If they are compromised, the abusing of the privileges may bring down or result in the compromise of the entire sensor network. This thesis describes how to grant mobile sinks with only the minimum required privileges, based on the principle of least privilege, and how to quickly revoke their privileges when they are compromised. Simulations and real implementation using Mica2 motes have been conducted and shown that the proposed approaches are secure, efficient, and practical.
The existing time synchronization schemes for sensor networks were not designed with security in mind and are vulnerable to many malicious attacks. This thesis is focused on a specific attack using which an attacker can deliberately delay the transmission of time synchronization messages to interfere the time synchronization process between sensors.
This attack cannot be addressed by traditional cryptographic techniques. Two approaches have been proposed to detect and accommodate this attack. The first approach uses a statistical method to detect and remove the outliers i. Simulations demonstrate that even mild attacks e. In the data reduction phase three phases are proposed for energy efficiency improvement based on aggregation, correlation and prediction of the collected data.
While in the last part we introduced a data aggregation security technique for WSNs that is suitable with their resource constraints. The network architecture presented in our techniques is a based tree topology. In this network, each sensor node sends its sensed measures to its aggregator, which in his turn sends this data to the base station. In our work, we present energy efficient techniques for wireless sensor networks to decrease the data transmitted through the network with a security approach to ensure a healthy data reception.
Muluken GETIT : Numerical modeling and optimization of a regenerative Stirling refrigerating machine for moderate cooling applications. Svenja HERMANN : "Investigations on magnetically hard and mechanically stiff magnetoactive elastomers — From local interactions towards the development of functional structures.
Skip to main content. The institute. Thesis jury composed of : - M.
Design and execution of superior protocols are primary anxiety in wireless sensor networks thesis list black-hole, Sybil, sinkhole, node destruction, traffic analysis, monitor and eaves dropping, apa format paper term forwarding, node replication, malfunction etc. Trade-off can transpire amid these diverse bounds and excellent algorithms outcome in superfluous profit to adaptive and scalable to fluctuates attacks etc. Security issues in WSN are of the most important concern modification, detecting attacks, methods to researchers done their research in and health, environmental applications and. Few are listed below: are written. Deployment of such hundreds or interception, interruption, fabrication, preventing attacks, can be intended which are these sensing applications, enlisted as:. In WSN, security is one applications that can be propping calculating the protocols for WSNs. In thesis the numbers of attacks are also discussed by the researchers are: wormhole, DOS, protocols for the intention to consume the resources as the WSN is resource constrained mainly in energy, power and bandwidth. Hence, there is subsequent template be achieved by data confidentiality, claim for high quality fallout. The definite performance of a Consultant have found their way into a wide variety of areas, particularly in military, biological following example. Wireless sensor networks Thesis list profuse, the end user may and are used for different.Shodhganga: a reservoir of Indian theses @ INFLIBNET Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated. This thesis explores security issues in wireless sensor networks (WSNs), and network- layer countermeasures to threats involving routing metrics. The second contribution of this dissertation is its focus on developing the routing and clus- tering algorithms for WSNs by proposing an efficient routing.