Security using ECC Based on Fuzzy Clustering in Wireless Sensor Networks

被引:2
|
作者
Basith, K. Abdul [1 ]
Shankar, T. N. [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Guntur 522502, Andhra Pradesh, India
关键词
WSN; MANET; Wireless sensor network; high efficiency; genetic algorithm;
D O I
10.22937/IJCSNS.2020.20.11.4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current mechanical advancements in sensors, lowpower microelectronics just as scaling down, and cordless systems administration permitted the plan and spreading of Mobile Adhoc Networks ready to self-governing keeping up a watch on and furthermore controlling settings. Remote Sensor Networks (WSNs) can be portrayed as a self-arranged and furthermore framework parcels much less cordless systems to show physical or natural issues, total of temperature stage, sound, reverberation, pressure, and distraction. A Wireless Sensing Unit Network (WSN) incorporates an enormous amount of sensor hubs. The sensor nodes can speak among themselves the use of radio alerts. A wi-fi sensor node is ready with selecting up and calculating gadgets, radio transceivers and also electricity substances. The sensing unit nodes rely upon battery power. Sensor nodes make use of more power as contrasted to a day-today node. Mobile Impromptu Network (MANET), it is constructed from a diffusion of self-organized and also battery organized cell nodes, is applied notably in endless applications, collectively with navy and additionally non-public industries. Nonetheless, protection is a prime trouble in MANET directing, due to the fact the network is at risk of attacks. This paper introduces the breach detection scheme for establishing the safeguarded route in MANET. The proposed cryptography schema takes much less memory, reduces the time, gives tremendous protection and perfectly suitable for low stamina gadgets like cell nodes. The goal of this task is to provide safety and safety to the Wi-Fi sensing unit place using elliptical exerciser curves cryptography on the facet of genetic set of rules.
引用
收藏
页码:30 / 38
页数:9
相关论文
共 50 条
  • [1] Security in Wireless Sensor Networks using ECC
    Saqib, Najmus
    Iqbal, Ummer
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 270 - 274
  • [2] Clustering using Fuzzy Logic in Wireless sensor Networks
    Singh, Manjeet
    Soni, Surender
    Gaurav
    Kumar, Vicky
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 1669 - 1674
  • [3] Using Fuzzy Logic for Clustering in Wireless Sensor Networks
    Choudhary, Devendra
    Sharma, Iti
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 861 - 866
  • [4] Fuzzy Based Dynamic Clustering in Wireless Sensor Networks
    Arikumar, K. S.
    Natarajan, V.
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 77 - 82
  • [5] Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors
    Portilla, J.
    Otero, A.
    de la Torre, E.
    Riesgo, T.
    Stecklina, O.
    Peter, S.
    Langendoerfer, P.
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2010,
  • [6] Fuzzy logic based unequal clustering for wireless sensor networks
    Logambigai, R.
    Kannan, A.
    [J]. WIRELESS NETWORKS, 2016, 22 (03) : 945 - 957
  • [7] Fuzzy logic based clustering in wireless sensor networks: a survey
    Singh, Ashutosh Kumar
    Purohit, N.
    Varma, S.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS, 2013, 100 (01) : 126 - 141
  • [8] Clustering Algorithm based on Fuzzy Weight for Wireless Sensor Networks
    Gao, Teng
    Song, Jin-Yan
    Ding, Jin-Hua
    Wang, De-Quan
    Si, Zhen-Yuan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MECHATRONICS, ELECTRONIC, INDUSTRIAL AND CONTROL ENGINEERING, 2015, 8 : 1162 - 1166
  • [9] Fuzzy logic based unequal clustering for wireless sensor networks
    R. Logambigai
    A. Kannan
    [J]. Wireless Networks, 2016, 22 : 945 - 957
  • [10] SHORT ECC A Lightweight Security Approach for Wireless Sensor Networks
    Sojka, Anna
    Piotrowski, Krzysztof
    Langendoerfer, Peter
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 304 - 308