Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/338597
Title: | Secure routing framework using anomaly detection and key management in WSN |
Researcher: | Swaminathan, A |
Guide(s): | Vivekanandan, P |
Keywords: | Wireless Sensor Networks Satellite communications Routing protocols |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Wireless Sensor Networks (WSNs) are a collection of spatially distributed independent and dedicated sensors. These sensors are able to recognize, process and communicate with themselves or with other nodes. The information gathered by sensor nodes is propagated in the network by flooding or routing. Routing is the most challenging task in WSNs because of limited processing, energy resources and communication constraints. Consequently, the routing protocols were designed with the low processing complexity and minimum communication overhead. The sensor nodes mostly operate in pervasive environments with no user intervention. The routing here is done through distributed and decentralized controllers at each node on the basis of local and partial information. Thus, self-organizing WSN was designed to take adaptive routing decisions in response to changing external environment. Considering the above said scenarios, the new protocols proposed in this thesis are scalable and efficient in performance with an ability to keep the network alive for a longer period of time. The sensor nodes are usually sprinkled in a sensor field and each of newlinethese sprinkled sensor nodes has the capability to collect data and route back to a sink and end users. The sink node may transfer the data with the help of task manager node via the internet or satellite communications. The small sensor nodes are liable to many kinds of attacks. Due to the size and location of the sensor network, it is impractical to monitor and defend each individual sensor from a physical or logical attack. Thus, a mechanism has been newlineproposed in this thesis to detect such attacks. newline newline |
Pagination: | xxvi,182p. |
URI: | http://hdl.handle.net/10603/338597 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 29 kB | Adobe PDF | View/Open |
02_certificates.pdf | 121.94 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 302.41 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 6.6 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 9.03 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 321.65 kB | Adobe PDF | View/Open | |
07_contents.pdf | 22.82 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 6.38 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 9.81 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 73.4 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 291.13 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 259.58 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 326.13 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 327.62 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 790.41 kB | Adobe PDF | View/Open | |
16_chapter6.pdf | 108.63 kB | Adobe PDF | View/Open | |
17_conclusion.pdf | 17.49 kB | Adobe PDF | View/Open | |
18_references.pdf | 76.47 kB | Adobe PDF | View/Open | |
19_listofpublications.pdf | 11.35 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 54.17 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: