ZONE BASED SECURED ENERGY EFFICIENT MECHANISM IN WIRELESS SENSOR NETWORKS FOR EFFICIENT COMMUNICATION

Authors

  • Pankaj Kumar Research Scholar, Department of Electronics Communication & Engineering, LCET, Katani Kalan
  • Ramanjeet Singh Assistant Professor, Department of Electronics Communication & Engineering, LCET, Katani Kalan

DOI:

https://doi.org/10.24297/ijct.v16i4.6218

Keywords:

WSN, Security, RSA, Cluster

Abstract

Wireless sensor network has revolutionized the way computing and software services are delivered to the clients on demand. Wireless sensor network is very important to the mankind. It consist of number of sensor called nodes and a base station. Nodes collect data and send to the base station. There are number of nodes which send data at a time. So, number of problems are occurred. Usually the WSNs are automated, that is they work without the human intervention. In such cases it becomes very crucial that the network must have the capability of self-healing security mechanism to handle with all the types of attacks. Without the use of security mechanism, the data can be altered or hacked by some intruder in the network. The nodes are connected with each other without a wired connection through the base stations, they are highly prone to the hacking attacks. WSNs are used to sense various environmental or other parameters which can be used to predict natural hazards, climatic changes or other types of data analysis. During the periods when the WSN nodes are in working condition, they need secure cryptographic keys for secure propagation of the sensitive information. The present research is focused on the design of energy efficient security mechanism for improved reliability in sensor based environment. The RSA encryption algorithm has used for encryption purposes.

Downloads

Download data is not yet available.

References

[1] D. Bendouda, L. Mokdad and H. Haffaf, "Method For Fault Management With RPL Protocol In WSNs," ELSEVIER, p. 395 – 402 , 2015.
[2] A. Dahane , Berrached Nasr Eddine and L. Abdelhamid, "A Distributed and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks," ELSEVIER, pp. 641-646, 2015.
[3] N. Ntuli and Adnan Abu-Mahfouz, "A Simple Security Architecture for Smart Water Management System," ELSEVIER, p. 1164 – 1169, 2016.
[4] R. Mahidhar and A. Raut, "A Survey On Scheduling Schemes With Security In Wireless Sensor Networks," ELSEVIER, p. 756 – 762, 2016.
[5] N. Shekokar and P. Nandu, "An Enhanced Authentication Mechanism to Secure Re- Programming in WSN," ELSEVIER, pp. 397-406, 2015.
[6] S. Naik and N. Shekokar, "Conservation of energy in wireless sensor network by preventing denial of sleep attack," ELSEVIER, p. 370 – 379, 2015.
[7] P. Amish and V. Vaghela, "Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol," ELSEVIER, p. 700 – 707, 2016.
[8] S. Patil and S. Chaudhari, "DoS attack prevention technique in Wireless Sensor Networks," ELSEVIER, p. 715 – 721, 2016.
[9] S. Mariammal and J.Gayathri, "Ensuring higher security for gathering and economically distributing the data in social wireless sensor," ELSEVIER, p. 408 – 416, 2015 .
[10] C. Baskar, Balasubramaniyan C and Manivannan D, "Establishment of Light Weight Cryptography for Resource Constraint Environment using FPGA," ELSEVIER, p. 165 – 171, 2016.
[11] S. M. Sajjad, S. H. Bouk and M. Yousaf, "Neighbor Node Trust Based Intrusion Detection System for WSN," ELSEVIER, p. 183 – 188, 2015.
[12] S. K. Shankar, A. S. Tomar and G. K. Tak, "Secure Medical Data Transmission by using ECC with Mutual Authentication in WSNs," ELSEVIER, p. 455 – 461, 2015.
[13] S. Uke and R. Thool, "UML Based Modeling for Data Aggregation in Secured Wireless Sensor Network," ELSEVIER, p. 706 – 713, 2016.
[14] J. Wu, K. Ota, . M. Dong and C. Li , "A Hierarchical Security Framework for Defending against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities," IEEE, pp. 1-9, 2015.
[15] T. Park and H. Shi, "Extending the Lifetime of Barrier Coverage by Adding Sensors to a Bottleneck Region," IEEE, pp. 537-342, 2015.
[16] A. Faquih, . P. Kadam and Zia Saquib, "Cryptographic Techniques for Wireless Sensor Networks: A Survey," IEEE, 2015.
[17] Anita Daniel. D and Emalda Roslin. S , "A Review on Existing Security Frameworks with Efficient Energy Preservation Techniques in Wireless Sensor Networks," IEEE, pp. 658-662, 2015.
[18] H. Zhao, . C. Hu, R. Zheng and B. Lv, "Study on the Coverage of Adaptive Wireless Sensor," IEEE, pp. 1312-1317, 2015.

Downloads

Published

2017-06-27

How to Cite

Kumar, P., & Singh, R. (2017). ZONE BASED SECURED ENERGY EFFICIENT MECHANISM IN WIRELESS SENSOR NETWORKS FOR EFFICIENT COMMUNICATION. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 16(4), 6889–6894. https://doi.org/10.24297/ijct.v16i4.6218

Issue

Section

Research Articles