Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/441290
Title: An efficient provenance based security Mechanism for wireless sensor networks
Researcher: Sujesh P Lal
Guide(s): JOE PRATHAP P
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Sathyabama Institute of Science and Technology
Completed Date: 2021
Abstract: Wireless sensor networks are most increasingly used in several applications newlinesuch as wild habitat monitoring, forest fire detection, and military surveillance. newlineAfter being deployed in the field of interest, sensor nodes organize themselves newlineinto a multihop network area with the base station. Data provenance is considered newlineas an effective tool for evaluating data trustworthiness, since it summarizes the newlinehistory of the ownership and the actions performed on the data. newlineWe have studied the provenance-based evaluation of the trustworthiness of newlinesensor data, location data, and multi-hop network manifest the key contribution of newlineprovenance in data streams. The assurance of data trustworthiness is crucial, newlinewhich prioritizes the secure management of provenance. Provenance plays a key newlinerole in process control tasks that analyze the real time data collected from newlinedifferent sensors. The significance of provenance for streaming data is also newlineemphasized in the Research and Development Challenges for National Cyber newlineSecurity report which recommends research initiatives on efficient and secure newlineimplementation of provenance for real-time systems. newlineProvenance management for sensor networks introduces numerous newlinechallenging necessities, such as low energy and bandwidth consumption, storage newlineefficiency and confidential transfer. However this provenance might be corrupted newlineor hacked due to various issues such as, assuring trustworthiness of shared data is newlinemore difficult in the wireless sensor network where there is possibility of newlinevi newlinemalicious activities, limited energy resource characteristics of wireless sensor newlinenodes tends to have lesser security level, assuring security level in wireless sensor newlinenetwork with the presence of selective forwarding attack is more difficult. newlineThe main goal of this research method is to introduce the novel secured newlineprovenance forgery detection system for ensuring the guaranteed data newlinetransmission rate.
Pagination: A5, VI, 191
URI: http://hdl.handle.net/10603/441290
Appears in Departments:INFORMATION TECHNOLOGY

Files in This Item:
File Description SizeFormat 
10. annextures.pdfAttached File4.68 MBAdobe PDFView/Open
1.title.pdf702.6 kBAdobe PDFView/Open
2. prelim pages.pdf2.02 MBAdobe PDFView/Open
3 .abstract.pdf333.52 kBAdobe PDFView/Open
4 .table of contents.pdf1.79 MBAdobe PDFView/Open
5.chapter 1.pdf198.13 kBAdobe PDFView/Open
6.chapter 2.pdf316.4 kBAdobe PDFView/Open
7.chapter 3.pdf411.5 kBAdobe PDFView/Open
80_recommendation.pdf702.6 kBAdobe PDFView/Open
8.chapter 4.pdf381.43 kBAdobe PDFView/Open
9.chapter 5.pdf414.52 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: