scispace - formally typeset
Search or ask a question
Author

B E Manjunath

Bio: B E Manjunath is an academic researcher from Jain University. The author has contributed to research in topics: Hash-based message authentication code & Routing protocol. The author has an hindex of 1, co-authored 1 publications receiving 7 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The extensive simulation carried out in a numerical platform called MATLAB depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process in a WSN.
Abstract: An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process

8 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper proposing an authentication mechanism for WSN deployment by combining the features of Elliptic Curve Cryptography (ECC) and Hexagonal numbers and the results are indicating that the proposed approach can perform better than the other approaches.
Abstract: Wireless Sensor Network (WSN) is a spatially distributed network. It contains many numbers of distributed, self-directed, small, battery powered devices called sensor nodes or motes. In recent years the deployment of WSN in various application domains are growing in a rapid pace as with the upcoming boom of Internet of Things (IoT) and Internet of Everything (IoE). However, the effectiveness of the WSN deployment is restricted due to the constrained computation and power source. Hence, many researchers have been proposing new approaches and models to improve the efficiency of the domain specific WSN deployment procedures. Though, many research communities addressing various issues in WSN deployment, still the privacy and security of such networks are susceptible to various network attacks. Thus, it is necessary to practice different models for authentication and privacy preservation in a highly dynamic resource constrained WSN environment to realize the effectiveness and efficiency of the deployment. Hence, this paper addressing an authentication scheme that can reduce energy consumption without compromising on security and privacy. In order to provide a light weight authentication mechanism, this paper proposing an authentication mechanism for WSN deployment by combining the features of Elliptic Curve Cryptography (ECC) and Hexagonal numbers. The feature of ECC is used to reduce the key size and the effectiveness of generating hexagonal numbers is used for minimizing the energy consumption in a resource constrained WSN environment. The results of the proposed approach are evaluated with the different authentication models and the results were indicating that the proposed approach can perform better than the other approaches.

6 citations

Journal ArticleDOI
TL;DR: An efficient protocol is developed in this research that includes grid-based mobile communication network formation, efficient path selection through cluster head selection and data communication and outperforms other existing techniques in terms of packet delivery and use of energy through network lifetime.
Abstract: Wireless Sensor Networks (WSN) includes numerous sensor nodes that are connected to each other through the use of wireless short distance links. The transfer of data between the individual nodes is found to be energy-constrained and the energy-efficient protocol in WSNs is a huge requirement. In addition, the deployment of large numbers of sensor nodes increases the size of the network, which in turn increases the energy consumption rate. An efficient protocol is developed in this research that includes grid-based mobile communication network formation, efficient path selection through cluster head selection and data communication. In addition, multi-stage authentication is implemented to provide security from source node to destination node for the transfer of data. Implementation is performed via NS2-based platform and the result obtained shows that the proposed system outperforms other existing techniques in terms of packet delivery and use of energy through network lifetime.

6 citations

Journal ArticleDOI
TL;DR: A novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN is presented.
Abstract: Security problems in Wireless Sensor Network (WSN) have been researched from more than a decade. There are various security approaches being evolving towards resisting various forms of attack using different methodologies. After reviewing the existing security approaches, it can be concluded that such security approaches are highly attack-specific and doesnt address various associated issues in WSN. It is essential for security approach to be computationally lightweight. Therefore, this paper presents a novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN. The study outcome shows that proposed system is computationally lightweight with good performance on reduced delay and reduced energy consumption. It also exhibits enhanced response time and good data delivery performance to balance the need of security and data forwarding performance in WSN.

3 citations

Journal ArticleDOI
TL;DR: A novel secure communication technique that considers time, energy, and traffic environment as prominent constraints to perform security modeling and shows that the proposed system offers reduced end-to-end delay and highest energy retention as compared to other existing security approaches.
Abstract: Security problems in Wireless Sensor Network (WSN) are still open-end problems. Qualitative evaluation of the existing approaches of security in WSN shows adoption of either complex cryptographic use or attack-specific solution. As WSN is an integral part of upcoming Internet-of-Things (IoT), the attack scenario becomes more complicated owing to the integration of two different forms of networks and so is for the attackers. Therefore, this paper introduces a novel secure communication technique that considers time, energy, and traffic environment as prominent constraints to perform security modeling. The proposed solution designed using analytical methodology has some unique capability to resist any form of illegitimate queries of network participation and yet maintain a superior form of communication service. The simulated outcome shows that the proposed system offers reduced end-to-end delay and highest energy retention as compared to other existing security approaches.

3 citations

Journal ArticleDOI
TL;DR: A Framework for Secure Data Aggregation that hybridizes the public key encryption mechanism in order to obtain a novel key management system that offers highly reduced computational burden, minimal delay, less energy consumption, and higher data transmission perforance in contrast to frequency used encryption schemes in WSN.
Abstract: An effective key management plays a crucial role in imposing a resilient security technique in Wireless Sensor Network (WSN). After reviewing the existing approaches of key management, it is confirmed that existing approachs does not offer good coverage on all potential security breaches in WSN. With WSN being essential part of Internet-of-Things (IoT), the existing approaches of key management can definitely not address such security breaches. Therefore, this paper introduces a Framework for Secure Data Aggregation (FSDA) that hybridizes the public key encryption mechanism in order to obtain a novel key management system. The proposed system does not target any specific attacks but is widely applicable for both internal and external attacks in WSN owing to its design principle. The study outcome exhibits that proposed FSDA offers highly reduced computational burden, minimal delay, less energy consumption, and higher data transmission perforance in contrast to frequency used encryption schemes in WSN.

2 citations