Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/459030
Title: Detection of compromised nodes and Prevention of false data injection in Wireless sensor networks
Researcher: Gayathri Santhosh, M
Guide(s): Yogesh, P
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
compromised nodes
Prevention of false data
Wireless sensor networks
University: Anna University
Completed Date: 2022
Abstract: A wireless sensor network is typically made up of a large number newlineof sensor nodes that are linked together via wireless links to perform newlinedistributed sensing tasks. The process of gathering sensory data from the newlinesensor nodes in the sensing domain at the base station/control room is newlineachieved with the help of multihop routing. The route followed by the multihop newlineis decided by the routing protocol deployed in the nodes of the network. newlineSome of the more powerful nodes may serve as control nodes known as base newlinestations. Sensing nodes are frequently referred to as quotmotes,quot while base newlinestations are sometimes referred to as quotsinks.quot Each sensor node can sense data newlinefrom its surroundings such as temperature, humidity, and pressure, perform newlinesimple computations on the collected data, and send it to the sink via the newlinecommunication links between the intermediate nodes. Control nodes may newlineprocess the data further and, most likely, transfer it to a database server in the newlinecontrol room via a wired connection. newlineApplications of wireless sensor networks (WSNs) range from newlinesmart applications such as traffic monitoring to critical military applications newlinesuch as measuring levels of gas concentration on battlefields. Security in newlineWSNs has become a prime concern. Generally, WSNs are prone to be newlineattacked by adversaries who intend to disrupt the functioning of the system by newlinecompromising the sensor nodes and injecting false data into the network since newlinethey are deployed in unattended environments. newlineInjecting false data attacks is a well-known and serious threat in newlineWSNs. In false data injection attacks, an adversary reports bogus information newlineto the sink that causes errors in decision-making at the sink node/control room newlineand energy wastage in en-route nodes. newline
Pagination: xviii,123p.
URI: http://hdl.handle.net/10603/459030
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File21.86 kBAdobe PDFView/Open
02_prelim pages.pdf831.78 kBAdobe PDFView/Open
03_content.pdf20.12 kBAdobe PDFView/Open
04_abstract.pdf10.1 kBAdobe PDFView/Open
05_chapter 1.pdf58.6 kBAdobe PDFView/Open
06_chapter 2.pdf78.25 kBAdobe PDFView/Open
07_chapter 3.pdf125.9 kBAdobe PDFView/Open
08_chapter 4.pdf355.12 kBAdobe PDFView/Open
09_chapter 5.pdf384.78 kBAdobe PDFView/Open
10_annexures.pdf60.22 kBAdobe PDFView/Open
80_recommendation.pdf71.25 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: