Cluster-based secure communication using short path selection in MATLAB (Record no. 8475)

000 -LEADER
fixed length control field a
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190315095439.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190308b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AIKTC-KRRC
Transcribing agency AIKTC-KRRC
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 7950
Author Gahlawat,Jyoti
245 ## - TITLE STATEMENT
Title Cluster-based secure communication using short path selection in MATLAB
250 ## - EDITION STATEMENT
Volume, Issue number Vol.4 (1)
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New Delhi
Year 2018
Name of publisher, distributor, etc. Journals Pub
300 ## - PHYSICAL DESCRIPTION
Pagination 21-29p.
520 ## - SUMMARY, ETC.
Summary, etc. he wireless sensor networks (WSNs) consists of several autonomous sensor nodes with sensing, processing and wireless communication capabilities. In this work, the sensor network security issues are resolved in clustered network when a new node enters into the network. In this present work, two-stage authenticated communication is defined. The first-level authentication is applied between the base station and the cluster head. In this process, the public key cryptography is applied for the aggregative communication. The base station generates the public key and private key pair for each cluster head. The public key is shared to the cluster head and the private key is kept by the base station. In this work, the DES approach of cryptography is used as the secure communication mechanism between the base station and cluster head. In the second level, the authentication will be maintained between the cluster head and cluster nodes. This authentication is performed using symmetric key. Here the cluster head will generate a key sequence and distribute it with each cluster node. Here, the symmetric communication will be achieved using secure hash algorithm. The work also includes the balanced cluster management over the network. As a new node enters to the system, the cluster heads in range will be identified and the cluster head will send the request to the base station for the acceptance of the new node. After the node identification, a key is generated for communication. In the same way, key exchange mechanism is also performed. Here sensor nodes are battery-operated. So energy saving is an important factor in WSN. In this paper, I have simulated communication graph theory based cluster which is the updated version of LEACH protocol and DEED protocol, which is one of the clustering-based energy-efficient routing protocols using MATLAB.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4619
Topical term or geographic name entry element EXTC Engineering
773 0# - HOST ITEM ENTRY
Place, publisher, and date of publication New Delhi Journals Pub
Title International journal of microelectronics and digital integrated circuits
856 ## - ELECTRONIC LOCATION AND ACCESS
URL http://ecc.journalspub.info/index.php?journal=JMDIC&page=article&op=view&path%5B%5D=751
Link text Click here
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Articles Abstract Database
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Barcode Date last seen Price effective from Koha item type
          School of Engineering & Technology School of Engineering & Technology Archieval Section 2019-03-28 2018140 2019-06-10 2019-03-28 Articles Abstract Database
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha