Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/569458
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialOptimal path selection and security in wireless sensor networks using intelligent techniques
dc.date.accessioned2024-06-05T09:05:04Z-
dc.date.available2024-06-05T09:05:04Z-
dc.identifier.urihttp://hdl.handle.net/10603/569458-
dc.description.abstractThe fundamental objective of the system is to send information newlinebetween nodes in a secure manner while simultaneously improving the newlineefficiency of data delivery by optimizing the route selection process. The newlinenumber of nodes that must be traveled in order to reach this goal must be kept newlineto a minimum. In order to achieve this objective, varieties of methods and newlineapproaches, as well as various algorithms, are used. The transmission of data newlinebetween nodes is ensured to take place in an environment that is secure. This newlinewill ensure that the data packets are sent to their destination without being newlinemodified in any manner or intercepted by unauthorized parties along the newlineroute. Methods based on fuzzy logic are used in order to ascertain which of newlinethe various paths found within the network are really accessible. Fuzzy logic newlinemakes decisions that are more adaptive by taking into consideration a variety newlineof factors and uncertainties. This, in turn, leads to more efficient data routing. newlineThe idea offers an innovative method for the development of trust values that newlineshould be used. Trust is a vital component when it comes in ensuring the newlinereliability and safety of the process of data transfer. Since the system analyzes newlinethe reliability of the intermediary nodes, it is able to make informed decisions newlineon the path that the data will take, as they travel through these nodes. newlineElliptic Curve Cryptography (ECC) and Diffie-Hellman key newlineexchange are the examples of cryptographic methods that are used with the newlinegoal of making the system more secure. These approaches ensure that the data newlineare encrypted and securely transported between nodes as well as they stop newlineunauthorized users from gaining access to the information that is being newlinesafeguarded. A mixture of BAT (Bat Algorithm) and Firefly algorithms is newlineused in the process of route selection in order to get the best possible newlineoutcomes. newline
dc.format.extentxvi,171p.
dc.languageEnglish
dc.relationp.161-170
dc.rightsuniversity
dc.titleOptimal path selection and security in wireless sensor networks using intelligent techniques
dc.title.alternative
dc.creator.researcherDinesh Kumar P
dc.subject.keywordElliptic Curve Cryptography
dc.subject.keywordFuzzy Logic
dc.subject.keywordWireless Sensor Networks
dc.description.note
dc.contributor.guideValarmathi K
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registered
dc.date.completed2024
dc.date.awarded2024
dc.format.dimensions21cm.
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File22.67 kBAdobe PDFView/Open
02_prelimpages.pdf1.8 MBAdobe PDFView/Open
03_contents.pdf76.91 kBAdobe PDFView/Open
04_abstracts.pdf10.99 kBAdobe PDFView/Open
05_chapter1.pdf600.48 kBAdobe PDFView/Open
06_chapter2.pdf318.07 kBAdobe PDFView/Open
07_chapter3.pdf1.3 MBAdobe PDFView/Open
08_chapter4.pdf991.91 kBAdobe PDFView/Open
09_chapter5.pdf520.29 kBAdobe PDFView/Open
10_annexures.pdf132.4 kBAdobe PDFView/Open
80_recommendation.pdf86.21 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: