Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/340583
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | An enhanced secured trust cloud model in underwater wireless sensor networks for large scale environment | |
dc.date.accessioned | 2021-09-15T09:09:18Z | - |
dc.date.available | 2021-09-15T09:09:18Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/340583 | - |
dc.description.abstract | Among the latest gamut of trends, underwater wireless sensor plays a crucial role in communication since most of the earth is covered by water. The people and researchers are willingly interested in communicating across all the areas of wireless communication. The communication of underwater wireless sensor networks is made possible by the sensor nodes which are deployed intentionally in the network coverage area for communication. The deployed sensor nodes are used to monitor the underwater environment properties of salinity, depth, nodeand#8223;s position etc. The significant growth of underwater wireless sensor communications and their application have been extended to disaster forecasting, military operations, deep sea surveillance etc. Underwater Wireless Sensor Network (UWSN) has constraints with regard to the connectivity of nodes along the shortest path and with high energy level. Next, the data during the transmission process are not encrypted and the estimation of the time duration is not often. The underwater wireless sensor node communication is mainly based on the distance between source to destination, residual energy, battery level and the structure of node arrangement. The sensor nodes in the underwater wireless sensor networks can collect share and transfer the data through various approaches. Clustering based approach has resolved various problems and it makes communication not only efficient but also vibrant. In this thesis, the game theoretic approach of Tic-Tac-Toe method concentrates on co-operation between nodes and the performance of different metrics. Tic-Tac-Toe approach has inherent communication and that makes confuse to malicious node about the neighbourhood sensor nodes. In each iteration the nodes position is evaluated, based on the result, the significant result has been obtained In the successful UWSN communication, the traffic flow plays an important role to reach the destination. The approach of Time Oriented Spatial Malicious Mitigation (TOSMM) is proposed to reduce the traffic in the communication network. Since, the sensor node replacement is very difficult in underwater wireless sensor network. Thetosmm approach is also used for malicious detection. newline newline newline | |
dc.format.extent | Xx,113 p. | |
dc.language | English | |
dc.relation | P.102-112 | |
dc.rights | university | |
dc.title | An enhanced secured trust cloud model in underwater wireless sensor networks for large scale environment | |
dc.title.alternative | ||
dc.creator.researcher | Porkodi, K P | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Telecommunications | |
dc.subject.keyword | Wireless sensor networks | |
dc.subject.keyword | Cloud computing | |
dc.description.note | ||
dc.contributor.guide | Zubair Rahman, A M J MD and Nithya, N S | |
dc.publisher.place | Chennai | |
dc.publisher.university | Anna University | |
dc.publisher.institution | Faculty of Information and Communication Engineering | |
dc.date.registered | ||
dc.date.completed | 2019 | |
dc.date.awarded | 2019 | |
dc.format.dimensions | 21cm | |
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.11 kB | Adobe PDF | View/Open |
02_certificates.pdf | 189.51 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 237.42 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 136.63 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 85.97 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 191.97 kB | Adobe PDF | View/Open | |
07_contents.pdf | 247.27 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 4.72 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 162.65 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 113.38 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 379.21 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 125.37 kB | Adobe PDF | View/Open | |
13-chapter3.pdf | 313.61 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 294.23 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 323.44 kB | Adobe PDF | View/Open | |
16_chapter6.pdf | 135.83 kB | Adobe PDF | View/Open | |
17_chapter7.pdf | 538.56 kB | Adobe PDF | View/Open | |
18_conclusion.pdf | 91.21 kB | Adobe PDF | View/Open | |
19_references.pdf | 138.64 kB | Adobe PDF | View/Open | |
20_listofpublications.pdf | 86.69 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 76.35 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: