Secured and reliable data transmission on multi-hop wireless sensor network

被引:0
作者
R. J. Kavitha
B. Elizabeth Caroline
机构
[1] University College of Engineering,Department of ECE
[2] Panruti,Department of ECE
[3] (A Constituent College of Anna University Chennai),undefined
[4] I.F.E.T College of Engineering,undefined
来源
Cluster Computing | 2019年 / 22卷
关键词
Security; Malicious nodes; Communication; Shared key; Threshold sharing;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor network constitutes a set of distributed senor nodes with no definite infrastructure for transferring and routing the packet. The effective packet transmission through wireless senor networks is a quite challenging task as the malicious nodes might often lead to packet loss or corruption which should be avoided by the reliable method of packet transmission. Hence the present research focuses on employing a novel method for secured transmission of data packets. By proposing the communication and threshold based cryptographic mechanism (CTCM), the insider attackers present in the cluster nodes can be considered for enhancing the security of the wireless sensor network. The behavior of malicious node is first located by keeping some monitoring nodes in the communication environment. The monitoring nodes will communicate the information on malicious node to as much nodes as possible for secured data transmission. The secret keys are also shared to other set of sensor nodes. This ensures that the data can be accessed by the node only when it possesses the specific shares unless which the nodes are refrained from sharing their secret key as it is considered malicious. The evaluation of the experimental results are performed in MATLAB simulation environment and compared with the existing approaches in terms of various performance metrics. The simulation results have proved that the proposed CTCM mechanism shows higher performance compared to other available methods.
引用
收藏
页码:10915 / 10924
页数:9
相关论文
共 22 条
[1]  
Boujelben M(2011)IKM-an identity based key management scheme for heterogeneous sensor networks J. Commun. 6 185-197
[2]  
Youssef H(2009)Sensor network security: a survey IEEE Commun. Surv. Tutor. 11 52-73
[3]  
Mzid R(2016)Provenance for wireless sensor networks: a survey Data Sci. Eng. 1 189-200
[4]  
Abid M(2015)A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks IEEE Trans. Dependable Secure. Comput. 12 256-269
[5]  
Chen X(2016)Hybrid energy-efficient transmission protocol for heterogeneous wireless sensor networks Circuits Syst. 7 897-660
[6]  
Makki K(2016)Hybrid transmission technique with security in heterogeneous wireless sensor networks Asian J. Inf. Technol. 15 651-526
[7]  
Yen K(2016)Hybrid firefly and identity-based ring signcryption scheme based secure data aggregation for clustered heterogeneous wireless sensor network Transylv. Rev. 24 7-undefined
[8]  
Pissinou N(2007)On the size distribution of Poisson Voronoi cells Phys. A Stat. Mech. Appl. 385 518-undefined
[9]  
Wang C(undefined)undefined undefined undefined undefined-undefined
[10]  
Zheng W(undefined)undefined undefined undefined undefined-undefined