Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/340014
Title: Energy enhancement of wsn by mitigating attacks through lwbf data provenance and svm based ids
Researcher: Prabakaran, K
Guide(s): Kumaratharan, N
Keywords: Engineering and Technology
Computer Science
Telecommunications
Wireless sensor network
Lwbf data
University: Anna University
Completed Date: 2019
Abstract: As a reliable technology, the Wireless Sensor Network (WSN) has been employed widely in other technologies such as Internet of things, Artificial Intelligence etc. Numerous associated uses have been performed. As one of the applications, the WSN is gaining reliability and popular in network. WSN is considered as the most significant technology in the 21st century, WSN is considered as a vital component in linking the rationality information world and the prevailing physical world. Though, the exposed working principle of WSN and information media and the deprived organization of environment posses many threats to the security and it is extremely limiting the claim of WSNs. The trending technology of WSN is widely used in this modern world for a maximum range of application for the best quality of human life, but due to their energy constrains and consumption and problems as mentioned above, these WSN have their limitation in their application and their functionality. In spite of its accuracy and energy constrain analysis from real exploitation can suffer restrictions; the data acquired by the sensors from a wide area is very tough to obtain. On the other hand, analytical/theoretical models obtained from the mathematical calculation offers huge exploration capacity, but it can simplify through idealized hypotheses which could cause trouble during the practical implementation. Also, the wireless sensor devices are insufficient in their energy consumption, computational complexity, and communication impairment. When WSN are established in a intimidating atmosphere, security becomes particularly significant to diversified malicious attacks. WSN works mutually with their physical atmosphere, posing new security issues. Consequently, new ideas are desirable to sort out various types of security issues. The most general objectives of WSN are confidentiality, integrity, authentication, availability, survivability, efficiency, freshness and scalability. newline
Pagination: xvi,125 p.
URI: http://hdl.handle.net/10603/340014
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File19.42 kBAdobe PDFView/Open
02_certificates.pdf1.96 MBAdobe PDFView/Open
03_vivaproceedings.pdf2.31 MBAdobe PDFView/Open
04_bonafidecertificate.pdf245.54 kBAdobe PDFView/Open
05_abstracts.pdf11.36 kBAdobe PDFView/Open
06_acknowledgements.pdf279.16 kBAdobe PDFView/Open
07_contents.pdf10.53 kBAdobe PDFView/Open
08_listoftables.pdf6.24 kBAdobe PDFView/Open
09_listoffigures.pdf9.93 kBAdobe PDFView/Open
10_listofabbreviations.pdf8.17 kBAdobe PDFView/Open
11_chapter1.pdf207.36 kBAdobe PDFView/Open
12_chapter2.pdf10.95 kBAdobe PDFView/Open
13_chapter3.pdf588.92 kBAdobe PDFView/Open
14_chapter4.pdf250.9 kBAdobe PDFView/Open
15_chapter5.pdf139.93 kBAdobe PDFView/Open
16_conclusion.pdf28.18 kBAdobe PDFView/Open
17_references.pdf54.81 kBAdobe PDFView/Open
18_listofpublications.pdf11.14 kBAdobe PDFView/Open
80_recommendation.pdf18.59 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: