Energy Efficient Secure Data Transmission in Wireless Sensor Network

被引:0
|
作者
Kuthadi, Venu Madhav [1 ,2 ]
Selvaraj, Rajalakshmi [1 ]
Marwala, Tshilidzi [2 ]
机构
[1] BIUST, Dept Comp Sci, Palapye, Botswana
[2] Univ Johannesburg, Fac Engn & Built Environm, Johannesburg, South Africa
来源
关键词
Base station; Wireless sensor networks; Power efficient adaptive clustering hierarchy; Time differential of arrival; Dijkstra algorithm; PROTOCOL;
D O I
10.1007/978-981-10-5544-7_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor network (WSN) turns out to be a vital innovation identified with systems as well as it is by and large broadly connected and received in the present day control and checking functions. In any case, problems with respect to vitality proficiency create huge worries during the time spent in remote sensor system. For problems concerning vitality, power efficient adaptive clustering hierarchy (PEACH) tradition has been suggested essentially for WSNs so as to criticize vitality use of hubs and expanding life range of the system. The hubs in the remote sensor system structure as a gathering. The most noteworthy vitality hub in the gathering has been chosen as a bunch head. The bunch head determination has a few criteria in choosing: (1) based on the vitality levels of sensors in group (i.e., the hub with higher vitality would be chosen as a bunch head). (2) based on hub degree (total number of hubs associated with it) (i. e., the hub with advanced hub degree would be chosen as a bunch head). The time differential of arrival (TDA) has been proposed for vitality consumption of sensor hubs in the system. TDA decreases the vitality utilization of hubs and expanding the system life duration. The node connectivity algorithm (NCA) has been proposed to discover the availability with neighbor's hub in the remote sensor system. The bunch head confirms the gathering hubs and transfers the confirmation data to server. On the off chance that any noxious hub available in the system, the server would recognize through self-mending key appropriation procedure and the bunch head would shut the hub and toss out the hub from the bunch. The noxious hub assets would be stored into the server. It will make the system more ensured and safe one. To broadcast the parcels from resource to goal, figure the most limited way with the assistance of Dijkstra algorithm. The bundle encodes at source and unscrambled once it gets to the goal by means of Advanced Encryption Standard (AES) encryption calculation.
引用
收藏
页码:275 / 287
页数:13
相关论文
共 50 条
  • [31] An Energy-Efficient and Scalable Secure Data Aggregation for Wireless Sensor Networks
    Wang, Taochun
    Qin, Xiaolin
    Liu, Liang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [32] Secure and Efficient Data Transmission for Wireless Sensor Networks by using Optimized Leach Protocol
    Kumar, M. Jogendra
    Kumar, G. V. S. Raj
    Krishna, P. S. R.
    Sai, N. Raghavendra
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 50 - 55
  • [33] A Secure and Efficient Authentication Protocol in Wireless Sensor Network
    Kakali Chatterjee
    Asok De
    Daya Gupta
    Wireless Personal Communications, 2015, 81 : 17 - 37
  • [34] A Secure and Efficient Authentication Protocol in Wireless Sensor Network
    Chatterjee, Kakali
    De, Asok
    Gupta, Daya
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) : 17 - 37
  • [35] An efficient secure tracking scheme in wireless sensor network
    Wang, Jiahao
    Qin, Zhiguang
    Zhao, Yang
    Ma, Xinxin
    Zhang, Fengli
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 419 - +
  • [36] An Energy-Efficient Data Transmission Scheme based on DSC-MIMO for Wireless Sensor Network
    Imam, Syed Akhtar
    Singh, Manish Kumar
    Sachan, Vibhav Kumar
    Choudhary, Amit
    Zaidi, Aijaz Mehdi
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM), 2017, : 309 - 312
  • [37] Energy efficient MAC protocol for delay-sensitive data transmission over wireless sensor network
    Oh, Hyung Rai
    Song, Hwangjun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2012, 12 (09): : 755 - 766
  • [38] An Improved Secure Data Transmission Model Based On Random Walk for Wireless Sensor Network
    Shang, Feng-Jun
    Li, Hui
    INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND MECHANICAL AUTOMATION (ICEEMA 2015), 2015, : 543 - 550
  • [39] Energy Efficiency and Loss of Transmission Data on Wireless Sensor Network with Obstacle
    Wahab, Abdi
    Mustika, Fandi Ali
    Bahaweres, Rizal Broer
    Setiawan, Deny
    Alaydrus, Mudrik
    2016 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2016,
  • [40] Energy Efficient Secure Communication in Wireless Sensor Networks
    Gudivada, Ravi Babu
    Hansdah, R. C.
    PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 311 - 319