A Problem Evaluation of Algorithm for Secure Node Authentication in Wireless Sensor Network

Authors

  • Kaur J Department of Computer Engineering Punjabi University Patiala (Pb.) Punjab
  • Kahlon N Department of Computer Engineering Punjabi University Patiala (Pb.) Punjab

DOI:

https://doi.org/10.26438/ijcse/v6i8.660666

Keywords:

WSNs, cluster head, authentication, Homomorphic algorithm, energy consumption, LEACH

Abstract

The Wireless sensor is an improved technology for gathering highly sensitive information. Wireless sensor devices are used to gather this information with the help of sensing nodes. These devices are used in various fields but the rapid consumption of energy in wireless network and its usage is still a challenge for researchers. This paper has been designed to provide the security to user credentials as well as private key distribution for the data transmission of secure. We are proposing a new algorithm in this research paper to trim down the consumption of energy as well as to provide security in the network. It will improve the lifespan of the network

References

[1] Geetha D. Devanagavi, N. Nalini .”Trusted Neighbors Based Secured Routing Scheme Using Agents.” Springer transactions on routing algorithm,014-1704-4. 2014.

[2] Monia , Sushma Jain ,Sukhchandan randhava .” An Efficient Trust Management Algorithm in Wireless Sensor Network .”Springer 0287-8_26. 2016

[3] Mukesh Kumar and Kamlesh Dutta.“.A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks.” Springer India . 2009.

[4] Vinod Kumar, Surinder Singh, N.P. Pathak .”Various trusted and reputation models wireless sensor networks.” Springer Science ,1144-4. 2015

[5] Weidong Fang , Chuanlei Zhang , Shi Qing Zhao. “Evaluation system and reputation Beta-based Trust in WSN” 1084-8045 Published by Elsevier Ltd. 2015

[6] X Anita , M.A. Bhagyaveni. “Collaborative Lightweight Trust Management Scheme.” Published in Springer Science ,014-1998-2. 2014

[7] Yun Liu, Qing-An Zeng. “.Improved trust management scheme for secure data aggregation” .Springer publications 015-0078-6. 2015

[8] Yannis Stelios, Sitiris Maniatis, Helen C. Leligoug. “.Routing based Distributed Energy-Aware Trust Management System in Wireless Sensor Networks”. Institute for Computer Sciences and Telecommunication 85-92. 2016

[9] Rong Fan, Ling-Di Ping, Jian-Qing Fu , Xue-Zeng.” Two tired architecture of WSN.” Pan College of Computer Science and Technology Zhejiang University 5626600.2010

[10] Gun-Wook Choi . “paired base key distribution scheme in wireless sensor network.”IEEE publication 10.1109. 2017

[11] Karim ZKIK Ghizlane ORHANOU Said EL HAJJI .” Secure framework using ECC”.10.1109/ICEngTechnol.2017.8308144 .2017

[12] longzhe Han , Xin Song, Yi Buz .” province key laboratory of water information cooperative sensing processing” 330099. 2015

[13] Kamal, L.K. W- LEACH, abdulsalam .” Weighted low energy adaptive clustering hierarchy aggregation algorithm for data stream in WSN”. IEEE 1-8. 2010

[14] Younis, M A, Akkaya. “ A survey on routing protocols for WSNs”. 325-349. 2005

[15] .” A survey on sensor networks.” IEEE communication. 102 - 14.2016

[16] Kamal, A.E. “Routing techniques in wireless sensor networks.” IEEE, 6-28.2012

[17] Maja J Matari c, Andrew Howard and Gaurav S Sukhatme .”Mobile sensor network deployment using potential fields”. DARS02 425-6788.2010

[18] Holliday, J,Ding..”A distributed energy efficient hierarchical clustering for wireless sensor network”. IEEE conference on distributed computing in sensor networks. 322-339. Fan, X.; Song, Y. Improvement on LEACH Protocol of Wireless Sensor Network. In Proceedings of International Conference on Sensor Technologies and Applications, Valencia, Spain, 14–20 October 2007, pp. 260–264. 2015

[19] Fereris , Kowshik,N.M. H Kumar. “Fundamentals of large sensor networks.” IEEE, 98, 1828-1846. 2010

[20] A. bestavros, G. Smaragdakis, I. Matta,.” A stable selection protocol for herogenous wireless sensor network.”1245-1267. 2017

[21] Halpern, Haas, Z,J, Li, L . “Gossip based adhoc routing in WSN.” INFOCOM, New York, pp. 1707-1716. 2016

Downloads

Published

2025-11-15
CITATION
DOI: 10.26438/ijcse/v6i8.660666
Published: 2025-11-15

How to Cite

[1]
J. Kaur and N. Kahlon, “A Problem Evaluation of Algorithm for Secure Node Authentication in Wireless Sensor Network”, Int. J. Comp. Sci. Eng., vol. 6, no. 8, pp. 660–666, Nov. 2025.

Issue

Section

Research Article