Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/521450
Title: An Energy Efficient Secure cluster based Cooperative routing Protocol for Ad hoc Networks in IoT Environment
Researcher: Mahapatra, Surya Narayan
Guide(s): Singh, Binod Kumar
Keywords: Computer Science
Computer Science Interdisciplinary Applications
Engineering and Technology
University: National Institute of Technology Jamshedpur
Completed Date: 2023
Abstract: In today s scenario, data transmission is established through the single or multi-hop relay nodes in newlineWireless Ad-Hoc Networks (WANET). Traditional relay node selection techniques undergo newlinecollusion attacks, increased energy consumption, delay, and reduced network lifetime. To cope with newlinethese problems, two secure data transmission techniques are proposed in this thesis. First, we newlineproposed a Quantum Atom Search Optimization coupled with Blockchain aided Data Transmission newline(QASO-BDT) scheme for a relay node selection with security aided data transmission. This approach newlinecomprises three phases such as registration, clustering, and transmission. Initially, in the node newlineregistration phase every sensor node gets registered in the blockchain network through Capillary newlineGateway (CG). Next, in the clustering phase, a cluster head (CH) is selected and an enhanced multiview clustering model is used to cluster the nodes into several clusters. Finally, the multi-hop newlinetransmission phase assists in best relay node selection for multi-hop transmission using QASO, and newlinethe blockchain based transaction is carried out to ensure security in the system. newlineSecondly, underwater wireless adhoc networks (UWAN) face many security issues, like energy hole. newlineEnergy hole will make the network lifetime end up soon. However, most existing underwater newlineresearch has not taken security seriously. In order to prevent security threats, the deployment and newlinemanagement of wireless adhoc networks is usually done by a trusted authority. For these purposes, newlinesecond proposed methodology aims to present a new secure data transmission scheme in UWAN. newlineThe proposed structure is divided into three phases. Initially, the Cluster-Based Tree Routing newlineProtocol is designed for cluster formation, cluster head selection process, and establishment of the newlinerouting process. In the second phase, the Enhanced Dempster Shafer Evidence Theory (EDSET) is newlineused to detect the malicious node and evaluate the trust value for each node by using the fusion rule, newlinewhich is utilized to judge the safety
Pagination: 195
URI: http://hdl.handle.net/10603/521450
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File48.04 kBAdobe PDFView/Open
02_prelim pages.pdf108.72 kBAdobe PDFView/Open
03_content.pdf12.03 kBAdobe PDFView/Open
04_abstract.pdf7.68 kBAdobe PDFView/Open
05_chapter-1.pdf1.31 MBAdobe PDFView/Open
06_chapter-2.pdf1.46 MBAdobe PDFView/Open
07_chapter-3.pdf1.21 MBAdobe PDFView/Open
08_chapter-4.pdf666.23 kBAdobe PDFView/Open
09_annexures.pdf90.05 kBAdobe PDFView/Open
80_recommendation.pdf12.58 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: