Energy Efficient Secure Data Transmission in Wireless Sensor Network

被引:0
|
作者
Kuthadi, Venu Madhav [1 ,2 ]
Selvaraj, Rajalakshmi [1 ]
Marwala, Tshilidzi [2 ]
机构
[1] BIUST, Dept Comp Sci, Palapye, Botswana
[2] Univ Johannesburg, Fac Engn & Built Environm, Johannesburg, South Africa
来源
关键词
Base station; Wireless sensor networks; Power efficient adaptive clustering hierarchy; Time differential of arrival; Dijkstra algorithm; PROTOCOL;
D O I
10.1007/978-981-10-5544-7_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor network (WSN) turns out to be a vital innovation identified with systems as well as it is by and large broadly connected and received in the present day control and checking functions. In any case, problems with respect to vitality proficiency create huge worries during the time spent in remote sensor system. For problems concerning vitality, power efficient adaptive clustering hierarchy (PEACH) tradition has been suggested essentially for WSNs so as to criticize vitality use of hubs and expanding life range of the system. The hubs in the remote sensor system structure as a gathering. The most noteworthy vitality hub in the gathering has been chosen as a bunch head. The bunch head determination has a few criteria in choosing: (1) based on the vitality levels of sensors in group (i.e., the hub with higher vitality would be chosen as a bunch head). (2) based on hub degree (total number of hubs associated with it) (i. e., the hub with advanced hub degree would be chosen as a bunch head). The time differential of arrival (TDA) has been proposed for vitality consumption of sensor hubs in the system. TDA decreases the vitality utilization of hubs and expanding the system life duration. The node connectivity algorithm (NCA) has been proposed to discover the availability with neighbor's hub in the remote sensor system. The bunch head confirms the gathering hubs and transfers the confirmation data to server. On the off chance that any noxious hub available in the system, the server would recognize through self-mending key appropriation procedure and the bunch head would shut the hub and toss out the hub from the bunch. The noxious hub assets would be stored into the server. It will make the system more ensured and safe one. To broadcast the parcels from resource to goal, figure the most limited way with the assistance of Dijkstra algorithm. The bundle encodes at source and unscrambled once it gets to the goal by means of Advanced Encryption Standard (AES) encryption calculation.
引用
收藏
页码:275 / 287
页数:13
相关论文
共 50 条
  • [1] Wireless sensor network protocols for secure and energy-efficient data transmission
    Lee, Sang-Eon
    Shin, Sang-Ho
    Park, Geum-Dal
    Yoo, Kee-Young
    SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2008, : 157 - +
  • [2] Secure and Energy Efficient Based Healthcare Data Transmission Wireless Sensor Network
    Sivaranjani, R.
    Kumar, A. V. Senthil
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 327 - 333
  • [3] SEED: Secure and Energy Efficient Data Transmission in Wireless Sensor Networks
    Joshi, Jetendra
    Awasthi, Prakhar
    Mukherjee, Sibeli
    Kumar, Rishabh
    Kurian, Divya Sara
    Deka, Manash Jyoti
    2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2016,
  • [4] An energy efficient and secure data forwarding scheme for wireless body sensor network
    Dinesh Kumar A.
    Smys S.
    International Journal of Networking and Virtual Organisations, 2019, 21 (02) : 163 - 186
  • [5] An Energy Efficient Data Transmission Mechanism for Middleware of Wireless Sensor Network
    Shi, Zhiqiang
    Liu, Jin
    Song, Qiuxia
    Wang, Jin
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 827 - 830
  • [6] A distributed data secure transmission scheme in wireless sensor network
    Liang, Wei
    Huang, Yin
    Xu, Jianbo
    Xie, Songyou
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (04):
  • [7] Energy Efficient, Integrity Preserving and Secure Data Aggregation Technique for Wireless Sensor Network
    Pradhan, Shrijana
    Sharma, Kalpana
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 43 - 52
  • [8] Energy efficient secure communication architecture for wireless sensor network
    Mondal, Satyajit
    Mohanty, Sraban Kumar
    Nandi, Sukumar
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3314 - 3323
  • [9] SECURE ENERGY EFFICIENT ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
    Das, Ayan Kumar
    Chaki, Rituparna
    Dey, Kashi Nath
    FOUNDATIONS OF COMPUTING AND DECISION SCIENCES, 2016, 41 (01) : 3 - 27
  • [10] Secure and Energy-Efficient Image Transmission for Wireless Sensor Networks
    Lee, Sungju
    Jeong, Seohyun
    Chung, Yongwha
    Cho, Hyeonjoong
    Pan, Sung Bum
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 137 - 140