Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/569458
Title: Optimal path selection and security in wireless sensor networks using intelligent techniques
Researcher: Dinesh Kumar P
Guide(s): Valarmathi K
Keywords: Elliptic Curve Cryptography
Fuzzy Logic
Wireless Sensor Networks
University: Anna University
Completed Date: 2024
Abstract: The fundamental objective of the system is to send information newlinebetween nodes in a secure manner while simultaneously improving the newlineefficiency of data delivery by optimizing the route selection process. The newlinenumber of nodes that must be traveled in order to reach this goal must be kept newlineto a minimum. In order to achieve this objective, varieties of methods and newlineapproaches, as well as various algorithms, are used. The transmission of data newlinebetween nodes is ensured to take place in an environment that is secure. This newlinewill ensure that the data packets are sent to their destination without being newlinemodified in any manner or intercepted by unauthorized parties along the newlineroute. Methods based on fuzzy logic are used in order to ascertain which of newlinethe various paths found within the network are really accessible. Fuzzy logic newlinemakes decisions that are more adaptive by taking into consideration a variety newlineof factors and uncertainties. This, in turn, leads to more efficient data routing. newlineThe idea offers an innovative method for the development of trust values that newlineshould be used. Trust is a vital component when it comes in ensuring the newlinereliability and safety of the process of data transfer. Since the system analyzes newlinethe reliability of the intermediary nodes, it is able to make informed decisions newlineon the path that the data will take, as they travel through these nodes. newlineElliptic Curve Cryptography (ECC) and Diffie-Hellman key newlineexchange are the examples of cryptographic methods that are used with the newlinegoal of making the system more secure. These approaches ensure that the data newlineare encrypted and securely transported between nodes as well as they stop newlineunauthorized users from gaining access to the information that is being newlinesafeguarded. A mixture of BAT (Bat Algorithm) and Firefly algorithms is newlineused in the process of route selection in order to get the best possible newlineoutcomes. newline
Pagination: xvi,171p.
URI: http://hdl.handle.net/10603/569458
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File22.67 kBAdobe PDFView/Open
02_prelimpages.pdf1.8 MBAdobe PDFView/Open
03_contents.pdf76.91 kBAdobe PDFView/Open
04_abstracts.pdf10.99 kBAdobe PDFView/Open
05_chapter1.pdf600.48 kBAdobe PDFView/Open
06_chapter2.pdf318.07 kBAdobe PDFView/Open
07_chapter3.pdf1.3 MBAdobe PDFView/Open
08_chapter4.pdf991.91 kBAdobe PDFView/Open
09_chapter5.pdf520.29 kBAdobe PDFView/Open
10_annexures.pdf132.4 kBAdobe PDFView/Open
80_recommendation.pdf86.21 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: