Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/618
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | SINGH, TEJPAL | - |
dc.date.accessioned | 2010-12-24T05:38:27Z | - |
dc.date.available | 2010-12-24T05:38:27Z | - |
dc.date.issued | 2010-08-05 | - |
dc.identifier.uri | http://dspace.dtu.ac.in:8080/jspui/handle/repository/618 | - |
dc.description | ME THESIS | en_US |
dc.description.abstract | This work aims to contribute to the Study of the security conditions and robustness criteria of routing protocols for WSN. This Must Be Performed study from a systemic model of Assessment and from an experimental comparison of protocols, based upon a simulation plat-form to enable Which Will Assess Their operation in closed-to-real operating conditions. The simulation platform will be equipped with the needed tools and components, in order to enable experimental evaluation of secure and intrusion tolerant protocol. These protocols combine mechanisms and defensive counter-measure against attacks on communications, inspired by the Dolev-Yao adversary model. They include Also Mechanisms to prevent specific routing attacks, which can be triggered from the injection or from the replication of misbehaviour of operation, nodes in that have been subjected to intrusion attacks. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | TD687;50 | - |
dc.subject | Protocols | en_US |
dc.subject | Data Routing | en_US |
dc.subject | Wireless | en_US |
dc.subject | Sensor Networks | en_US |
dc.title | EVALUATION OF SECURITY CONDITIONS OF PROTOCOLS FOR DATA ROUTING IN WIRELESS SENSOR NETWORKS | en_US |
Appears in Collections: | M.E./M.Tech. Computer Technology & Applications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
tejpal+thesis.doc | 659.5 kB | Microsoft Word | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.