Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/4915
Title: | Security in Wireless Sensor Network |
Authors: | Dubey, Vipul Kumar |
Keywords: | Computer 2012 Project Report 2012 Computer Project Report Project Report 12MCEI 12MCEI08 INS INS 2012 CE (INS) |
Issue Date: | 1-Jun-2014 |
Publisher: | Institute of Technology |
Series/Report no.: | 12MCEI08; |
Abstract: | Sensor Network history suggests that clustering is one of the most effective technique to increase the performance of deployed wireless sensor networks. But along with the implementation of clustering in WSNs; it is necessary to resolve numerous challenges like secure and e cient data transmission, providing high-level security against vari- ety of security attacks and aggregation of data. It is a challenging task to address all the challenges using a single framework or protocol. However, already few schemes like Sec-Leach, SET-IBS and SET-IBOOS have been proposed to resolve this issue but due to invention of new attacks security has always remained an unresolved issue. . In our research, after rigorous practical and theoretical analysis, we have designed an e cient timestamp-based protocol called SET-DTA to provide defence against in- numerable security attacks in the clustered wireless sensor deployment environments. We have tried to address challenges like communication and computation overhead along with security to increase the performance of the deployed sensors. We have shown the feasibility of SET-DTA protocol with respect to its message size evalu- ation, security performance analysis, number of alive nodes, FND time, LND time and energy consumption analysis. The calculation and simulation results are also provided to carry-out the detailed analysis and discussion of the proposed scheme. |
URI: | http://hdl.handle.net/123456789/4915 |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
12MCEI08.pdf | 12MCEI08 | 1.26 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.