Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/466889
Title: | Soft computing based security methods for the detection and protection of ddos attacks in the wireless sensor networks |
Researcher: | Beslin Pajila, P J |
Guide(s): | Golden Julie, E |
Keywords: | Engineering and Technology Computer Science Computer Science Software Engineering Dos attacks Security Fuzzy |
University: | Anna University |
Completed Date: | 2022 |
Abstract: | Now a days, Wireless Sensor Network(WSN) is consider as one of the most innovative technology. It is used in many applications like Military, monitoring the surrounding, Transportations, Medical applications, Environment Applications like atmosphere, oceans etc. Wireless Sensor Network comprises of thousands of low-cost nodes which is randomly installed in the environment. These sensor nodes are self organized and communicate with each other to gather the information in the environment surrounding them. It gathers information like temperature, pressure, moisture level etc. around them. Some of the characteristics of WSN are easy to use,it has senor nodes with very less energy, good computational power, distributed in nature etc. But still the WSN have issues like more energy consumption, collision, communication overhead and security. The sensor network could be designed either by cluster-based networks or by flat networks. The flat network has issues like increased crash and communication overload, less performance and it utilizes more energy. But in cluster-based networks, the nodes are separated into clusters. And it improves energy consumption, eliminates collision, decreases overhead in communication and increases the performance and lifetime of the network In general, Clustering is used to manage the challenges like load balancing, routing, network lifetime, etc. But Security is also considered as a very big issue in wireless sensor networks.Various attacks that enter the WSN and affect the sensor nodes. newline newline newline Dos attacks newlineSecurity newlineFuzzy newline newline |
Pagination: | xix,143p. |
URI: | http://hdl.handle.net/10603/466889 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.51 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 1.07 MB | Adobe PDF | View/Open | |
03_content.pdf | 107.18 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 188.19 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 356.68 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 367.8 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 772.77 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 689.27 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 819.76 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 124.44 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 110.19 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: