A Problem Evaluation of Algorithm for Secure Node Authentication in Wireless Sensor Network
DOI:
https://doi.org/10.26438/ijcse/v6i8.660666Keywords:
WSNs, cluster head, authentication, Homomorphic algorithm, energy consumption, LEACHAbstract
The Wireless sensor is an improved technology for gathering highly sensitive information. Wireless sensor devices are used to gather this information with the help of sensing nodes. These devices are used in various fields but the rapid consumption of energy in wireless network and its usage is still a challenge for researchers. This paper has been designed to provide the security to user credentials as well as private key distribution for the data transmission of secure. We are proposing a new algorithm in this research paper to trim down the consumption of energy as well as to provide security in the network. It will improve the lifespan of the network
References
[1] Geetha D. Devanagavi, N. Nalini .”Trusted Neighbors Based Secured Routing Scheme Using Agents.” Springer transactions on routing algorithm,014-1704-4. 2014.
[2] Monia , Sushma Jain ,Sukhchandan randhava .” An Efficient Trust Management Algorithm in Wireless Sensor Network .”Springer 0287-8_26. 2016
[3] Mukesh Kumar and Kamlesh Dutta.“.A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks.” Springer India . 2009.
[4] Vinod Kumar, Surinder Singh, N.P. Pathak .”Various trusted and reputation models wireless sensor networks.” Springer Science ,1144-4. 2015
[5] Weidong Fang , Chuanlei Zhang , Shi Qing Zhao. “Evaluation system and reputation Beta-based Trust in WSN” 1084-8045 Published by Elsevier Ltd. 2015
[6] X Anita , M.A. Bhagyaveni. “Collaborative Lightweight Trust Management Scheme.” Published in Springer Science ,014-1998-2. 2014
[7] Yun Liu, Qing-An Zeng. “.Improved trust management scheme for secure data aggregation” .Springer publications 015-0078-6. 2015
[8] Yannis Stelios, Sitiris Maniatis, Helen C. Leligoug. “.Routing based Distributed Energy-Aware Trust Management System in Wireless Sensor Networks”. Institute for Computer Sciences and Telecommunication 85-92. 2016
[9] Rong Fan, Ling-Di Ping, Jian-Qing Fu , Xue-Zeng.” Two tired architecture of WSN.” Pan College of Computer Science and Technology Zhejiang University 5626600.2010
[10] Gun-Wook Choi . “paired base key distribution scheme in wireless sensor network.”IEEE publication 10.1109. 2017
[11] Karim ZKIK Ghizlane ORHANOU Said EL HAJJI .” Secure framework using ECC”.10.1109/ICEngTechnol.2017.8308144 .2017
[12] longzhe Han , Xin Song, Yi Buz .” province key laboratory of water information cooperative sensing processing” 330099. 2015
[13] Kamal, L.K. W- LEACH, abdulsalam .” Weighted low energy adaptive clustering hierarchy aggregation algorithm for data stream in WSN”. IEEE 1-8. 2010
[14] Younis, M A, Akkaya. “ A survey on routing protocols for WSNs”. 325-349. 2005
[15] .” A survey on sensor networks.” IEEE communication. 102 - 14.2016
[16] Kamal, A.E. “Routing techniques in wireless sensor networks.” IEEE, 6-28.2012
[17] Maja J Matari c, Andrew Howard and Gaurav S Sukhatme .”Mobile sensor network deployment using potential fields”. DARS02 425-6788.2010
[18] Holliday, J,Ding..”A distributed energy efficient hierarchical clustering for wireless sensor network”. IEEE conference on distributed computing in sensor networks. 322-339. Fan, X.; Song, Y. Improvement on LEACH Protocol of Wireless Sensor Network. In Proceedings of International Conference on Sensor Technologies and Applications, Valencia, Spain, 14–20 October 2007, pp. 260–264. 2015
[19] Fereris , Kowshik,N.M. H Kumar. “Fundamentals of large sensor networks.” IEEE, 98, 1828-1846. 2010
[20] A. bestavros, G. Smaragdakis, I. Matta,.” A stable selection protocol for herogenous wireless sensor network.”1245-1267. 2017
[21] Halpern, Haas, Z,J, Li, L . “Gossip based adhoc routing in WSN.” INFOCOM, New York, pp. 1707-1716. 2016
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
