Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/479836
Title: Secured Routing Protocols for Wireless Sensor Networks
Researcher: Shashikala
Guide(s): Kavitha, C
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Visvesvaraya Technological University, Belagavi
Completed Date: 2016
Abstract: Wireless Sensor Networks (WSNs) are made up of sensor nodes which are spatially newlinedistributed and autonomous. These nodes are used to monitor environmental and physical newlineconditions such as sound, temperature, pressure etc. Currently, WSNs are employed in military newlineestablishments, industrial and consumer applications etc. newlineThe sensor nodes are dependent on limited stored energy for their functioning. Hence, it newlineis important to conserve energy while in operation, so that, the node can operate for a prolonged newlineduration. Also, WSN faces multiple security threats that can disrupt the normal functioning of newlinethe nodes. Currently, the main requirement is to design energy efficient routing protocols for newlineWSN that not only conserve energy, but, provide enough shield against different kinds of newlinesecurity attacks. newlineCurrently, many energy efficient routing protocols have been proposed which provide newlineexcellent energy efficiency in data routing. But, many of these protocols have not been extended newlineto counter security threats. In this thesis, many energy efficient protocols are extended to achieve newlinedual goal of energy efficiency and protection against security threats. newlineA heterogeneous WSN contains different types of nodes which achieve different newlinefunctionalities. It has been shown that, heterogeneous WSNs have significant energy efficiency newlineadvantages compared to homogeneous WSNs. But, proper security mechanisms are still newlineunavailable for heterogeneous WSNs. In this thesis, a novel security mechanism is proposed newlinewhich provides good energy conservation and protection against security threats. newlineAll the proposed protocols have been implemented in Network Simulator 2. The newlinesimulation experiments reveal multiple benefits achieved by the proposed protocols newline
Pagination: 99
URI: http://hdl.handle.net/10603/479836
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File3.92 kBAdobe PDFView/Open
02_prelim pages.pdf426.42 kBAdobe PDFView/Open
04_abstract.pdf3.92 kBAdobe PDFView/Open
05_chapter 1.pdf347.46 kBAdobe PDFView/Open
06_chapter 2.pdf298.28 kBAdobe PDFView/Open
07_chapter 3.pdf644.41 kBAdobe PDFView/Open
08_chapter 4.pdf945.2 kBAdobe PDFView/Open
09_chapter 5.pdf667.93 kBAdobe PDFView/Open
10_annexures.pdf413.87 kBAdobe PDFView/Open
11_chapter 6.pdf833.88 kBAdobe PDFView/Open
80_recommendation.pdf181.45 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: