Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks

An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks

of: Adil Bashir, Ajaz Hussain Mir

GRIN Verlag , 2021

ISBN: 9783346443076 , 66 Pages

Format: PDF

Copy protection: DRM

Windows PC,Mac OSX,Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's

Price: 29,99 EUR



More of the content

An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks


 

Master's Thesis from the year 2013 in the subject Computer Science - Internet, New Technologies, grade: 8.12, , course: M. Tech, language: English, abstract: Wireless sensor network (WSN) is an emerging imperious leading technology of the current century that presents great promise for various pioneering applications. The use of sensor networks should keep developing, mainly in the fields of scientific, logistic, healthcare and military applications. Sensor networks interact and collect sensitive data and operate in unattended hostile environments, thus it is imperative to pay attention to the security of wireless sensor networks as they are highly prone to threats. For successful operation of the nodes, it is important to maintain the security and privacy of the transmitted data as well as the data stored at nodes. The different security protocols and models used in the wired and other wireless networks such as ad-hoc networks cannot be used in WSNs because the sensor size poses significant restrictions, mainly in terms of energy autonomy and node lifetime, as the batteries have to be too tiny. Also, the existing security protocols in these constrained networks are not sufficiently energy efficient, which is the real motivation behind this work. In this thesis, a light-weight dynamic security algorithm titled 'An Energy Efficient and Dynamic Security Protocol (EEDSP)' for wireless sensor networks has been proposed and implemented at nodal level. We also implement an existing algorithm and then carry out the performance analysis of both the algorithms in terms of energy consumptions, node lifetime and memory requirements at source and intermediate nodes to verify the improvement in our protocol's results.