An Efficient users Authentication and Secure Data Transmission of Cluster based Wireless Sensor Network
International Journal of Computer Science and Engineering |
© 2018 by SSRG - IJCSE Journal |
Volume 5 Issue 1 |
Year of Publication : 2018 |
Authors : Korada Kishore Kumar, Konni Srinivasa Rao |
How to Cite?
Korada Kishore Kumar, Konni Srinivasa Rao, "An Efficient users Authentication and Secure Data Transmission of Cluster based Wireless Sensor Network," SSRG International Journal of Computer Science and Engineering , vol. 5, no. 1, pp. 1-5, 2018. Crossref, https://doi.org/10.14445/23488387/IJCSE-V5I1P101
Abstract:
The main goal of wireless sensor network is to transfer data in a secure manner. So that in the wireless sensor sharing of information from source node destination node in securely. By transferring information in securely by implementing cryptography techniques. To transfer data from source node to destination by using routing. In the generation of routing we are face the problem of time complexity for finding distance between source node to destination node. By overcome that problem we can implementing clustering on nodes in a wireless sensor network. In this paper we are implementing mainly three concepts for authentication of users, clustering of nodes in network, encryption and decryption of transferred message. By performing authentication process we are implementing polynomial key xor based signature algorithm. After completion of authentication process the server will performing clustering of nodes in network. By performing clustering process the server will use nodes distance clustering algorithm. Take those clustering nodes data and find out destination nodes for transferring information. Before transferring information from source node to destination node we are using binary sequence message integrity protocol. By implementing those concepts we can improve routing process and also provide more security of transferring data through wireless sensor network.
Keywords:
Cryptography techniques, hash function, security, encryption and decryption Signature, clustering process.
References:
[1] “21 ideas for the 21st century”, Business Week, Aug. 30 1999, pp. 78-167.
[2] S.K. Singh, M.P. Singh, and D.K. Singh, “A survey of Energy-Efficient Hierarchical Cluster-based Routing in Wireless Sensor Networks”, International Journal of Advanced Networking and Application (IJANA), Sept.–Oct. 2010, vol. 02, issue 02, pp. 570–580.
[3] S.K. Singh, M.P. Singh, and D.K. Singh, "Energy-efficient Homogeneous Clustering Algorithm for Wireless Sensor Network", International Journal of Wireless & Mobile Networks (IJWMN), Aug. 2010, vol. 2, no. 3, pp. 49-61.
[4] Jun Zheng and Abbas Jamalipour, “Wireless Sensor Networks: A Networking Perspective”, a book published by A John & Sons, Inc, and IEEEE, 2009.
[5] Ying Liao, Huan Qi, and Weiqun Li “Load-Balanced Clustering Algorithm With Distributed Self-Organization for Wireless Sensor Networks” IEEE SENSORS JOURNAL, VOL. 13, NO. 5, MAY 2013.
[6] I. Bekmezci and F. Alagöz, “Energy efficient, delay sensitive, fault tolerant wireless sensor network for military monitoring,” Int. J. Distrib. Sensors Netw., vol. 5, no. 6, pp. 729–747, 2009.
[7] M. Younis, K. Akkaya, "Strategies and techniques for node placement in wireless sensor networks: A survey", Ad Hoc Networks 6 (4), pp.621-655, 2008.
[8] R. Mulligan, H.M. Ammari, "Coverage in Wireless Sensor Networks: A Survey", Network Protocols and Algorithms, ISSN 1943-3581, 2010.
[9] J. Hill, M. Horton, R. Kling, L. Krishnamurthy, ―The platforms enabling wireless sensor networks, Communications of the ACM, pp. 41 – 46, 2004. [
10] Xuxun Liu, ―A Survey on Clustering Routing Protocols in Wireless Sensor Networks, Sensors, 2012.
[11]. Y. Wang, X. Wang, B. Xie, D. Wang, and D.P. Agrawal, “Intrusion Detection in Homogeneous and eterogeneous Wireless Sensor Networks,” IEEE Trans. Mobile Computing, vol. 7, no. 6, pp. 698-711, June 2008.
[12] Y. Wang, F. Li, and F. Fang, “Poisson versus Gaussian Distribution for Object Tracking in Wireless Sensor Networks,” Proc. Second Int’l Workshop Intelligent Systems and Applications (ISA), pp. 1-4, 2010.
[13]. L. Lazos, R. Poovendran and J. Ritcey, “Analytic Evaluation of Target Detection in Heterogeneous Wireless Sensor Networks,” ACM Trans. Sensor Networks, vol. 5, no. 2, article 18, 2009.
[14] P. Medagliani, J. Leguay, V. Gay, M. Lopez-Ramos, and G. Ferrari, “Engineering Energy-Efficient Target Detection Applications in Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Pervasive Computing and Comm. (PerCom), pp. 31-39, 2010.
[15] Y. Wang, Y. Leow, and J. Yin, “A Novel Sine-Curve Mobility Model for Intrusion Detection in Wireless Sensor Networks,” Wireless Comm. and Mobile Computing, 2011.
[16] Y. Wang, Y.K. Leow, and J. Yin, “Is Straight-Line Path Always the Best for Intrusion Detection in Wireless Sensor Networks,” Proc. Int’l Conf. Parallel and Distributed Systems, pp. 564-571, 2009.