Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/257117
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialEnergy Efficient Data Dissemination With Effective Authentication In Wireless Sensor Networks
dc.date.accessioned2019-09-11T06:11:53Z-
dc.date.available2019-09-11T06:11:53Z-
dc.identifier.urihttp://hdl.handle.net/10603/257117-
dc.description.abstractWireless Sensor Networks (WSNs) is a collection of tiny sensor nodes that have been densely deployed in a geographical area to monitor by measuring various physical parameters pertaining to that area. Data dissemination is a service provided for Wireless Sensor Networks to update the deployed sensor nodes online by using over air programming through radio communication. Since centralized data dissemination approaches suffer from limitations of single point of failure, lack of scalability and they have been replaced by distributed approaches. In distributed data dissemination, the dissemination privileges are delegated by the network owners to the network users to disseminate the data items on their behalf. Most of the existing data dissemination protocols employ gossiping and trickle algorithm to deliver the data items to the sensor nodes. Since gossiping makes the network to transmit same data items by multiple sensor nodes for multiple times to their neighbors until they reach the required nodes which are in need of them. These multiple transmissions result in a problem called Redundant Broadcast Storm Problem (RBSP). RBSP results in too many senders problem and this leads to more consumption of energy in the network. In distributed data dissemination, since there is no centralized control, an attacker or an intruder node can enter the sensing domain to eavesdrop the data and forge them later. The eavesdrop attack results in deletion of important network parameters of the nodes. Later the attack ensures that the nodes are rebooted with malicious code so that major portion of the network is compromised. Moreover, any dissemination protocol which uses trickle algorithm is vulnerable to Denial of Service Attack (DoS) during data dissemination. Due to the nature of distributed environment, it is necessary to provide effective privacy preserving and access control mechanisms. newline
dc.format.extentxxii, 156p.
dc.languageEnglish
dc.relationp.145-155
dc.rightsuniversity
dc.titleEnergy efficient data dissemination with effective authentication in wireless sensor networks
dc.title.alternative
dc.creator.researcherSanthosh Kumar SVN
dc.subject.keywordData Dissemination
dc.subject.keywordEngineering and Technology,Computer Science,Computer Science Information Systems
dc.subject.keywordSensor Networks
dc.subject.keywordWireless Sensor Networks
dc.description.note
dc.contributor.guideYogesh P
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registeredn.d.
dc.date.completed2018
dc.date.awarded31/07/2018
dc.format.dimensions21 cm
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File19.81 kBAdobe PDFView/Open
02_certificates.pdf354.37 kBAdobe PDFView/Open
03_abstract.pdf11.52 kBAdobe PDFView/Open
04_acknowledgement.pdf4.69 kBAdobe PDFView/Open
05_table_of_contents.pdf21.74 kBAdobe PDFView/Open
06_list_of_symbols and abbreviations.pdf8.95 kBAdobe PDFView/Open
07_chapter1.pdf79.75 kBAdobe PDFView/Open
08_chapter2.pdf114.6 kBAdobe PDFView/Open
09_chapter3.pdf298.1 kBAdobe PDFView/Open
10_chapter4.pdf189.18 kBAdobe PDFView/Open
11_conclusion.pdf21.27 kBAdobe PDFView/Open
12_references.pdf53.3 kBAdobe PDFView/Open
13_list_of_publications.pdf15.8 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: