Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/296560
Title: | Secured energy efficient routing techniques for wireless sensor networks |
Researcher: | Asha A |
Guide(s): | Arun C |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems Wireless Sensor Networks Internet of Things |
University: | Anna University |
Completed Date: | 2019 |
Abstract: | Wireless Sensor Networks WSNs are highly distributed networks newlineof tiny lightweight sensor nodes deployed randomly and never require any newlinehuman intervention Rapid technology improvement in Internet of Things newlineIoT adds more challenges to Wireless Sensor Networks Security is an newlineimportant task in Wireless Sensor Networks for the network lifetime and newlineefficient communication Moreover the energy of nodes plays a significant newlinerole in wireless sensor networks for improving network lifetime In WSN newlineenergy efficient and trusted data communication processes is a challenging newlinetask Recently the security mechanisms have been developed by using newlineeffective key management trust management access control and intrusion newlinedetection systems Hence for providing secure communication in WSNs this newlineresearch work proposes new secure routing algorithms such as iTrust and newlineFuzzy Cluster based Energy Efficient Routing Algorithm TFCEERA ii newlineFuzzy based Distributed Self organized Secured G Cast Routing Protocol SGCRP newlineand iii Cluster-Based Secured Geographic Routing using Master newlineSlave Approach CGRA MSA Firstly a new active trust modeling approach called Trust and Fuzzy Cluster based Energy Efficient Routing Algorithm TFCEERA is newlineproposed in this thesis for enhancing the security of communication In this newlinemethod active trust values based on Gaussian Membership function are used newlineto categorize nodes and nodes with high trust values are eligible to become newlinecluster heads and they are allowed to participate in the routing process newlineMoreover the energy consumption and the residual energy are also newlineconsidered in the selection of the cluster heads The basic routing protocol newlinenamely LEACH is modified to examine the trust level in the selection of newlinecluster heads The clusters have an unequal number of node newline |
Pagination: | xvii , 128p. |
URI: | http://hdl.handle.net/10603/296560 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.98 kB | Adobe PDF | View/Open |
02_cerrtificates.pdf | 378.19 kB | Adobe PDF | View/Open | |
03_abstracts.pdf | 12.54 kB | Adobe PDF | View/Open | |
04_acknowledgements.pdf | 220.86 kB | Adobe PDF | View/Open | |
05_contents.pdf | 12.63 kB | Adobe PDF | View/Open | |
06_listoftables.pdf | 8.01 kB | Adobe PDF | View/Open | |
07_listoffigures.pdf | 10.08 kB | Adobe PDF | View/Open | |
08_listofabbreviations.pdf | 22.92 kB | Adobe PDF | View/Open | |
09_chapter1.pdf | 49.09 kB | Adobe PDF | View/Open | |
10_chapter2.pdf | 81.05 kB | Adobe PDF | View/Open | |
11_chapter3.pdf | 248.73 kB | Adobe PDF | View/Open | |
12_chapter4.pdf | 420.19 kB | Adobe PDF | View/Open | |
13_chapter5.pdf | 255.41 kB | Adobe PDF | View/Open | |
14_conclusion.pdf | 30.47 kB | Adobe PDF | View/Open | |
15_references.pdf | 33.71 kB | Adobe PDF | View/Open | |
16_listofpublications.pdf | 18.87 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 67.68 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: