Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/525818
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Protecting wsn from node identity replicas using superimposed sdisjunction code | |
dc.date.accessioned | 2023-11-15T11:25:55Z | - |
dc.date.available | 2023-11-15T11:25:55Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/525818 | - |
dc.description.abstract | The wireless sensor network is more susceptible to assault, which is newlinemore severe and easier to clone. This method helps to recognize clone attacks, newlinewhich are frequent in wireless sensor networks . It seems that there are both newlinecentralized and decentralized methods for detecting using random key pre newlinedistribution as an example, clones in sensor networks. An instantaneous clone newlineattack and the discovery of assaults on hierarchical nodes using replication. In newline mobile sensor networks , sequential analysis enables quick detection of newlinereplica node attacks, node replication assaults are detected via a protocol, newlinerandom shot, and an efficient and distributed approach for detecting node newlinereplication assaults has been developed. Clone identification in sensor newlinenetworks is performed via compressed sensing. There are many ways to newlineidentify node capture attacks in wireless sensor networks , including newlinedistributed approaches, randomly directed exploration, a random walk method newlinefor detecting clone attacks, and mobility-aided replication detection in newlinemobile wireless sensor networks . newlineA replication or clone attack poses a physical risk in the early newlinephases of research since the attacker might quickly capture a network node newlineand get its data. A node replica has then been created after a reprogram. The newlineduplicated node cannot be located since these copies will subsequently be newlinedispersed over all networking domains and designated as actual networkers. newlineThe WSN may be static or dynamic in situations where centralized clone newlineattack detection techniques can be applied. To determine the most efficient newlinerouting path, this thesis employs the Multitude Bio-Inspired Heuristic newlineCuckoo Search Node Optimization Algorithm (MBHCSNOA). newline | |
dc.format.extent | xv,121p. | |
dc.language | English | |
dc.relation | p.114-120 | |
dc.rights | university | |
dc.title | Protecting wsn from node identity replicas using superimposed sdisjunction code | |
dc.title.alternative | ||
dc.creator.researcher | Devi P P | |
dc.subject.keyword | Clone Identification | |
dc.subject.keyword | Mobile Sensor Networks | |
dc.subject.keyword | Wireless Sensor Network | |
dc.description.note | ||
dc.contributor.guide | Jaison B | |
dc.publisher.place | Chennai | |
dc.publisher.university | Anna University | |
dc.publisher.institution | Faculty of Information and Communication Engineering | |
dc.date.registered | ||
dc.date.completed | 2023 | |
dc.date.awarded | 2023 | |
dc.format.dimensions | 21cm. | |
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 116.44 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 4.24 MB | Adobe PDF | View/Open | |
03_contents.pdf | 418.9 kB | Adobe PDF | View/Open | |
04_abstracts.pdf | 214.1 kB | Adobe PDF | View/Open | |
05_chapter1.pdf | 753.97 kB | Adobe PDF | View/Open | |
06_chapter2.pdf | 440.75 kB | Adobe PDF | View/Open | |
07_chapter3.pdf | 788.4 kB | Adobe PDF | View/Open | |
08_chapter4.pdf | 680.26 kB | Adobe PDF | View/Open | |
09_chapter5.pdf | 799.95 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 160.21 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 163.51 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: