Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/47990
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | en_US | |
dc.date.accessioned | 2015-08-19T05:07:30Z | - |
dc.date.available | 2015-08-19T05:07:30Z | - |
dc.date.issued | 2015-08-19 | - |
dc.identifier.uri | http://hdl.handle.net/10603/47990 | - |
dc.description.abstract | Due to the unmanned nature of Wireless Sensor Networks security becomes a key criterion when it comes to networks dealing with confidential data Compromised node Denial of Service attacks and Black Holes Sink Holes are the three key types of attacks in Sensor Networks Classic routing algorithms use deterministic multipath routing schemes where a predefined path exits between any two nodes Once if the adversary acquires the routing algorithm it is possible to compute the route making all information sent over these routes vulnerable to its attacks A number of approaches have been proposed for secure routing in wireless sensor networks but there is a lack of sufficient support for quick and secure routing in large scale sensor networks Our proposal aims at improving the security in an ad hoc wireless network Our proposal aims at providing an algorithm that encrypts and decrypts information being passed through the network We consider the dynamic address routing for wireless sensor networks We consider two security algorithms namely Rivest Shamir Adleman Elliptic Curve Cryptography as an initial test for dynamic address routing protocol for wireless sensor networks We consider five routing attacks such as Directory attack Brutal attack Wormhole attack Sinkhole attack and Sybil attack against dynamic address routing in wireless sensor networks We propose a common key cryptographic security algorithm named Random Number Addressing Cryptography for providing energy efficient secure dynamic address routing protocol for scalable wireless sensor networks RAC security algorithm works energy efficiently and provides better security than RSA and ECC A refinement for the RAC algorithm is provided by using concealed data aggregation and randomized dispersive routing Our approach involves the use of a dispersive randomized routing combined with secret sharing scheme that circumvents the black holes formed due to these attacks Since energy efficiency is of paramount importance in a Wireless Sensor Network we employ a data aggregation scheme that reduces that need to transfer huge amounts of data to the base stations Also we apply Privacy Homomorphism based encryption scheme to secure the data during the aggregation process Simulations show that our approach is much more effective in terms of security and energy efficiency compared to their deterministic counterparts This can be further made foolproof by using dynamic routing techniques for transmission of packets Our approach involves selecting intermediary nodes for each packet rather than sending the packets directly to the destination node This way the user initially disperses all the packets that are to be transmitted using a modified form of Backpressure algorithm and then directs them to the destination node using SENCAST By following this method most of the packets that are sent through a network have the probability of escaping black holes Simulations show that our approach is much more effective in terms of security when compared to their deterministic counterparts | en_US |
dc.format.extent | en_US | |
dc.language | English | en_US |
dc.relation | en_US | |
dc.rights | university | en_US |
dc.title | Secure packet transmission in wireless sensor networks using dynamic routing techniques | en_US |
dc.title.alternative | en_US | |
dc.creator.researcher | Ravi,G | en_US |
dc.description.note | en_US | |
dc.contributor.guide | Srinivasan,R | en_US |
dc.publisher.place | Chennai | en_US |
dc.publisher.university | Dr. M.G.R. Educational and Research Institute | en_US |
dc.publisher.institution | Department of Computer Applications | en_US |
dc.date.registered | 06/11/2008 | en_US |
dc.date.completed | 19/03/2014 | en_US |
dc.date.awarded | 20/08/2014 | en_US |
dc.format.dimensions | en_US | |
dc.format.accompanyingmaterial | None | en_US |
dc.source.university | University | en_US |
dc.type.degree | Ph.D. | en_US |
Appears in Departments: | Department of Computer Applications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 95.41 kB | Adobe PDF | View/Open |
02_certificate.pdf | 165 kB | Adobe PDF | View/Open | |
03_acknowledgement.pdf | 83.64 kB | Adobe PDF | View/Open | |
04_toc,loc,lof&loa.pdf | 188.28 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 115.19 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 558.86 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 204.13 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 238.13 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 701.34 kB | Adobe PDF | View/Open | |
10_chapte 6.pdf | 338.83 kB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 85.13 kB | Adobe PDF | View/Open | |
12_chapter 8.pdf | 218.68 kB | Adobe PDF | View/Open | |
13_references.pdf | 367.29 kB | Adobe PDF | View/Open | |
14_list of publications.pdf | 146.38 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: