000 -LEADER |
fixed length control field |
a |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20190315095439.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190308b xxu||||| |||| 00| 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AIKTC-KRRC |
Transcribing agency |
AIKTC-KRRC |
100 ## - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
7950 |
Author |
Gahlawat,Jyoti |
245 ## - TITLE STATEMENT |
Title |
Cluster-based secure communication using short path selection in MATLAB |
250 ## - EDITION STATEMENT |
Volume, Issue number |
Vol.4 (1) |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New Delhi |
Year |
2018 |
Name of publisher, distributor, etc. |
Journals Pub |
300 ## - PHYSICAL DESCRIPTION |
Pagination |
21-29p. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
he wireless sensor networks (WSNs) consists of several autonomous sensor nodes with sensing, processing and wireless communication capabilities. In this work, the sensor network security issues are resolved in clustered network when a new node enters into the network. In this present work, two-stage authenticated communication is defined. The first-level authentication is applied between the base station and the cluster head. In this process, the public key cryptography is applied for the aggregative communication. The base station generates the public key and private key pair for each cluster head. The public key is shared to the cluster head and the private key is kept by the base station. In this work, the DES approach of cryptography is used as the secure communication mechanism between the base station and cluster head. In the second level, the authentication will be maintained between the cluster head and cluster nodes. This authentication is performed using symmetric key. Here the cluster head will generate a key sequence and distribute it with each cluster node. Here, the symmetric communication will be achieved using secure hash algorithm. The work also includes the balanced cluster management over the network. As a new node enters to the system, the cluster heads in range will be identified and the cluster head will send the request to the base station for the acceptance of the new node. After the node identification, a key is generated for communication. In the same way, key exchange mechanism is also performed. Here sensor nodes are battery-operated. So energy saving is an important factor in WSN. In this paper, I have simulated communication graph theory based cluster which is the updated version of LEACH protocol and DEED protocol, which is one of the clustering-based energy-efficient routing protocols using MATLAB. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
4619 |
Topical term or geographic name entry element |
EXTC Engineering |
773 0# - HOST ITEM ENTRY |
Place, publisher, and date of publication |
New Delhi Journals Pub |
Title |
International journal of microelectronics and digital integrated circuits |
856 ## - ELECTRONIC LOCATION AND ACCESS |
URL |
http://ecc.journalspub.info/index.php?journal=JMDIC&page=article&op=view&path%5B%5D=751 |
Link text |
Click here |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Articles Abstract Database |