Balancing Trade off between Data Security and Energy Model for Wireless Sensor Network
B E Manjunath,P. V. Rao +1 more
TLDR
The extensive simulation carried out in a numerical platform called MATLAB depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process in a WSN.Abstract:
An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation processread more
Citations
More filters
Journal ArticleDOI
Light weight authentication protocol for WSN using ECC and hexagonal numbers
Noel Toy,Senthilnathan T +1 more
TL;DR: This paper proposing an authentication mechanism for WSN deployment by combining the features of Elliptic Curve Cryptography (ECC) and Hexagonal numbers and the results are indicating that the proposed approach can perform better than the other approaches.
Journal ArticleDOI
An Efficient Cluster Head Selection and Routing in Mobile WSN
Manikanthan S.V,Padmapriya T +1 more
TL;DR: An efficient protocol is developed in this research that includes grid-based mobile communication network formation, efficient path selection through cluster head selection and data communication and outperforms other existing techniques in terms of packet delivery and use of energy through network lifetime.
Journal ArticleDOI
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wireless Sensor Network
TL;DR: A novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN is presented.
Journal ArticleDOI
Unique Analytical Modelling of Secure Communication in Wireless Sensor Network to Resist Maximum Threats
Manjunath B. E,P.V. Rao +1 more
TL;DR: A novel secure communication technique that considers time, energy, and traffic environment as prominent constraints to perform security modeling and shows that the proposed system offers reduced end-to-end delay and highest energy retention as compared to other existing security approaches.
Journal ArticleDOI
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for Enhancing Key Management
TL;DR: A Framework for Secure Data Aggregation that hybridizes the public key encryption mechanism in order to obtain a novel key management system that offers highly reduced computational burden, minimal delay, less energy consumption, and higher data transmission perforance in contrast to frequency used encryption schemes in WSN.
References
More filters
Proceedings ArticleDOI
Energy-efficient communication protocol for wireless microsensor networks
TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.
Journal ArticleDOI
A comprehensive approach to privacy in the cloud-based Internet of Things
TL;DR: This work allows an individual user to enforce all her privacy requirements before any sensitive data is uploaded to the cloud, enables developers of cloud services to integrate privacy functionality already into the development process of cloud Services, and offers users a transparent and adaptable interface for configuring their privacy requirements.
Journal ArticleDOI
Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks
TL;DR: This paper discusses about the current state-of-the-art secure LEACH schemes that are proposed in literature, and categorizes them into cryptographic-based and trust-based solutions and reviews the major development in these two categories.
Journal ArticleDOI
ADLU: a novel anomaly detection and location-attribution algorithm for UWB wireless sensor networks
TL;DR: A novel anomaly-based detection and location-attribution algorithm for cluster-based UWB WSNs, abbreviated as ADLU, has dedicated procedures for secure cluster formation, periodic re-clustering, and efficient cluster member monitoring.
Journal ArticleDOI
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN
Pooja Singh,R. K. Chauhan +1 more
TL;DR: Different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Related Papers (5)
Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks
Secure Hierarchical Routing Protocol (SHRP) for Wireless Sensor Network
Sohini Roy,Ayan Kumar Das +1 more