligent proposals. This research work makes three main contributions newline newline |
Pagination: | xxi, 176p. |
URI: | http://hdl.handle.net/10603/253122 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 17.42 kB | Adobe PDF | View/Open |
02_certificate.pdf | 11.6 MB | Adobe PDF | View/Open | |
03_abstract.pdf | 108.87 kB | Adobe PDF | View/Open | |
04_acknowledgment.pdf | 80.55 kB | Adobe PDF | View/Open | |
05_contents.pdf | 12.82 MB | Adobe PDF | View/Open | |
06_chapter1.pdf | 250.72 kB | Adobe PDF | View/Open | |
07_chapter2.pdf | 437.3 kB | Adobe PDF | View/Open | |
08_chapter3.pdf | 480.87 kB | Adobe PDF | View/Open | |
09_chapter4.pdf | 299.62 kB | Adobe PDF | View/Open | |
10_chapter5.pdf | 1.1 MB | Adobe PDF | View/Open | |
11_conclusion.pdf | 104.41 kB | Adobe PDF | View/Open | |
12_references.pdf | 174.68 kB | Adobe PDF | View/Open | |
13_publications.pdf | 132.97 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: