Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/339995
Title: Vampire attack detection and secure routing in wireless ad hoc sensor
Researcher: Isaac Sajan, R
Guide(s): Jasper, J
Keywords: Ad hoc sensor network
Sensors
University: Anna University
Completed Date: 2021
Abstract: Recent development of technologies plays a major role in the development of sensors, especially in military applications. Due to the open nature of the ad hoc sensor network, the system is easily affected which can result in packet loss, transmission delays, network overload and increased energy consumption. In this thesis, security during data transmission is provided to the network by introducing two schemes. The first scheme is the Knowledge and Intrusion Detection based Secure Atom Search Routing (KID-SASR) algorithm, adopted by the behavior of molecular dynamics. This algorithm offers an effective solution on the basis of the interaction strength of atoms to overcome against carousal and stretch attack. Since the knowledge base processes all the data, computational complexity is reduced and the life span of the network increases. The simulation and performance are performed for the proposed protocol KID-SASR based on the detection of knowledge and intrusions and is compared with existing methods based on energy, packet delivery ratio, detection rate, communication costs etc. The results obtained shows improvement in performance. Secondly, due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are also vulnerable to attacks like fake data injection and malicious discovery attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This causes the Base Station address these issues, another scheme called Base Station Controlled Secure Routing Protocol (BSCSRP) is introduced. The proposed work aims to detect the anti-nodes from safe nodes by a trust-based mechanism which secures thenetwork from false data injection as well as provides an efficient route that is free from vampire attack. The effectiveness of BSCSRP is evaluated by comparing its performance with the existing method. The result obtained shows consistent improvement in the overall system performance. newline
Pagination: xix,215 p.
URI: http://hdl.handle.net/10603/339995
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File241.09 kBAdobe PDFView/Open
02_certificates.pdf139.31 kBAdobe PDFView/Open
03_vivaproceedings.pdf224.77 kBAdobe PDFView/Open
04_bonafidecertificate.pdf157.14 kBAdobe PDFView/Open
05_abstracts.pdf180.41 kBAdobe PDFView/Open
06_acknowledgements.pdf1.29 MBAdobe PDFView/Open
07_contents.pdf204.1 kBAdobe PDFView/Open
08_listoftables.pdf175.71 kBAdobe PDFView/Open
09_listoffigures.pdf187.67 kBAdobe PDFView/Open
10_listofabbreviations.pdf185.2 kBAdobe PDFView/Open
11_chapter1.pdf1.36 MBAdobe PDFView/Open
12_chapter2.pdf1.22 MBAdobe PDFView/Open
13_chapter3.pdf1.8 MBAdobe PDFView/Open
14_chapter4.pdf1.98 MBAdobe PDFView/Open
15_chapter5.pdf1.05 MBAdobe PDFView/Open
16_conclusion.pdf196.51 kBAdobe PDFView/Open
17_references.pdf2.32 MBAdobe PDFView/Open
18_listofpublications.pdf275.57 kBAdobe PDFView/Open
80_recommendation.pdf197.84 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: