Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/501481
Title: | Robust Early Detection of Attack for Sweeping Inclusive Link with Efficient Path Reassessment Using Credible Nodes to Improve Security in WSN |
Researcher: | C.R.Rathish |
Guide(s): | A.Rajaram |
Keywords: | Engineering Engineering and Technology Engineering Electrical and Electronic |
University: | St. Peter s Institute of Higher Education and Research |
Completed Date: | 2019 |
Abstract: | The proposed Hierarchical Load Balanced Routing Protocol which attains high newlineresidual energy consists of three phases. In first phase, the concept of multipath routing is newlineproposed. It uses load balancing to prevent congestion problems in the network. In newlinesecond phase, the path stability is established based on link cost, link quality, link newlinebandwidth and load balancing. In third phase, the energy residual consumption model is newlineproposed. By simulate on results, the proposed HLMRP achieves better delivery ratio, newlinethroughput, less delay and energy consumption in terms of mobility, time and number of newlinenodes than existing schemes. Sweeping Inclusive Connectivity based Routing Algorithm newlineis introduced the primary goal of which is to hold the sensors operating for as long as newlinepossible. It contains three stages. In first stage, secured multi-hop network is constructed newlinewhich securely forwards the received messages and provides security by using packetabsorb newlineapproach. It provides rapid deployment due to multi-hop which improves the long newlinelife of sensors. In second stage, the algorithm computes the best routing path by analysing newlinethe transmission coverage, shorter hop, transmission delay, connectivity link. Third stage newlineshows the load balancing in minimal time. Sweeping Inclusive routing algorithm selects newlinethe most favourable path so that the fault transmissions are avoided. newlineAn Efficient Enhanced Route Reassessment Algorithm (EERRA) is proposed for newlineroute selection, this identifies the high priority and low priority nodes in the network. newlineHigh priority nodes have high packet delivery ratio and low priority nodes are avoided as newlineit combines with bad-mouthing attack. In case of any low priority nodes during path newlineselection, the algorithm reassesses the path of network. The proposed work constitutes newlinethree phases. In first phase, we monitor for the bad-mouthing attack that interfere in the newlinevii newlinenetwork. In second phase, the algorithm removes the low priority nodes that acts as newlinemalicious and cause congestion in the network. In third phase, EERRA picks the suitable newlinepath by considering the probability of sending and receiving the packets in the network newlineand enables the route selection flexibly and adjusted according to the requirements. newlineRobust Early Malicious Node Filtering Scheme (REMFS) is introduced. It finds newlinethe route between the nodes and ensures the consistent communication between the nodes newlinein the network. The proposed REMFS is used to detect and deplete the attacks made newlineduring message passing in network by discarding the attacked file before passing into the newlinenodes from the source. It consists of three aspects. First is the organization of cluster, that newlinegroup s number of cluster members (CM) and selects cluster head (CH). Second is, the newlinescheme detects the vampire attacks in network. The Notification Message (NM) indicates newlinethe status of nodes, which is used to find the Message Fall Ratio (MFR), and then the newlineREMFS Detection Algorithm is used to detect the malicious nodes. Third aspect is, newlinefiltering the compromised node ID and to implement attack removal mechanisms. newlineCredible Node Selection with Enhanced Protection using Key Authenticate (CNSEP-KA) newlineinvolves monitoring the location of source nodes, identifying difficulties along the path newlineduring data transmission, involvement of attack, etc., this detects the replication attack newlineduring data transmission and by using the proposed scheme best nodes are identified for newlineeffective transmission by removing faulty nodes in the network and distribution of key is newlineperformed from credible nodes to the adjacent nodes for ensuring absence of replication newlineattack in the network. Hence, in this scheme, every node in network must confirm newlineadjacent location of another node with help of message authentication code computed on newlinerelative public key using keys acquired from encrypted beacons transmitted by anchor newlinenodes before initiating pair wise key between two nodes. newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/501481 |
Appears in Departments: | Department of Electronics and Communication |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
80_recommendation.pdf | Attached File | 22.7 MB | Adobe PDF | View/Open |
mr.c.r.rathish thesis.pdf | 22.7 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: