Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/441290
Title: | An efficient provenance based security Mechanism for wireless sensor networks |
Researcher: | Sujesh P Lal |
Guide(s): | JOE PRATHAP P |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology |
University: | Sathyabama Institute of Science and Technology |
Completed Date: | 2021 |
Abstract: | Wireless sensor networks are most increasingly used in several applications newlinesuch as wild habitat monitoring, forest fire detection, and military surveillance. newlineAfter being deployed in the field of interest, sensor nodes organize themselves newlineinto a multihop network area with the base station. Data provenance is considered newlineas an effective tool for evaluating data trustworthiness, since it summarizes the newlinehistory of the ownership and the actions performed on the data. newlineWe have studied the provenance-based evaluation of the trustworthiness of newlinesensor data, location data, and multi-hop network manifest the key contribution of newlineprovenance in data streams. The assurance of data trustworthiness is crucial, newlinewhich prioritizes the secure management of provenance. Provenance plays a key newlinerole in process control tasks that analyze the real time data collected from newlinedifferent sensors. The significance of provenance for streaming data is also newlineemphasized in the Research and Development Challenges for National Cyber newlineSecurity report which recommends research initiatives on efficient and secure newlineimplementation of provenance for real-time systems. newlineProvenance management for sensor networks introduces numerous newlinechallenging necessities, such as low energy and bandwidth consumption, storage newlineefficiency and confidential transfer. However this provenance might be corrupted newlineor hacked due to various issues such as, assuring trustworthiness of shared data is newlinemore difficult in the wireless sensor network where there is possibility of newlinevi newlinemalicious activities, limited energy resource characteristics of wireless sensor newlinenodes tends to have lesser security level, assuring security level in wireless sensor newlinenetwork with the presence of selective forwarding attack is more difficult. newlineThe main goal of this research method is to introduce the novel secured newlineprovenance forgery detection system for ensuring the guaranteed data newlinetransmission rate. |
Pagination: | A5, VI, 191 |
URI: | http://hdl.handle.net/10603/441290 |
Appears in Departments: | INFORMATION TECHNOLOGY |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10. annextures.pdf | Attached File | 4.68 MB | Adobe PDF | View/Open |
1.title.pdf | 702.6 kB | Adobe PDF | View/Open | |
2. prelim pages.pdf | 2.02 MB | Adobe PDF | View/Open | |
3 .abstract.pdf | 333.52 kB | Adobe PDF | View/Open | |
4 .table of contents.pdf | 1.79 MB | Adobe PDF | View/Open | |
5.chapter 1.pdf | 198.13 kB | Adobe PDF | View/Open | |
6.chapter 2.pdf | 316.4 kB | Adobe PDF | View/Open | |
7.chapter 3.pdf | 411.5 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 702.6 kB | Adobe PDF | View/Open | |
8.chapter 4.pdf | 381.43 kB | Adobe PDF | View/Open | |
9.chapter 5.pdf | 414.52 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: