Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/334796
Title: | Investigations on machine learning techniques for black hole sink hole and clone attack detection and isolation in health care wireless sensor networks |
Researcher: | John clement sunder A |
Guide(s): | Shanmugam A |
Keywords: | Wireless Sensor Network |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | newline Wireless Sensor Network (WSN) comprises of spatially distributed independent sensors to monitor the network and collect information about the surrounding environment. The biomedical sensor efficiently gathers the data securely in order to prevent the probable malicious user behavior (i.e. attack) in the network, but it is still being a difficult problem to identify the attack from normal sensor nodes. Therefore, the proposed works focus on developing means of efficient attack discovery for secured data packet broadcasting from source to the destination node in WSN.Position Verification Method with Message Verification and Passing (PVM-MVP) algorithm identified confidence nodes in WSN for secured communication. Though, PVM-MVP algorithm reduces the time consumption for message verification but does not prove to be cost effective. An efficient defense technique against Black Hole (BH) attack was implemented for secured data discovery with minimal routing overhead and delay in WSN. But, it cannot generate the solution for other attacks rather than BH attack. The first work is designed with the help of proposed Projected Independent Component Analysis (PICA) technique to find black hole attack during transmission. Initially, collecting the patient s information from biomedical sensors for healthcare applications with enhanced security is done and mishandling by malicious users is ignored in WSN. Besides, Independent Component Analysis (ICA) efficiently ensures security during transmission. Mutual Information (MI) is employed in ICA technique to identify the black hole node with lesser time according to the behavior analysis. newline newline |
Pagination: | xxv,218p. |
URI: | http://hdl.handle.net/10603/334796 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 26.34 kB | Adobe PDF | View/Open |
02_certificates.pdf | 680.16 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 848.36 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 172.85 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 290.79 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 227.76 kB | Adobe PDF | View/Open | |
07_contents.pdf | 249.56 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 251.39 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 237.99 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 369.31 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 1.2 MB | Adobe PDF | View/Open | |
12_chapter2.pdf | 1.17 MB | Adobe PDF | View/Open | |
13_chapter3.pdf | 623.77 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 622.01 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 587.57 kB | Adobe PDF | View/Open | |
16_chapter6.pdf | 577.52 kB | Adobe PDF | View/Open | |
17_conclusion.pdf | 297.27 kB | Adobe PDF | View/Open | |
18_references.pdf | 1.1 MB | Adobe PDF | View/Open | |
19_listofpublications.pdf | 283.3 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 156.33 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: