Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/525818
Title: Protecting wsn from node identity replicas using superimposed sdisjunction code
Researcher: Devi P P
Guide(s): Jaison B
Keywords: Clone Identification
Mobile Sensor Networks
Wireless Sensor Network
University: Anna University
Completed Date: 2023
Abstract: The wireless sensor network is more susceptible to assault, which is newlinemore severe and easier to clone. This method helps to recognize clone attacks, newlinewhich are frequent in wireless sensor networks . It seems that there are both newlinecentralized and decentralized methods for detecting using random key pre newlinedistribution as an example, clones in sensor networks. An instantaneous clone newlineattack and the discovery of assaults on hierarchical nodes using replication. In newline mobile sensor networks , sequential analysis enables quick detection of newlinereplica node attacks, node replication assaults are detected via a protocol, newlinerandom shot, and an efficient and distributed approach for detecting node newlinereplication assaults has been developed. Clone identification in sensor newlinenetworks is performed via compressed sensing. There are many ways to newlineidentify node capture attacks in wireless sensor networks , including newlinedistributed approaches, randomly directed exploration, a random walk method newlinefor detecting clone attacks, and mobility-aided replication detection in newlinemobile wireless sensor networks . newlineA replication or clone attack poses a physical risk in the early newlinephases of research since the attacker might quickly capture a network node newlineand get its data. A node replica has then been created after a reprogram. The newlineduplicated node cannot be located since these copies will subsequently be newlinedispersed over all networking domains and designated as actual networkers. newlineThe WSN may be static or dynamic in situations where centralized clone newlineattack detection techniques can be applied. To determine the most efficient newlinerouting path, this thesis employs the Multitude Bio-Inspired Heuristic newlineCuckoo Search Node Optimization Algorithm (MBHCSNOA). newline
Pagination: xv,121p.
URI: http://hdl.handle.net/10603/525818
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File116.44 kBAdobe PDFView/Open
02_prelim pages.pdf4.24 MBAdobe PDFView/Open
03_contents.pdf418.9 kBAdobe PDFView/Open
04_abstracts.pdf214.1 kBAdobe PDFView/Open
05_chapter1.pdf753.97 kBAdobe PDFView/Open
06_chapter2.pdf440.75 kBAdobe PDFView/Open
07_chapter3.pdf788.4 kBAdobe PDFView/Open
08_chapter4.pdf680.26 kBAdobe PDFView/Open
09_chapter5.pdf799.95 kBAdobe PDFView/Open
10_annexures.pdf160.21 kBAdobe PDFView/Open
80_recommendation.pdf163.51 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: