Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/356669
Title: | quotEfficient Hierarchical Data Aggregation In Wireless Sensor Networks In The Presence Of Attacksquot |
Researcher: | Giddaluri Nagendra Babu |
Guide(s): | Mehata, K M and Krishnamurthy, M |
Keywords: | Computer Science Computer Science Artificial Intelligence Engineering and Technology |
University: | Hindustan University |
Completed Date: | 2021 |
Abstract: | Wireless sensor network incorporates a large range of low-cost nodes that exhibits significant advantage in terms of sensing, communication, and computation capabilities. Due to limited resources in node, it is necessary to reduce the data transmission rate with an increasing average lifetime of the network. However, communication between nodes utilizes a large range of WSN energy. To minimize energy consumption, data aggregation is adopted for combining data in a sensor network to minimize the data transmission rate. Consequently, data aggregation significantly minimizes consumed energy with the elimination of data transmission back to the base station. Generally, a wireless sensor network is deployed in a hostile and remote environment for sensitive information transmission. Those sensor nodes are subjected to compromise attacks and security challenges like confidentiality of data, freshness, and integrity. This research focused on secure data aggregation in WSN for effective data aggregation and security. Initially, to achieve secure data aggregation this research adopts synopsis diffusion. In synopsis diffusion, nodes are classified with multiple rings with the determination of hop count. The node hopping count is calculated from the base station. The synopsis is scattered in multiple paths for the provision of robustness. In this research investigation, the Synopsis diffusion framework is augmented with Message Authentication Codes to combat attacks caused by compromised nodes.In the next stage, a lightweight approach for the detection of a malfunctioning node is constructed. The proposed lightweight model is defined as the Lightweight Method to avoid Malfunctioning Node (LMMN). The LMMN model focused on the reduction of the computation process. The proposed LMMN performance relies on symmetric cryptography. A pair-wise key is generated by the key server for secure data transmission between nodes and the base station with a reduced computational cost. |
Pagination: | |
URI: | http://hdl.handle.net/10603/356669 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10-chapter 4.pdf | Attached File | 4.87 MB | Adobe PDF | View/Open |
11-chapter 5.pdf | 1.22 MB | Adobe PDF | View/Open | |
12-chapter 6.pdf | 546.74 kB | Adobe PDF | View/Open | |
13-chapter 7.pdf | 179.69 kB | Adobe PDF | View/Open | |
15-chapter 8.pdf | 5.21 MB | Adobe PDF | View/Open | |
1-title.pdf | 101.1 kB | Adobe PDF | View/Open | |
2_certificates.pdf | 311.34 kB | Adobe PDF | View/Open | |
3-declaration.pdf | 166.11 kB | Adobe PDF | View/Open | |
4_ack.pdf | 217.73 kB | Adobe PDF | View/Open | |
5_contents.pdf | 512.05 kB | Adobe PDF | View/Open | |
5_tables.pdf | 703.99 kB | Adobe PDF | View/Open | |
6_abstract.pdf | 570.17 kB | Adobe PDF | View/Open | |
7-chapter 1.pdf | 2.21 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 1.84 MB | Adobe PDF | View/Open | |
8-chapter 2.pdf | 10.86 MB | Adobe PDF | View/Open | |
9-chapter 3.pdf | 13.71 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: