Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/459030
Title: | Detection of compromised nodes and Prevention of false data injection in Wireless sensor networks |
Researcher: | Gayathri Santhosh, M |
Guide(s): | Yogesh, P |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems compromised nodes Prevention of false data Wireless sensor networks |
University: | Anna University |
Completed Date: | 2022 |
Abstract: | A wireless sensor network is typically made up of a large number newlineof sensor nodes that are linked together via wireless links to perform newlinedistributed sensing tasks. The process of gathering sensory data from the newlinesensor nodes in the sensing domain at the base station/control room is newlineachieved with the help of multihop routing. The route followed by the multihop newlineis decided by the routing protocol deployed in the nodes of the network. newlineSome of the more powerful nodes may serve as control nodes known as base newlinestations. Sensing nodes are frequently referred to as quotmotes,quot while base newlinestations are sometimes referred to as quotsinks.quot Each sensor node can sense data newlinefrom its surroundings such as temperature, humidity, and pressure, perform newlinesimple computations on the collected data, and send it to the sink via the newlinecommunication links between the intermediate nodes. Control nodes may newlineprocess the data further and, most likely, transfer it to a database server in the newlinecontrol room via a wired connection. newlineApplications of wireless sensor networks (WSNs) range from newlinesmart applications such as traffic monitoring to critical military applications newlinesuch as measuring levels of gas concentration on battlefields. Security in newlineWSNs has become a prime concern. Generally, WSNs are prone to be newlineattacked by adversaries who intend to disrupt the functioning of the system by newlinecompromising the sensor nodes and injecting false data into the network since newlinethey are deployed in unattended environments. newlineInjecting false data attacks is a well-known and serious threat in newlineWSNs. In false data injection attacks, an adversary reports bogus information newlineto the sink that causes errors in decision-making at the sink node/control room newlineand energy wastage in en-route nodes. newline |
Pagination: | xviii,123p. |
URI: | http://hdl.handle.net/10603/459030 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 21.86 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 831.78 kB | Adobe PDF | View/Open | |
03_content.pdf | 20.12 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 10.1 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 58.6 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 78.25 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 125.9 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 355.12 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 384.78 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 60.22 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 71.25 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: