Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/335676
Title: | Certain studies on trust based energy minimization in wireless sensor networks |
Researcher: | Sakthi Vinayagam, S |
Guide(s): | Parthasarathy, V |
Keywords: | Wireless sensor network Security mechanism Deep learning |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Wireless Sensor Network has nodes that communicate in an Adhoc manner. Sensor networks help in detecting signals, considering them as input to the network and processes it. This information that is gathered by the sensors can furnish valuable information once processed. The major threat to these networks is the attacks that i\t has to survive when transmitting information through the nodes, as the nodes are mostly mobile. Therefore, securing the network and minimizing the energy consumed is also a major concern. The major motive of this research is to probe into the algorithms that contribute towards ensuring the security of the sensor nodes and network as a whole. Some of the issues taken for investigation include:(i) Energy Constraint Based Trust Assurance Route approach for handling Sybil Attack.(ii)Restricted Identity Based Proxy Encryption for handling Sybil Attack. (iii) Energy Based ECC routing for handling Sybil Attack with improved Trust model.(iv) Energy Based ECC routing for handling Sybil Attack with improved Trust model using Deep Learning.(v) Energy Based ECC routing for handling Sybil Attack with improved Trust model using Restricted Boltzmaan Machine. The network consists of nodes including sensors that are part of any communication. This is an IoT scenario where the nodes communicate in adhoc manner. The nodes are assumed to communicate data in a Banking Environment. The data communicated is assumed to a part or full transaction. In Sybil attack the node which aims to attack the network creates multiple identities of its own and creates replicating identities of its own. Currently prevailing methodologies need to be updated for betterperformance. The packets that are sent are verified either on the server side or on the client end. A new methodology called Restricted Identity-Based Proxy Re-Encryption (RIBPRE) is proposed in this thesis. Overall objective is to detect Sybil attacks that will help in increasing the security of the network and enhance its overall performance. newline |
Pagination: | xx,182 p. |
URI: | http://hdl.handle.net/10603/335676 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 181.48 kB | Adobe PDF | View/Open |
02_certificates.pdf | 166.37 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 305 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 227.49 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 358.44 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 245.2 kB | Adobe PDF | View/Open | |
07_contents.pdf | 372.8 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 353.2 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 361.9 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 358.54 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 737.75 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 838.48 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 1.55 MB | Adobe PDF | View/Open | |
14_chapter4.pdf | 3.79 MB | Adobe PDF | View/Open | |
15_chapter5.pdf | 12.81 MB | Adobe PDF | View/Open | |
16_chapter6.pdf | 12.38 MB | Adobe PDF | View/Open | |
17_conclusion.pdf | 537.72 kB | Adobe PDF | View/Open | |
18_references.pdf | 573.11 kB | Adobe PDF | View/Open | |
19_listofpublications.pdf | 436.27 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 1.11 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: