Please use this identifier to cite or link to this item: http://idr.nitk.ac.in/jspui/handle/123456789/17040
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorKulakarni, Muralidhar-
dc.contributor.authorPuneeth, Deepa.-
dc.date.accessioned2022-01-29T13:50:21Z-
dc.date.available2022-01-29T13:50:21Z-
dc.date.issued2021-
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/17040-
dc.description.abstractIn large scale Wireless Sensor Networks (WSNs) the amount of data generated is enormous. Data gathering in an energy e cient way is one of the important phenomenon. The nodes in WSNs are randomly deployed, the data emerging from these nodes are highly correlated either spatially or temporally. The data has to be processed e ciently before it reaches the Base Station (BS) by using an e cient routing algorithm as well as data aggregation methods. The data aggregation scheme should employ simple encoding since the sensor nodes are battery operated. The proposed method discusses about a data aggregation scheme using Compressive Sensing (CS) technique which makes use of correlation among the sensor nodes. Using CS we can preserve the information contained in a signal through linear projections and recover the signal using reconstruction algorithm. Ensuring energy e ciency, data reliability and security is important in WSNs. A combination of variants of the cryptographic secret sharing technique and the disjoint multipath routing scheme is an e ective strategy to address these requirements. While Shamir’s Secret Sharing (SSS) provides the desired reliability and information theoretic security, but it is not energy e cient. Alternatively, Shamir’s Ramp Secret Sharing (SRSS) provides energy e ciency and data reliability, but it is only computationally secure. We argue that both these approaches can su er from a Compromised Node (CN) attack when a minimum number of nodes are compromised, and propose a new scheme, which is energy e cient, provides data reliability, and is secure against a CN attack. Proposed method, which we call Split Hop AES (SHAES) is highly energy e - cient, is independent of the underlying routing scheme and provides Semantic Security, which helps in resisting CN attacks.en_US
dc.language.isoenen_US
dc.publisherNational Institute of Technology Karnataka, Surathkalen_US
dc.subjectDepartment of Electronics and Communication Engineeringen_US
dc.titleData Aggregation and Secured Routing in Wireless Sensor Networksen_US
dc.typeThesisen_US
Appears in Collections:1. Ph.D Theses

Files in This Item:
File Description SizeFormat 
DEEPA PUNEETH thesis.pdf4.2 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.