Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/525814
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialDesign a framework for identification and confrontation of denial of service attack in wireless sensor network
dc.date.accessioned2023-11-15T11:24:41Z-
dc.date.available2023-11-15T11:24:41Z-
dc.identifier.urihttp://hdl.handle.net/10603/525814-
dc.description.abstractWireless Sensor Networks (WSNs) has tiny sensor nodes to newlinemonitor the surrounding environment. It transmits this aggregated data to the newlinenearby Base Station for further processing. This sensitive data should be newlineprotected against various active and passive attacks. Denial of Service (DoS) newlineis an active attack, which intends to block the service of a network by creating newlineunwanted traffic resulting in draining the resources of the network. Due to newlineresource constraints and limitations, it is difficult for the developers to design newlinesecurity mechanisms for such networks. Though lot of authentication newlineprotocols have been implemented to comprehend this attack, they are not newlinereliable as they have no sufficient provision to predict this attack and protect newlinedata synchronization among participants. newlineTo address the above limitations, in this thesis two novel Elliptical newlineCurve Cryptography (ECC) based authentication protocols are proposed. In newlinethe first protocol, a novel proficient and DoS resisting user authentication newlinemethod is established by incorporating DoS identification and alleviation newlineissues. This protocol has the following phases: (i) User Registration newline(ii) Remedy (iii) Attack prediction and (iv) Reloading. Moreover, this newlinedeveloped approach chiefly considers the attack prediction phase, in which newlineNeural Network (NN) is incorporated to detect DoS attack. As a part of this, newlineNN is optimized by the selection of optimized weights. For training the NN, a newlinenovel enhanced optimization scheme called Fitness Indexed Whale newlineOptimization Algorithm (FI-WOA) model has been introduced. The newlineperformance of the adapted optimization scheme is examined over the newlineexisting techniques using various measures. newline
dc.format.extentxiv,134p.
dc.languageEnglish
dc.relationp.117-133
dc.rightsuniversity
dc.titleDesign a framework for identification and confrontation of denial of service attack in wireless sensor network
dc.title.alternative
dc.creator.researcherSobini X Pushpa
dc.subject.keywordDenial of Service
dc.subject.keywordElliptical Curve Cryptography
dc.subject.keywordWireless Sensor Networks
dc.description.note
dc.contributor.guideKanaga Suba Raja S
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registered
dc.date.completed2023
dc.date.awarded2023
dc.format.dimensions21cm.
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File1.8 MBAdobe PDFView/Open
02_prelim pages.pdf2.49 MBAdobe PDFView/Open
03_contents.pdf86.46 kBAdobe PDFView/Open
04_abstracts.pdf8.23 kBAdobe PDFView/Open
05_chapter1.pdf365.02 kBAdobe PDFView/Open
06_chapter2.pdf199.11 kBAdobe PDFView/Open
07_chapter3.pdf1.12 MBAdobe PDFView/Open
08_chapter4.pdf708.59 kBAdobe PDFView/Open
09_chapter5.pdf33.05 kBAdobe PDFView/Open
10_annexures.pdf135.2 kBAdobe PDFView/Open
80_recommendation.pdf68.35 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: