Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/483945
Title: | Detection of compromised nodes and prevention of false data injection in wireless sensor networks |
Researcher: | Gayathri Santhosh M |
Guide(s): | Yogesh P |
Keywords: | Wireless Sensor Network Elliptic Curve Cryptography Message Authentication Code |
University: | Anna University |
Completed Date: | 2022 |
Abstract: | A wireless sensor network is typically made up of a large number newlineof sensor nodes that are linked together via wireless links to perform newlinedistributed sensing tasks. The process of gathering sensory data from the newlinesensor nodes in the sensing domain at the base station/control room is newlineachieved with the help of multihop routing. The route followed by the multihop newlineis decided by the routing protocol deployed in the nodes of the network. newlineSome of the more powerful nodes may serve as control nodes known as base newlinestations. Sensing nodes are frequently referred to as quotmotes,quot while base newlinestations are sometimes referred to as quotsinks.quot Each sensor node can sense data newlinefrom its surroundings such as temperature, humidity, and pressure, perform newlinesimple computations on the collected data, and send it to the sink via the newlinecommunication links between the intermediate nodes. Control nodes may newlineprocess the data further and, most likely, transfer it to a database server in the newlinecontrol room via a wired connection. newlineApplications of wireless sensor networks (WSNs) range from newlinesmart applications such as traffic monitoring to critical military applications newlinesuch as measuring levels of gas concentration on battlefields. Security in newlineWSNs has become a prime concern. Generally, WSNs are prone to be newlineattacked by adversaries who intend to disrupt the functioning of the system by newlinecompromising the sensor nodes and injecting false data into the network since newlinethey are deployed in unattended environments. newline |
Pagination: | xvii,123p. |
URI: | http://hdl.handle.net/10603/483945 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 21.86 kB | Adobe PDF | View/Open |
02_prelimpages.pdf | 831.78 kB | Adobe PDF | View/Open | |
03_contents.pdf | 20.12 kB | Adobe PDF | View/Open | |
04_abstracts.pdf | 10.1 kB | Adobe PDF | View/Open | |
05_chapter1.pdf | 58.6 kB | Adobe PDF | View/Open | |
06_chapter2.pdf | 78.25 kB | Adobe PDF | View/Open | |
07_chapter3.pdf | 125.9 kB | Adobe PDF | View/Open | |
08_chapter4.pdf | 355.12 kB | Adobe PDF | View/Open | |
09_chapter5.pdf | 384.78 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 60.22 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 71.25 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: