Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/257117
Title: Energy efficient data dissemination with effective authentication in wireless sensor networks
Researcher: Santhosh Kumar SVN
Guide(s): Yogesh P
Keywords: Data Dissemination
Engineering and Technology,Computer Science,Computer Science Information Systems
Sensor Networks
Wireless Sensor Networks
University: Anna University
Completed Date: 2018
Abstract: Wireless Sensor Networks (WSNs) is a collection of tiny sensor nodes that have been densely deployed in a geographical area to monitor by measuring various physical parameters pertaining to that area. Data dissemination is a service provided for Wireless Sensor Networks to update the deployed sensor nodes online by using over air programming through radio communication. Since centralized data dissemination approaches suffer from limitations of single point of failure, lack of scalability and they have been replaced by distributed approaches. In distributed data dissemination, the dissemination privileges are delegated by the network owners to the network users to disseminate the data items on their behalf. Most of the existing data dissemination protocols employ gossiping and trickle algorithm to deliver the data items to the sensor nodes. Since gossiping makes the network to transmit same data items by multiple sensor nodes for multiple times to their neighbors until they reach the required nodes which are in need of them. These multiple transmissions result in a problem called Redundant Broadcast Storm Problem (RBSP). RBSP results in too many senders problem and this leads to more consumption of energy in the network. In distributed data dissemination, since there is no centralized control, an attacker or an intruder node can enter the sensing domain to eavesdrop the data and forge them later. The eavesdrop attack results in deletion of important network parameters of the nodes. Later the attack ensures that the nodes are rebooted with malicious code so that major portion of the network is compromised. Moreover, any dissemination protocol which uses trickle algorithm is vulnerable to Denial of Service Attack (DoS) during data dissemination. Due to the nature of distributed environment, it is necessary to provide effective privacy preserving and access control mechanisms. newline
Pagination: xxii, 156p.
URI: http://hdl.handle.net/10603/257117
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File19.81 kBAdobe PDFView/Open
02_certificates.pdf354.37 kBAdobe PDFView/Open
03_abstract.pdf11.52 kBAdobe PDFView/Open
04_acknowledgement.pdf4.69 kBAdobe PDFView/Open
05_table_of_contents.pdf21.74 kBAdobe PDFView/Open
06_list_of_symbols and abbreviations.pdf8.95 kBAdobe PDFView/Open
07_chapter1.pdf79.75 kBAdobe PDFView/Open
08_chapter2.pdf114.6 kBAdobe PDFView/Open
09_chapter3.pdf298.1 kBAdobe PDFView/Open
10_chapter4.pdf189.18 kBAdobe PDFView/Open
11_conclusion.pdf21.27 kBAdobe PDFView/Open
12_references.pdf53.3 kBAdobe PDFView/Open
13_list_of_publications.pdf15.8 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: