Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/258615
Title: | Secure routing in wireless sensor networks with pruning and pattern synthesis process |
Researcher: | Vanitha C N |
Guide(s): | Usha M |
Keywords: | Engineering and Technology,Computer Science,Computer Science Interdisciplinary Applications Pattern Synthesis Process Pruning Routing Secure Routing Wireless Sensor Networks |
University: | Anna University |
Completed Date: | 2018 |
Abstract: | Wireless Sensor Network (WSN) is one of the most promising technologies of this decade. Its design is determined by many factors such as network topology, routing, transmission errors and energy consumption. Consequently designing a WSN application introduces several routing and security challenges. WSN deployment for secure routing is highly demanding due to unpredictable and unfriendly nature of environments. The routing security and network lifetime in WSNs should be enhanced. Subsequently it can be extended by optimizing the routing with a finite number of mobile sensors. The proposed routing algorithms provide a decision and control mechanism at each sensor node during routing rather than the only power newlinemanagement which is used in the literature. In this research, the solutions for wireless sensor network issues such as secure routing, finding shortest paths, liminating route modifiers, crashing critical longest path are taken into consideration. The solutions are presented in the form, namely, Improved ersion of Data Filtration (IVDF), Pruning Route Modifiers (PRM), Pattern Synthesis Process (PSP) and Crashing Critical Path (CCP). The IVDF algorithm is explored to detect and prevent the bogus routing information which is injected to the wireless motes for communication. To establish an effective communication in military as well as civilian applications, an efficient scheme to detect the bogus routing information which depletes the energy of the sensors in en-route nodes is required. In this research, a bandwidth efficient rekeying for filtering injected newlinebogus routing information is proposed. newline newline |
Pagination: | xix, 149p. |
URI: | http://hdl.handle.net/10603/258615 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 97 kB | Adobe PDF | View/Open |
02_certificates.pdf | 219.32 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 98.93 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 93.1 kB | Adobe PDF | View/Open | |
05_table_of_contents.pdf | 194.05 kB | Adobe PDF | View/Open | |
06_list_of_symbols_and_abbreviations.pdf | 99.42 kB | Adobe PDF | View/Open | |
07_chapter1.pdf | 298.92 kB | Adobe PDF | View/Open | |
08_chapter2.pdf | 239.97 kB | Adobe PDF | View/Open | |
09_chapter3.pdf | 437.59 kB | Adobe PDF | View/Open | |
10_chapter4.pdf | 832.93 kB | Adobe PDF | View/Open | |
11_chapter5.pdf | 317.07 kB | Adobe PDF | View/Open | |
12_chapter6.pdf | 674.88 kB | Adobe PDF | View/Open | |
13_conclusion.pdf | 101.09 kB | Adobe PDF | View/Open | |
14_references.pdf | 268.2 kB | Adobe PDF | View/Open | |
15_list_of_publications.pdf | 176.13 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: