Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/340583
Title: An enhanced secured trust cloud model in underwater wireless sensor networks for large scale environment
Researcher: Porkodi, K P
Guide(s): Zubair Rahman, A M J MD and Nithya, N S
Keywords: Engineering and Technology
Computer Science
Telecommunications
Wireless sensor networks
Cloud computing
University: Anna University
Completed Date: 2019
Abstract: Among the latest gamut of trends, underwater wireless sensor plays a crucial role in communication since most of the earth is covered by water. The people and researchers are willingly interested in communicating across all the areas of wireless communication. The communication of underwater wireless sensor networks is made possible by the sensor nodes which are deployed intentionally in the network coverage area for communication. The deployed sensor nodes are used to monitor the underwater environment properties of salinity, depth, nodeand#8223;s position etc. The significant growth of underwater wireless sensor communications and their application have been extended to disaster forecasting, military operations, deep sea surveillance etc. Underwater Wireless Sensor Network (UWSN) has constraints with regard to the connectivity of nodes along the shortest path and with high energy level. Next, the data during the transmission process are not encrypted and the estimation of the time duration is not often. The underwater wireless sensor node communication is mainly based on the distance between source to destination, residual energy, battery level and the structure of node arrangement. The sensor nodes in the underwater wireless sensor networks can collect share and transfer the data through various approaches. Clustering based approach has resolved various problems and it makes communication not only efficient but also vibrant. In this thesis, the game theoretic approach of Tic-Tac-Toe method concentrates on co-operation between nodes and the performance of different metrics. Tic-Tac-Toe approach has inherent communication and that makes confuse to malicious node about the neighbourhood sensor nodes. In each iteration the nodes position is evaluated, based on the result, the significant result has been obtained In the successful UWSN communication, the traffic flow plays an important role to reach the destination. The approach of Time Oriented Spatial Malicious Mitigation (TOSMM) is proposed to reduce the traffic in the communication network. Since, the sensor node replacement is very difficult in underwater wireless sensor network. Thetosmm approach is also used for malicious detection. newline newline newline
Pagination: Xx,113 p.
URI: http://hdl.handle.net/10603/340583
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.11 kBAdobe PDFView/Open
02_certificates.pdf189.51 kBAdobe PDFView/Open
03_vivaproceedings.pdf237.42 kBAdobe PDFView/Open
04_bonafidecertificate.pdf136.63 kBAdobe PDFView/Open
05_abstracts.pdf85.97 kBAdobe PDFView/Open
06_acknowledgements.pdf191.97 kBAdobe PDFView/Open
07_contents.pdf247.27 kBAdobe PDFView/Open
08_listoftables.pdf4.72 kBAdobe PDFView/Open
09_listoffigures.pdf162.65 kBAdobe PDFView/Open
10_listofabbreviations.pdf113.38 kBAdobe PDFView/Open
11_chapter1.pdf379.21 kBAdobe PDFView/Open
12_chapter2.pdf125.37 kBAdobe PDFView/Open
13-chapter3.pdf313.61 kBAdobe PDFView/Open
14_chapter4.pdf294.23 kBAdobe PDFView/Open
15_chapter5.pdf323.44 kBAdobe PDFView/Open
16_chapter6.pdf135.83 kBAdobe PDFView/Open
17_chapter7.pdf538.56 kBAdobe PDFView/Open
18_conclusion.pdf91.21 kBAdobe PDFView/Open
19_references.pdf138.64 kBAdobe PDFView/Open
20_listofpublications.pdf86.69 kBAdobe PDFView/Open
80_recommendation.pdf76.35 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: