Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/333489
Title: | A secured energy efficient framework for cloud based wireless sensor networks |
Researcher: | Subashini, S |
Guide(s): | Mathiyalagan, P |
Keywords: | Wireless Sensor Network Cloud database Flower Pollination Algorithm |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | Wireless Sensor Network (WSN) is an emerging technology adopted in a broad range of applications. Such applications generate massive data that are transmitted to the cloud database for storage and processing. The data transmission from the WSN to the cloud database should be secured and energy efficient. To achieve this, a Secured Energy Efficient Framework (SEEF) is proposed which comprises of various phases like energy efficient clustering, variable size slot allocation through MAC protocol, Sybil attack detection mechanism for node investigation and cross layer based routing protocol optimized through Flower Pollination Algorithm (FPA). The sensor nodes are grouped in the form of clusters to achieve energy efficiency and to reduce the overhead. The clusters are formed by balancing the load of each cluster. The cluster head is elected based on the energy, distance factor and load factor. A MAC protocol namely Content Slot Allocation based Multi-Layer (CSA-ML) MAC protocol is proposed for slot allocation. The cluster head allocates the slots of variable length in multiple layers to their cluster members according to their communication requirements. This reduces the idle listening problem and improves energy efficiency. Furthermore, the number of data packets in the node s queue and priority are also considered during slot allocation, which reduces the packet loss problem. As WSN is deployed in a hostile environment, they are prone to various types of attacks. Sybil attack is a type of attack in which the malicious node creates multiple Sybil identities that may join in more than one cluster which is closer. The trust based security mechanism validates the nodes according to the calculated trust value. newline |
Pagination: | xxi,151p. |
URI: | http://hdl.handle.net/10603/333489 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 43 kB | Adobe PDF | View/Open |
02_certificates.pdf | 214.58 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 745.2 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 1.28 MB | Adobe PDF | View/Open | |
05_abstracts.pdf | 150.08 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 1.52 MB | Adobe PDF | View/Open | |
07_contents.pdf | 149.37 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 106.37 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 93.04 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 236 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 308.1 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 272.83 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 274.14 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 705.39 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 455.93 kB | Adobe PDF | View/Open | |
16_chapter6.pdf | 637.66 kB | Adobe PDF | View/Open | |
17_conclusion.pdf | 162.32 kB | Adobe PDF | View/Open | |
18_references.pdf | 279.74 kB | Adobe PDF | View/Open | |
19_listofpublications.pdf | 217.27 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 83.68 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).
Altmetric Badge: