Implementation of data confidentiality for providing High Security in Wireless Sensor Network

被引:0
|
作者
Ghormare, Sneha [1 ]
Sahare, Vaishali [1 ]
机构
[1] GH Raisoni Inst Engn & Technol Women, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
关键词
Wireless sensor network; data discovery and dissemination protocol; security etc;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Wireless Sensor Network, the security of data and confidentiality of data is an important aspect. Hence the data cannot be interrupted by the intruder. For updating configuration parameters and distributing management commands, data discovery and dissemination protocol for wireless sensor network is responsible. But, it has drawback is that, some protocols were not designed with security. For this reason, The DiDrip protocol i.e. first secure and distributed data discovery and dissemination protocol is proposed. The main function of this protocol is for authorized multiple network user. So, with the help of different security parameters the system provides a high security to the wireless sensor network. Energy efficient new algorithm is also used because it is difficult to crack
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Wireless Sensor Network Security Visualization
    Karapistoli, Eirini
    Economides, Anastasios A.
    [J]. IV INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS 2012 (ICUMT), 2012, : 850 - 856
  • [32] Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks
    Bista, Rabindra
    Kim, Yong-Ki
    Song, Myoung-Seon
    Chang, Jae-Woo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 67 - 77
  • [33] An Implementation of Secure Data Sensor Transmission in Wireless Sensor Network for Monitoring Environmental Health
    Sudarsono, Amang
    Kristalina, Prima
    Al Rasyid, M. Udin Harun
    Hermawan, Rony
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS AND ITS APPLICATIONS (IC3INA), 2015, : 93 - 98
  • [34] Achieving Data Survivability and Confidentiality in Unattended Wireless Sensor Networks
    Sen, Arpan
    Ghosh, Shrestha
    Basak, Arinjoy
    Puria, Harsh Parsuram
    Ruj, Sushmita
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 239 - 246
  • [35] Optimal Design of Wireless Sensor Network for Providing Qos
    Palaniappan, Sathyaprakash
    Prakasam
    Vaithiyashankar, Jayakumar
    Sayeed, Shohel
    [J]. 2015 INTERNATIONAL CONFERENCE ON SMART SENSORS AND APPLICATION - ICSSA 2015, 2015, : 65 - 70
  • [36] Authenticated and Security Maintance in Wireless Sensor Network by Filtering Injected False Data
    Devi, L.
    Shantharajah, S. P.
    Kumar, A. Nirmal
    [J]. JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2016, 75 (12): : 713 - 719
  • [37] SECURITY AND EFFICIENT DATA DISSEMINATION OVER WIRELESS SENSOR NETWORK WITH RAPTOR CODES
    Liao, Jian-Xin
    Zhang, Lei
    Wang, Jing-Yu
    Liao, Min-Yan
    Qi, Qi
    Xu, Tong
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1596 - 1600
  • [38] Security analysis on wireless sensor network in the data center for energy internet of things
    Xie, Shengjun
    Wang, Xiang
    Shang, Hua
    [J]. International Journal of Safety and Security Engineering, 2020, 10 (03): : 397 - 402
  • [39] Providing trusted data for industrial wireless sensor networks
    Shuyan Yu
    Jinyuan He
    [J]. EURASIP Journal on Wireless Communications and Networking, 2018
  • [40] Providing trusted data for industrial wireless sensor networks
    Yu, Shuyan
    He, Jinyuan
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,