Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/525818
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialProtecting wsn from node identity replicas using superimposed sdisjunction code
dc.date.accessioned2023-11-15T11:25:55Z-
dc.date.available2023-11-15T11:25:55Z-
dc.identifier.urihttp://hdl.handle.net/10603/525818-
dc.description.abstractThe wireless sensor network is more susceptible to assault, which is newlinemore severe and easier to clone. This method helps to recognize clone attacks, newlinewhich are frequent in wireless sensor networks . It seems that there are both newlinecentralized and decentralized methods for detecting using random key pre newlinedistribution as an example, clones in sensor networks. An instantaneous clone newlineattack and the discovery of assaults on hierarchical nodes using replication. In newline mobile sensor networks , sequential analysis enables quick detection of newlinereplica node attacks, node replication assaults are detected via a protocol, newlinerandom shot, and an efficient and distributed approach for detecting node newlinereplication assaults has been developed. Clone identification in sensor newlinenetworks is performed via compressed sensing. There are many ways to newlineidentify node capture attacks in wireless sensor networks , including newlinedistributed approaches, randomly directed exploration, a random walk method newlinefor detecting clone attacks, and mobility-aided replication detection in newlinemobile wireless sensor networks . newlineA replication or clone attack poses a physical risk in the early newlinephases of research since the attacker might quickly capture a network node newlineand get its data. A node replica has then been created after a reprogram. The newlineduplicated node cannot be located since these copies will subsequently be newlinedispersed over all networking domains and designated as actual networkers. newlineThe WSN may be static or dynamic in situations where centralized clone newlineattack detection techniques can be applied. To determine the most efficient newlinerouting path, this thesis employs the Multitude Bio-Inspired Heuristic newlineCuckoo Search Node Optimization Algorithm (MBHCSNOA). newline
dc.format.extentxv,121p.
dc.languageEnglish
dc.relationp.114-120
dc.rightsuniversity
dc.titleProtecting wsn from node identity replicas using superimposed sdisjunction code
dc.title.alternative
dc.creator.researcherDevi P P
dc.subject.keywordClone Identification
dc.subject.keywordMobile Sensor Networks
dc.subject.keywordWireless Sensor Network
dc.description.note
dc.contributor.guideJaison B
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registered
dc.date.completed2023
dc.date.awarded2023
dc.format.dimensions21cm.
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File116.44 kBAdobe PDFView/Open
02_prelim pages.pdf4.24 MBAdobe PDFView/Open
03_contents.pdf418.9 kBAdobe PDFView/Open
04_abstracts.pdf214.1 kBAdobe PDFView/Open
05_chapter1.pdf753.97 kBAdobe PDFView/Open
06_chapter2.pdf440.75 kBAdobe PDFView/Open
07_chapter3.pdf788.4 kBAdobe PDFView/Open
08_chapter4.pdf680.26 kBAdobe PDFView/Open
09_chapter5.pdf799.95 kBAdobe PDFView/Open
10_annexures.pdf160.21 kBAdobe PDFView/Open
80_recommendation.pdf163.51 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: