Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/257117
Title: | Energy efficient data dissemination with effective authentication in wireless sensor networks |
Researcher: | Santhosh Kumar SVN |
Guide(s): | Yogesh P |
Keywords: | Data Dissemination Engineering and Technology,Computer Science,Computer Science Information Systems Sensor Networks Wireless Sensor Networks |
University: | Anna University |
Completed Date: | 2018 |
Abstract: | Wireless Sensor Networks (WSNs) is a collection of tiny sensor nodes that have been densely deployed in a geographical area to monitor by measuring various physical parameters pertaining to that area. Data dissemination is a service provided for Wireless Sensor Networks to update the deployed sensor nodes online by using over air programming through radio communication. Since centralized data dissemination approaches suffer from limitations of single point of failure, lack of scalability and they have been replaced by distributed approaches. In distributed data dissemination, the dissemination privileges are delegated by the network owners to the network users to disseminate the data items on their behalf. Most of the existing data dissemination protocols employ gossiping and trickle algorithm to deliver the data items to the sensor nodes. Since gossiping makes the network to transmit same data items by multiple sensor nodes for multiple times to their neighbors until they reach the required nodes which are in need of them. These multiple transmissions result in a problem called Redundant Broadcast Storm Problem (RBSP). RBSP results in too many senders problem and this leads to more consumption of energy in the network. In distributed data dissemination, since there is no centralized control, an attacker or an intruder node can enter the sensing domain to eavesdrop the data and forge them later. The eavesdrop attack results in deletion of important network parameters of the nodes. Later the attack ensures that the nodes are rebooted with malicious code so that major portion of the network is compromised. Moreover, any dissemination protocol which uses trickle algorithm is vulnerable to Denial of Service Attack (DoS) during data dissemination. Due to the nature of distributed environment, it is necessary to provide effective privacy preserving and access control mechanisms. newline |
Pagination: | xxii, 156p. |
URI: | http://hdl.handle.net/10603/257117 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 19.81 kB | Adobe PDF | View/Open |
02_certificates.pdf | 354.37 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 11.52 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 4.69 kB | Adobe PDF | View/Open | |
05_table_of_contents.pdf | 21.74 kB | Adobe PDF | View/Open | |
06_list_of_symbols and abbreviations.pdf | 8.95 kB | Adobe PDF | View/Open | |
07_chapter1.pdf | 79.75 kB | Adobe PDF | View/Open | |
08_chapter2.pdf | 114.6 kB | Adobe PDF | View/Open | |
09_chapter3.pdf | 298.1 kB | Adobe PDF | View/Open | |
10_chapter4.pdf | 189.18 kB | Adobe PDF | View/Open | |
11_conclusion.pdf | 21.27 kB | Adobe PDF | View/Open | |
12_references.pdf | 53.3 kB | Adobe PDF | View/Open | |
13_list_of_publications.pdf | 15.8 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: