Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/335676
Title: Certain studies on trust based energy minimization in wireless sensor networks
Researcher: Sakthi Vinayagam, S
Guide(s): Parthasarathy, V
Keywords: Wireless sensor network
Security mechanism
Deep learning
University: Anna University
Completed Date: 2020
Abstract: Wireless Sensor Network has nodes that communicate in an Adhoc manner. Sensor networks help in detecting signals, considering them as input to the network and processes it. This information that is gathered by the sensors can furnish valuable information once processed. The major threat to these networks is the attacks that i\t has to survive when transmitting information through the nodes, as the nodes are mostly mobile. Therefore, securing the network and minimizing the energy consumed is also a major concern. The major motive of this research is to probe into the algorithms that contribute towards ensuring the security of the sensor nodes and network as a whole. Some of the issues taken for investigation include:(i) Energy Constraint Based Trust Assurance Route approach for handling Sybil Attack.(ii)Restricted Identity Based Proxy Encryption for handling Sybil Attack. (iii) Energy Based ECC routing for handling Sybil Attack with improved Trust model.(iv) Energy Based ECC routing for handling Sybil Attack with improved Trust model using Deep Learning.(v) Energy Based ECC routing for handling Sybil Attack with improved Trust model using Restricted Boltzmaan Machine. The network consists of nodes including sensors that are part of any communication. This is an IoT scenario where the nodes communicate in adhoc manner. The nodes are assumed to communicate data in a Banking Environment. The data communicated is assumed to a part or full transaction. In Sybil attack the node which aims to attack the network creates multiple identities of its own and creates replicating identities of its own. Currently prevailing methodologies need to be updated for betterperformance. The packets that are sent are verified either on the server side or on the client end. A new methodology called Restricted Identity-Based Proxy Re-Encryption (RIBPRE) is proposed in this thesis. Overall objective is to detect Sybil attacks that will help in increasing the security of the network and enhance its overall performance. newline
Pagination: xx,182 p.
URI: http://hdl.handle.net/10603/335676
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File181.48 kBAdobe PDFView/Open
02_certificates.pdf166.37 kBAdobe PDFView/Open
03_vivaproceedings.pdf305 kBAdobe PDFView/Open
04_bonafidecertificate.pdf227.49 kBAdobe PDFView/Open
05_abstracts.pdf358.44 kBAdobe PDFView/Open
06_acknowledgements.pdf245.2 kBAdobe PDFView/Open
07_contents.pdf372.8 kBAdobe PDFView/Open
08_listoftables.pdf353.2 kBAdobe PDFView/Open
09_listoffigures.pdf361.9 kBAdobe PDFView/Open
10_listofabbreviations.pdf358.54 kBAdobe PDFView/Open
11_chapter1.pdf737.75 kBAdobe PDFView/Open
12_chapter2.pdf838.48 kBAdobe PDFView/Open
13_chapter3.pdf1.55 MBAdobe PDFView/Open
14_chapter4.pdf3.79 MBAdobe PDFView/Open
15_chapter5.pdf12.81 MBAdobe PDFView/Open
16_chapter6.pdf12.38 MBAdobe PDFView/Open
17_conclusion.pdf537.72 kBAdobe PDFView/Open
18_references.pdf573.11 kBAdobe PDFView/Open
19_listofpublications.pdf436.27 kBAdobe PDFView/Open
80_recommendation.pdf1.11 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: