Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/521450
Title: | An Energy Efficient Secure cluster based Cooperative routing Protocol for Ad hoc Networks in IoT Environment |
Researcher: | Mahapatra, Surya Narayan |
Guide(s): | Singh, Binod Kumar |
Keywords: | Computer Science Computer Science Interdisciplinary Applications Engineering and Technology |
University: | National Institute of Technology Jamshedpur |
Completed Date: | 2023 |
Abstract: | In today s scenario, data transmission is established through the single or multi-hop relay nodes in newlineWireless Ad-Hoc Networks (WANET). Traditional relay node selection techniques undergo newlinecollusion attacks, increased energy consumption, delay, and reduced network lifetime. To cope with newlinethese problems, two secure data transmission techniques are proposed in this thesis. First, we newlineproposed a Quantum Atom Search Optimization coupled with Blockchain aided Data Transmission newline(QASO-BDT) scheme for a relay node selection with security aided data transmission. This approach newlinecomprises three phases such as registration, clustering, and transmission. Initially, in the node newlineregistration phase every sensor node gets registered in the blockchain network through Capillary newlineGateway (CG). Next, in the clustering phase, a cluster head (CH) is selected and an enhanced multiview clustering model is used to cluster the nodes into several clusters. Finally, the multi-hop newlinetransmission phase assists in best relay node selection for multi-hop transmission using QASO, and newlinethe blockchain based transaction is carried out to ensure security in the system. newlineSecondly, underwater wireless adhoc networks (UWAN) face many security issues, like energy hole. newlineEnergy hole will make the network lifetime end up soon. However, most existing underwater newlineresearch has not taken security seriously. In order to prevent security threats, the deployment and newlinemanagement of wireless adhoc networks is usually done by a trusted authority. For these purposes, newlinesecond proposed methodology aims to present a new secure data transmission scheme in UWAN. newlineThe proposed structure is divided into three phases. Initially, the Cluster-Based Tree Routing newlineProtocol is designed for cluster formation, cluster head selection process, and establishment of the newlinerouting process. In the second phase, the Enhanced Dempster Shafer Evidence Theory (EDSET) is newlineused to detect the malicious node and evaluate the trust value for each node by using the fusion rule, newlinewhich is utilized to judge the safety |
Pagination: | 195 |
URI: | http://hdl.handle.net/10603/521450 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 48.04 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 108.72 kB | Adobe PDF | View/Open | |
03_content.pdf | 12.03 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 7.68 kB | Adobe PDF | View/Open | |
05_chapter-1.pdf | 1.31 MB | Adobe PDF | View/Open | |
06_chapter-2.pdf | 1.46 MB | Adobe PDF | View/Open | |
07_chapter-3.pdf | 1.21 MB | Adobe PDF | View/Open | |
08_chapter-4.pdf | 666.23 kB | Adobe PDF | View/Open | |
09_annexures.pdf | 90.05 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 12.58 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: