scispace - formally typeset
Open AccessJournal ArticleDOI

Balancing Trade off between Data Security and Energy Model for Wireless Sensor Network

B E Manjunath, +1 more
- 01 Apr 2018 - 
- Vol. 8, Iss: 2, pp 1048-1055
TLDR
The extensive simulation carried out in a numerical platform called MATLAB depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process in a WSN.
Abstract
An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Light weight authentication protocol for WSN using ECC and hexagonal numbers

TL;DR: This paper proposing an authentication mechanism for WSN deployment by combining the features of Elliptic Curve Cryptography (ECC) and Hexagonal numbers and the results are indicating that the proposed approach can perform better than the other approaches.
Journal ArticleDOI

An Efficient Cluster Head Selection and Routing in Mobile WSN

TL;DR: An efficient protocol is developed in this research that includes grid-based mobile communication network formation, efficient path selection through cluster head selection and data communication and outperforms other existing techniques in terms of packet delivery and use of energy through network lifetime.
Journal ArticleDOI

n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wireless Sensor Network

TL;DR: A novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN is presented.
Journal ArticleDOI

Unique Analytical Modelling of Secure Communication in Wireless Sensor Network to Resist Maximum Threats

TL;DR: A novel secure communication technique that considers time, energy, and traffic environment as prominent constraints to perform security modeling and shows that the proposed system offers reduced end-to-end delay and highest energy retention as compared to other existing security approaches.
Journal ArticleDOI

FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for Enhancing Key Management

TL;DR: A Framework for Secure Data Aggregation that hybridizes the public key encryption mechanism in order to obtain a novel key management system that offers highly reduced computational burden, minimal delay, less energy consumption, and higher data transmission perforance in contrast to frequency used encryption schemes in WSN.
References
More filters
Proceedings ArticleDOI

Energy-efficient communication protocol for wireless microsensor networks

TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.
Journal ArticleDOI

A comprehensive approach to privacy in the cloud-based Internet of Things

TL;DR: This work allows an individual user to enforce all her privacy requirements before any sensitive data is uploaded to the cloud, enables developers of cloud services to integrate privacy functionality already into the development process of cloud Services, and offers users a transparent and adaptable interface for configuring their privacy requirements.
Journal ArticleDOI

Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks

TL;DR: This paper discusses about the current state-of-the-art secure LEACH schemes that are proposed in literature, and categorizes them into cryptographic-based and trust-based solutions and reviews the major development in these two categories.
Journal ArticleDOI

ADLU: a novel anomaly detection and location-attribution algorithm for UWB wireless sensor networks

TL;DR: A novel anomaly-based detection and location-attribution algorithm for cluster-based UWB WSNs, abbreviated as ADLU, has dedicated procedures for secure cluster formation, periodic re-clustering, and efficient cluster member monitoring.
Journal ArticleDOI

A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN

TL;DR: Different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Related Papers (5)