Advertisement

Energy Efficient Secure Data Transmission in Wireless Sensor Network

  • Venu Madhav KuthadiEmail author
  • Rajalakshmi Selvaraj
  • Tshilidzi Marwala
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 77)

Abstract

Wireless sensor network (WSN) turns out to be a vital innovation identified with systems as well as it is by and large broadly connected and received in the present day control and checking functions. In any case, problems with respect to vitality proficiency create huge worries during the time spent in remote sensor system. For problems concerning vitality, power efficient adaptive clustering hierarchy (PEACH) tradition has been suggested essentially for WSNs so as to criticize vitality use of hubs and expanding life range of the system. The hubs in the remote sensor system structure as a gathering. The most noteworthy vitality hub in the gathering has been chosen as a bunch head. The bunch head determination has a few criteria in choosing: (1) based on the vitality levels of sensors in group (i.e., the hub with higher vitality would be chosen as a bunch head). (2) based on hub degree (total number of hubs associated with it) (i.e., the hub with advanced hub degree would be chosen as a bunch head). The time differential of arrival (TDA) has been proposed for vitality consumption of sensor hubs in the system. TDA decreases the vitality utilization of hubs and expanding the system life duration. The node connectivity algorithm (NCA) has been proposed to discover the availability with neighbor’s hub in the remote sensor system. The bunch head confirms the gathering hubs and transfers the confirmation data to server. On the off chance that any noxious hub available in the system, the server would recognize through self-mending key appropriation procedure and the bunch head would shut the hub and toss out the hub from the bunch. The noxious hub assets would be stored into the server. It will make the system more ensured and safe one. To broadcast the parcels from resource to goal, figure the most limited way with the assistance of Dijkstra algorithm. The bundle encodes at source and unscrambled once it gets to the goal by means of Advanced Encryption Standard (AES) encryption calculation.

Keywords

Base station Wireless sensor networks Power efficient adaptive clustering hierarchy Time differential of arrival Dijkstra algorithm 

References

  1. 1.
    Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Dai, S., Jing, X., Li, L.: Research and analysis on routing protocols for wireless sensor networks. In: International Conference on Communications, Circuits and Systems, vol. 1, pp. 407–411 (2005)Google Scholar
  3. 3.
    Kuthadi, V.M., Rajendra, C., Selvaraj, R.: A study of security challenges in wireless sensor networks. JATIT 20(1), 39–44 (2010)Google Scholar
  4. 4.
    Culler, D.E., Hong, E.: Wireless sensor networks. Commun. ACM 47(6), 30–37 (2007)CrossRefGoogle Scholar
  5. 5.
    Kim, S.C., Jeon, J.H., Park, H.J.: Energy Efficient Data transmission Mechanism in Wireless Sensor Networks, Lecture Notes in Electrical Engineering, vol. 235, pp. 845–852. Springer, Berlin (2013)Google Scholar
  6. 6.
    Bok, K., Lee, Y., Park, J., Yoo, J.: An energy-efficient secure scheme in wireless sensor networks. J. Sens. 16, 1–11 (2016)CrossRefGoogle Scholar
  7. 7.
    Kuthadi, V.M., Selvaraj, R., Marwala, T.: An efficient web services framework for secure data collection in wireless sensor network. Br. J. Sci. 12(1), 18–31 (2015)Google Scholar
  8. 8.
    Abbasi, A.A., Younis, M.: A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 30(14), 2826–2841 (2007)CrossRefGoogle Scholar
  9. 9.
    Heinzelmann, W., Chandrakasan, A., Balakrishnan, H.: An application-specific protocol architecture for wireless micro sensor networks. IEEE Trans. Wirel. Commun. 1(4), 660–670 (2002)CrossRefGoogle Scholar
  10. 10.
    Manjeshwar, A., Zeng, Q.-A., Agrawal, D.P.: An analytical model for information retrieval in wireless sensor networks using enhanced APTEEN protocol. IEEE Trans. Parallel Distrib. Syst. 13(12), 1290–1302 (2002)CrossRefGoogle Scholar
  11. 11.
    Sharma, S., Jena, S.K.: A survey on secure hierarchical routing protocols in wireless sensor networks. In: Proceedings International conference on Communication, Computing & Security (ICCCS), pp. 146–151 (2011)Google Scholar
  12. 12.
    Kuthadi, V.M., Selvaraj, R., Marwala, T.: An enhanced security pattern for wireless sensor network. In: Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, vol. 2, p. 61. Springer (2015)Google Scholar
  13. 13.
    Kukkurainen, J., Soini, M., Sydanheimo, L.: RC5-based security in wireless sensor networks: utilization and performance. WSEAS Trans. Comput. 9(10), 1191–1200 (2010)Google Scholar
  14. 14.
    Sakharkar, S.M., Mangrulkar, R.S., Atique, M.: A survey: a secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks. In: IEEE Students conference on Electrical, Electronics and Computer Science (SCEECS) 2014, India, pp. 1–5Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Venu Madhav Kuthadi
    • 1
    • 2
    Email author
  • Rajalakshmi Selvaraj
    • 1
  • Tshilidzi Marwala
    • 2
  1. 1.Department of Computer ScienceBIUSTPalapyeBotswana
  2. 2.Faculty of Engineering and the Built EnvironmentUniversity of JohannesburgJohannesburgSouth Africa

Personalised recommendations