Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/339995
Title: | Vampire attack detection and secure routing in wireless ad hoc sensor |
Researcher: | Isaac Sajan, R |
Guide(s): | Jasper, J |
Keywords: | Ad hoc sensor network Sensors |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | Recent development of technologies plays a major role in the development of sensors, especially in military applications. Due to the open nature of the ad hoc sensor network, the system is easily affected which can result in packet loss, transmission delays, network overload and increased energy consumption. In this thesis, security during data transmission is provided to the network by introducing two schemes. The first scheme is the Knowledge and Intrusion Detection based Secure Atom Search Routing (KID-SASR) algorithm, adopted by the behavior of molecular dynamics. This algorithm offers an effective solution on the basis of the interaction strength of atoms to overcome against carousal and stretch attack. Since the knowledge base processes all the data, computational complexity is reduced and the life span of the network increases. The simulation and performance are performed for the proposed protocol KID-SASR based on the detection of knowledge and intrusions and is compared with existing methods based on energy, packet delivery ratio, detection rate, communication costs etc. The results obtained shows improvement in performance. Secondly, due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are also vulnerable to attacks like fake data injection and malicious discovery attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This causes the Base Station address these issues, another scheme called Base Station Controlled Secure Routing Protocol (BSCSRP) is introduced. The proposed work aims to detect the anti-nodes from safe nodes by a trust-based mechanism which secures thenetwork from false data injection as well as provides an efficient route that is free from vampire attack. The effectiveness of BSCSRP is evaluated by comparing its performance with the existing method. The result obtained shows consistent improvement in the overall system performance. newline |
Pagination: | xix,215 p. |
URI: | http://hdl.handle.net/10603/339995 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 241.09 kB | Adobe PDF | View/Open |
02_certificates.pdf | 139.31 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 224.77 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 157.14 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 180.41 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 1.29 MB | Adobe PDF | View/Open | |
07_contents.pdf | 204.1 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 175.71 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 187.67 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 185.2 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 1.36 MB | Adobe PDF | View/Open | |
12_chapter2.pdf | 1.22 MB | Adobe PDF | View/Open | |
13_chapter3.pdf | 1.8 MB | Adobe PDF | View/Open | |
14_chapter4.pdf | 1.98 MB | Adobe PDF | View/Open | |
15_chapter5.pdf | 1.05 MB | Adobe PDF | View/Open | |
16_conclusion.pdf | 196.51 kB | Adobe PDF | View/Open | |
17_references.pdf | 2.32 MB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 275.57 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 197.84 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: