Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/479836
Title: | Secured Routing Protocols for Wireless Sensor Networks |
Researcher: | Shashikala |
Guide(s): | Kavitha, C |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology |
University: | Visvesvaraya Technological University, Belagavi |
Completed Date: | 2016 |
Abstract: | Wireless Sensor Networks (WSNs) are made up of sensor nodes which are spatially newlinedistributed and autonomous. These nodes are used to monitor environmental and physical newlineconditions such as sound, temperature, pressure etc. Currently, WSNs are employed in military newlineestablishments, industrial and consumer applications etc. newlineThe sensor nodes are dependent on limited stored energy for their functioning. Hence, it newlineis important to conserve energy while in operation, so that, the node can operate for a prolonged newlineduration. Also, WSN faces multiple security threats that can disrupt the normal functioning of newlinethe nodes. Currently, the main requirement is to design energy efficient routing protocols for newlineWSN that not only conserve energy, but, provide enough shield against different kinds of newlinesecurity attacks. newlineCurrently, many energy efficient routing protocols have been proposed which provide newlineexcellent energy efficiency in data routing. But, many of these protocols have not been extended newlineto counter security threats. In this thesis, many energy efficient protocols are extended to achieve newlinedual goal of energy efficiency and protection against security threats. newlineA heterogeneous WSN contains different types of nodes which achieve different newlinefunctionalities. It has been shown that, heterogeneous WSNs have significant energy efficiency newlineadvantages compared to homogeneous WSNs. But, proper security mechanisms are still newlineunavailable for heterogeneous WSNs. In this thesis, a novel security mechanism is proposed newlinewhich provides good energy conservation and protection against security threats. newlineAll the proposed protocols have been implemented in Network Simulator 2. The newlinesimulation experiments reveal multiple benefits achieved by the proposed protocols newline |
Pagination: | 99 |
URI: | http://hdl.handle.net/10603/479836 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 3.92 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 426.42 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 3.92 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 347.46 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 298.28 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 644.41 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 945.2 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 667.93 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 413.87 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 833.88 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 181.45 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: