Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/340014
Title: | Energy enhancement of wsn by mitigating attacks through lwbf data provenance and svm based ids |
Researcher: | Prabakaran, K |
Guide(s): | Kumaratharan, N |
Keywords: | Engineering and Technology Computer Science Telecommunications Wireless sensor network Lwbf data |
University: | Anna University |
Completed Date: | 2019 |
Abstract: | As a reliable technology, the Wireless Sensor Network (WSN) has been employed widely in other technologies such as Internet of things, Artificial Intelligence etc. Numerous associated uses have been performed. As one of the applications, the WSN is gaining reliability and popular in network. WSN is considered as the most significant technology in the 21st century, WSN is considered as a vital component in linking the rationality information world and the prevailing physical world. Though, the exposed working principle of WSN and information media and the deprived organization of environment posses many threats to the security and it is extremely limiting the claim of WSNs. The trending technology of WSN is widely used in this modern world for a maximum range of application for the best quality of human life, but due to their energy constrains and consumption and problems as mentioned above, these WSN have their limitation in their application and their functionality. In spite of its accuracy and energy constrain analysis from real exploitation can suffer restrictions; the data acquired by the sensors from a wide area is very tough to obtain. On the other hand, analytical/theoretical models obtained from the mathematical calculation offers huge exploration capacity, but it can simplify through idealized hypotheses which could cause trouble during the practical implementation. Also, the wireless sensor devices are insufficient in their energy consumption, computational complexity, and communication impairment. When WSN are established in a intimidating atmosphere, security becomes particularly significant to diversified malicious attacks. WSN works mutually with their physical atmosphere, posing new security issues. Consequently, new ideas are desirable to sort out various types of security issues. The most general objectives of WSN are confidentiality, integrity, authentication, availability, survivability, efficiency, freshness and scalability. newline |
Pagination: | xvi,125 p. |
URI: | http://hdl.handle.net/10603/340014 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 19.42 kB | Adobe PDF | View/Open |
02_certificates.pdf | 1.96 MB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 2.31 MB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 245.54 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 11.36 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 279.16 kB | Adobe PDF | View/Open | |
07_contents.pdf | 10.53 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 6.24 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 9.93 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 8.17 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 207.36 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 10.95 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 588.92 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 250.9 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 139.93 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 28.18 kB | Adobe PDF | View/Open | |
17_references.pdf | 54.81 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 11.14 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 18.59 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: