Add abstract
Want to add your dissertation abstract to this database? It only takes a minute!
Search abstract
Search for abstracts by subject, author or institution
Want to add your dissertation abstract to this database? It only takes a minute!
Search for abstracts by subject, author or institution
Secure data aggregation and forwarding in wireless sensornetworks;
by M K Sandhya
Institution: | Anna University |
---|---|
Year: | 2015 |
Keywords: | Data aggregation; Denial of Service; Wireless sensor networks |
Posted: | 02/05/2017 |
Record ID: | 2129943 |
Full text PDF: | http://shodhganga.inflibnet.ac.in/handle/10603/49404 |
Wireless sensor networks WSNs consist of numerous low power sensor nodes with limited computing ability and storage capacity These sensor nodes sense events from the target field and transmit them to an external base station Data aggregation is carried out at the intermediate sensor nodes known as the aggregator nodes to summarize the redundant data and transmit the aggregated data to the base station Data aggregation significantly reduces the communication overhead and also results in better utilization of battery power Compromised sensor nodes can launch various attacks like false data injection Sybil attacks Denial of Service DoS attacks etc in WSNs The injection of false data disrupts the accuracy of the aggregated data and poses a serious threat to data integrity Moreover the transmission of false data to the base station depletes battery power unnecessarily leading to reduced network lifetime Hence false data elimination during data aggregation and forwarding is essential for providing security and effective utilization of battery power The security mechanisms developed for WSNs must take into consideration the resource and energy constraints of the sensor nodes newlineThis dissertation addresses the security issues pertaining to data aggregation and forwarding in WSNs Various schemes are proposed to provide secure data aggregation by eliminating the injected false data and to ensure confidential data transmission to the base station newline newline reference p151-161. Advisors/Committee Members: Murugan K.
Want to add your dissertation abstract to this database? It only takes a minute!
Search for abstracts by subject, author or institution
Prediction of Upper Body Power of Cross-Country Sk...
|
|
Bitcoins
Mining, Transaction, Security Challenges and Futur...
|
|
Applying User-Centered Interface Design Methods to...
|
|
Head-Order Techniques and Other Pragmatics of Lamb...
|
|
Visualization of Interface Metaphor for Software
An Engineering Approach
|
|
Indoor Wireless Metering Networks
A Collection of Algorithms Enabling Low Power/Low ...
|
|
Automated Generation of Geometrically-Precise and ...
|
|
A Study on the Tone-Reservation Technique for Peak...
|
|