Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/569458
Title: | Optimal path selection and security in wireless sensor networks using intelligent techniques |
Researcher: | Dinesh Kumar P |
Guide(s): | Valarmathi K |
Keywords: | Elliptic Curve Cryptography Fuzzy Logic Wireless Sensor Networks |
University: | Anna University |
Completed Date: | 2024 |
Abstract: | The fundamental objective of the system is to send information newlinebetween nodes in a secure manner while simultaneously improving the newlineefficiency of data delivery by optimizing the route selection process. The newlinenumber of nodes that must be traveled in order to reach this goal must be kept newlineto a minimum. In order to achieve this objective, varieties of methods and newlineapproaches, as well as various algorithms, are used. The transmission of data newlinebetween nodes is ensured to take place in an environment that is secure. This newlinewill ensure that the data packets are sent to their destination without being newlinemodified in any manner or intercepted by unauthorized parties along the newlineroute. Methods based on fuzzy logic are used in order to ascertain which of newlinethe various paths found within the network are really accessible. Fuzzy logic newlinemakes decisions that are more adaptive by taking into consideration a variety newlineof factors and uncertainties. This, in turn, leads to more efficient data routing. newlineThe idea offers an innovative method for the development of trust values that newlineshould be used. Trust is a vital component when it comes in ensuring the newlinereliability and safety of the process of data transfer. Since the system analyzes newlinethe reliability of the intermediary nodes, it is able to make informed decisions newlineon the path that the data will take, as they travel through these nodes. newlineElliptic Curve Cryptography (ECC) and Diffie-Hellman key newlineexchange are the examples of cryptographic methods that are used with the newlinegoal of making the system more secure. These approaches ensure that the data newlineare encrypted and securely transported between nodes as well as they stop newlineunauthorized users from gaining access to the information that is being newlinesafeguarded. A mixture of BAT (Bat Algorithm) and Firefly algorithms is newlineused in the process of route selection in order to get the best possible newlineoutcomes. newline |
Pagination: | xvi,171p. |
URI: | http://hdl.handle.net/10603/569458 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 22.67 kB | Adobe PDF | View/Open |
02_prelimpages.pdf | 1.8 MB | Adobe PDF | View/Open | |
03_contents.pdf | 76.91 kB | Adobe PDF | View/Open | |
04_abstracts.pdf | 10.99 kB | Adobe PDF | View/Open | |
05_chapter1.pdf | 600.48 kB | Adobe PDF | View/Open | |
06_chapter2.pdf | 318.07 kB | Adobe PDF | View/Open | |
07_chapter3.pdf | 1.3 MB | Adobe PDF | View/Open | |
08_chapter4.pdf | 991.91 kB | Adobe PDF | View/Open | |
09_chapter5.pdf | 520.29 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 132.4 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 86.21 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: