Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/257661
Title: Investigations on secure data aggregation algorithm in wireless sensor networks
Researcher: Lathamanju R
Guide(s): Senthil Kumar P
Keywords: Aggregation Algorithm
Engineering and Technology,Computer Science,Computer Science Interdisciplinary Applications
Secure Data
Wireless Sensor Networks
University: Anna University
Completed Date: 2018
Abstract: These days lot of technological developments in wireless sensor networks both in hardware and software point of view will lead to its usage in almost all types of applications military, surveillance, environmental monitoring etc. Sensors are limited in battery, memory and processing ability, small in size and low-cost devices preferred to use in a remote area and accessed through an unreliable wireless environment. Hence it is necessary to provide secure communication with accuracy for sensor networks. Usually, sensors are placed in a group to measure the data from its surrounding environment. So almost all the sensors will measure more or less same data. If we transmit all the same data from all the sensors, it leads to wastage of newlinepower and energy and also the sensors are limited in the battery, placed in a remote area it is very important to reduce the consumption of energy as much as possible. At this moment we need to save the energy of sensors to prolong the lifetime and also to provide security over the network. There have been many research work is proposed to handle this problem. However, all the requirements of security are not discussed in the existing same secure data aggregation algorithm. In this research, a reputation based algorithm is proposed to achieve all the requirements of security with reduced newlinecommunication overhead. The main objective of the thesis is to design a secure data newlineaggregation algorithm to meet all the requirements of security with less communication overhead. In the first study, an ECC and pattern based end-toend newlinesecure data aggregation are proposed. In this algorithm, clustering is formed by a LEACH_KED algorithm and data aggregation is done by pattern-based data aggregation algorithm. newline newline
Pagination: xvi, 126p.
URI: http://hdl.handle.net/10603/257661
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File22.93 kBAdobe PDFView/Open
02_certificates.pdf523.82 kBAdobe PDFView/Open
03_abstract.pdf6.69 kBAdobe PDFView/Open
04_acknowledgement.pdf10.08 kBAdobe PDFView/Open
05_table_of_contents.pdf12.81 kBAdobe PDFView/Open
06_list_of_symbols_and_abbreviations.pdf3.97 kBAdobe PDFView/Open
07_chapter1.pdf229.75 kBAdobe PDFView/Open
08_chapter2.pdf85.21 kBAdobe PDFView/Open
09_chapter3.pdf363.91 kBAdobe PDFView/Open
10_chapter4.pdf193.38 kBAdobe PDFView/Open
11_conclusion.pdf22.42 kBAdobe PDFView/Open
12_references.pdf42.2 kBAdobe PDFView/Open
13_list_of_publications.pdf15.57 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: