Please use this identifier to cite or link to this item:
https://idr.l4.nitk.ac.in/jspui/handle/123456789/17040
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Kulakarni, Muralidhar | - |
dc.contributor.author | Puneeth, Deepa. | - |
dc.date.accessioned | 2022-01-29T13:50:21Z | - |
dc.date.available | 2022-01-29T13:50:21Z | - |
dc.date.issued | 2021 | - |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/17040 | - |
dc.description.abstract | In large scale Wireless Sensor Networks (WSNs) the amount of data generated is enormous. Data gathering in an energy e cient way is one of the important phenomenon. The nodes in WSNs are randomly deployed, the data emerging from these nodes are highly correlated either spatially or temporally. The data has to be processed e ciently before it reaches the Base Station (BS) by using an e cient routing algorithm as well as data aggregation methods. The data aggregation scheme should employ simple encoding since the sensor nodes are battery operated. The proposed method discusses about a data aggregation scheme using Compressive Sensing (CS) technique which makes use of correlation among the sensor nodes. Using CS we can preserve the information contained in a signal through linear projections and recover the signal using reconstruction algorithm. Ensuring energy e ciency, data reliability and security is important in WSNs. A combination of variants of the cryptographic secret sharing technique and the disjoint multipath routing scheme is an e ective strategy to address these requirements. While Shamir’s Secret Sharing (SSS) provides the desired reliability and information theoretic security, but it is not energy e cient. Alternatively, Shamir’s Ramp Secret Sharing (SRSS) provides energy e ciency and data reliability, but it is only computationally secure. We argue that both these approaches can su er from a Compromised Node (CN) attack when a minimum number of nodes are compromised, and propose a new scheme, which is energy e cient, provides data reliability, and is secure against a CN attack. Proposed method, which we call Split Hop AES (SHAES) is highly energy e - cient, is independent of the underlying routing scheme and provides Semantic Security, which helps in resisting CN attacks. | en_US |
dc.language.iso | en | en_US |
dc.publisher | National Institute of Technology Karnataka, Surathkal | en_US |
dc.subject | Department of Electronics and Communication Engineering | en_US |
dc.title | Data Aggregation and Secured Routing in Wireless Sensor Networks | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | 1. Ph.D Theses |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
DEEPA PUNEETH thesis.pdf | 4.2 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.