Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/444956
Title: Performance studies on improving data integrity and intrusion detection for energy efficient wireless sensor network
Researcher: Vidhya S
Guide(s): Sasilatha T
Keywords: Computer Science
Computer Science Hardware and Architecture
Engineering and Technology
University: Sathyabama Institute of Science and Technology
Completed Date: 2021
Abstract: In the contemporary business, the digital communication is newlinehighly desirable for transferring the data through transmission media. newlineWireless Sensor Networks (WSN) play a vital part in data transmission. newlineWSN transmits the finely tuned and organized information from the newlinebase station which is analyzed for the malignant environment. The newlineproposed work aims at combining traditional Adhoc on-demand newlinedistance vector (AODV) routing algorithm with energy consumption newlinemechanism to improve lifetime of WSN. Sensor nodes energy in the newlinenetwork increases through supply of external energy that is referenced newlinewith energy consumption mechanism. To solve the security problem, newlinethe proposed algorithm detects attacks of various type in routing namely newlineblack hole, sinkhole and wormhole attacks and provides the solution. newlineThe detection mechanism provides the solution through energy newlineconsumption AODV with the MD5 algorithm. newlineA novel, Multi-Layer Security Protocol (MLSP) with energy newlineconsumption AODV (EC-AODV) is recommended to improve data newlineintegrity in the network. The Advanced Encryption Standard (AES) newlinealgorithms works on the above protocol for coding and decoding with newlinetwo major mechanisms. The shortest route using energy consumption as newlinethe neighbour node is achieved in EC-AODV. This technique will newlinevi newlineobtain WSN with a low packet loss. The layer by layer interpretation is newlinebeing done by the MLSP. The main role of the source node is to identify newlinethe easiest approachable path for the primary keys of the intermediate newlinenodes. By using the AES encryption technique, the source node replaces newlinethe secondary nodes in all encrypted areas. The replacement of the data newlinepackets is done by MLSP. The MLSP will exchange the intermediate newlinenodes with the secondary key, where the final nodes are the receiver of newlinethe secured data. From the proposed work, the simulation result of newlineenergy consumption AODV with traditional AODV shows an increase newlineof 6.85 % in throughput, an increase of 70.6 % in node end to end newlinedelay and a decrease of 8.33 % in packet delivery rate.
Pagination: A5, IV, 148
URI: http://hdl.handle.net/10603/444956
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
1.title.pdfAttached File190.55 kBAdobe PDFView/Open
2.certficate.pdf2.69 MBAdobe PDFView/Open
3.abstract.pdf103.9 kBAdobe PDFView/Open
4.contents.pdf140.32 kBAdobe PDFView/Open
5.chapter 1.pdf475.27 kBAdobe PDFView/Open
6.chapter 2.pdf279.74 kBAdobe PDFView/Open
7.chapter 3.pdf581.59 kBAdobe PDFView/Open
80_recommendation.pdf190.55 kBAdobe PDFView/Open
8.chapter 4.pdf763.62 kBAdobe PDFView/Open
9.annextures.pdf6 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: