Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/451130
Title: Design and Development of Resource Allocation and Secured Routing Protocols for Wireless Sensor Network
Researcher: SOWMYASHREE M S
Guide(s): C S Mala
Keywords: Engineering
Engineering and Technology
Engineering Electrical and Electronic
University: Visvesvaraya Technological University, Belagavi
Completed Date: 2022
Abstract: Wireless Sensor Networks (WSNs) have attained international attraction in recent years due to the newlineadvancements in communication, electronics, and information technologies. Due to these advancements, there newlinearose a need to understand the quickly changing physical events in the sensor nodes, which led to the newlinedevelopment of advanced recognition systems. The nodes of the sensor process and monitor data before newlinesending it to the sink via the Radio Frequency (RF) channel. These sensors can be deployed in any newlinechallenging area due to their compactness. This aspect creates attention towards the usage of WSN in newlineobserving and tracing data in remote applications. The WSNs play an important role in applications, newlineconnected with areas where human involvement is relatively harmful. As mentioned by many researchers, the newlineimportant characteristics of the WSNs are resources. Some of the resources are energy, bandwidth, newlinethroughput, packet delivery ratio and delay. These resources are typically required to meet the definite newlineQuality-of-Service (QOS) standards. The improvement in the QOS is achieved by increasing the parameters newlinesuch as energy, bandwidth, throughput, packet delivery ratio , with decreasing the delay parameter. There are newlinemany methods to improve these parameters such as Priority based MAC (PRIMA) and Priority in node newline(PRIN). Considering these methods to improve the above parameters, we have proposed an innovative method newlinecalled Priority based on Residual Power and Energy Harvesting rate (P-RPEH). P-RPEH is implemented in newlineour work and is further discussed in subsequent paragraphs. newlineAs great importance is given to the allocation of resources, equal importance is also given to the newlineadaptation of resources and security. In this regard, the data acquired is communicated via a wireless radio newlineconnection between the nodes. During communication, the nodes may be exposed to several malicious newlineattacks. One such attack is called Black Hole Attack. A sensor node exposed to this attack, modifies the newlinepacket it receives and
Pagination: 
URI: http://hdl.handle.net/10603/451130
Appears in Departments:BMS Institute of Technology

Files in This Item:
File Description SizeFormat 
03_thesis_content.pdfAttached File364.59 kBAdobe PDFView/Open
05_thesis_chapter 1.pdf397.26 kBAdobe PDFView/Open
06_thesis_chapter 2.pdf1.27 MBAdobe PDFView/Open
08_thesis_chapter 4.pdf402.74 kBAdobe PDFView/Open
09_thesis_chapter 5.pdf909.33 kBAdobe PDFView/Open
10_thesis_chapter 6.pdf150.46 kBAdobe PDFView/Open
11_thesis_reference.pdf276.19 kBAdobe PDFView/Open
80_recommendation.pdf241.91 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: