Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/462699
Title: | Design of Energy Efficient and Secure Algorithm for Wireless Environment Using Public Key Encryption |
Researcher: | TEJASHWINI N |
Guide(s): | SHASHIKUMAR D R and SATYANARAYAN REDDY K |
Keywords: | Computer Science Computer Science Interdisciplinary Applications Engineering and Technology |
University: | Visvesvaraya Technological University, Belagavi |
Completed Date: | 2022 |
Abstract: | For a decade, a wide range of use-cases of traditional wireless computing and networking shows that it has almost replaced the majority of the wire-based communication technology-enabled legacy products. Despite significant advancements in wireless networking, which facilitates low cost communication operations with smooth work-flows in many real-life aspects, it has potential design challenges. It has provided researchers a vast opportunity to explore this area and to bring evolutionary measures. However, for many years the efforts are laid into identifying the challenges in different forms of wireless networks such as wireless local area networks (WLAN), Wireless Sensor Networks (WSN), Mobile Adhoc Networks (MANET), etc. However, still, the exploration is active from the research and development view-point. Out of all forms of wireless networks, WSN plays a crucial role in serving different time-critical applications, including healthcare, defense, forest monitoring, etc. It has gained significant attention for the research community owing to its scope of applicability into futuristic Internet-of-Things (IoT) as well as Cyber-Physical Systems. There are various products of WSN reported commercialized from the application viewpoint, but as it enforces radio-frequency communication through a wireless medium, privacy preservation of crucial data being transmitted is becoming a rising concern. Many research archives talked about the essentiality of security in WSN and proposed various solutions to safeguard it from malicious intrusion activities. However, WSN has not received a full-proof security solution that can resist various forms of security threats. |
Pagination: | xi, 107 |
URI: | http://hdl.handle.net/10603/462699 |
Appears in Departments: | Cambridge Institute of Technology KR Puram Bengaluru |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 433.66 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 1.25 MB | Adobe PDF | View/Open | |
03_content.pdf | 293.55 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 6.51 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 576.88 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 892.88 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 633.68 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 974.88 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 769.39 kB | Adobe PDF | View/Open | |
10_reference.pdf | 353.33 kB | Adobe PDF | View/Open | |
11_annexures1.pdf | 113.83 kB | Adobe PDF | View/Open | |
12_annexures2.pdf | 112.77 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 768.21 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: