Normal view MARC view ISBD view

Cluster-based secure communication using short path selection in MATLAB

By: Gahlawat,Jyoti.
Publisher: New Delhi Journals Pub 2018Edition: Vol.4 (1).Description: 21-29p.Subject(s): EXTC EngineeringOnline resources: Click here In: International journal of microelectronics and digital integrated circuitsSummary: he wireless sensor networks (WSNs) consists of several autonomous sensor nodes with sensing, processing and wireless communication capabilities. In this work, the sensor network security issues are resolved in clustered network when a new node enters into the network. In this present work, two-stage authenticated communication is defined. The first-level authentication is applied between the base station and the cluster head. In this process, the public key cryptography is applied for the aggregative communication. The base station generates the public key and private key pair for each cluster head. The public key is shared to the cluster head and the private key is kept by the base station. In this work, the DES approach of cryptography is used as the secure communication mechanism between the base station and cluster head. In the second level, the authentication will be maintained between the cluster head and cluster nodes. This authentication is performed using symmetric key. Here the cluster head will generate a key sequence and distribute it with each cluster node. Here, the symmetric communication will be achieved using secure hash algorithm. The work also includes the balanced cluster management over the network. As a new node enters to the system, the cluster heads in range will be identified and the cluster head will send the request to the base station for the acceptance of the new node. After the node identification, a key is generated for communication. In the same way, key exchange mechanism is also performed. Here sensor nodes are battery-operated. So energy saving is an important factor in WSN. In this paper, I have simulated communication graph theory based cluster which is the updated version of LEACH protocol and DEED protocol, which is one of the clustering-based energy-efficient routing protocols using MATLAB.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
Articles Abstract Database Articles Abstract Database School of Engineering & Technology
Archieval Section
Not for loan 2018140
Total holds: 0

he wireless sensor networks (WSNs) consists of several autonomous sensor nodes with sensing, processing and wireless communication capabilities. In this work, the sensor network security issues are resolved in clustered network when a new node enters into the network. In this present work, two-stage authenticated communication is defined. The first-level authentication is applied between the base station and the cluster head. In this process, the public key cryptography is applied for the aggregative communication. The base station generates the public key and private key pair for each cluster head. The public key is shared to the cluster head and the private key is kept by the base station. In this work, the DES approach of cryptography is used as the secure communication mechanism between the base station and cluster head. In the second level, the authentication will be maintained between the cluster head and cluster nodes. This authentication is performed using symmetric key. Here the cluster head will generate a key sequence and distribute it with each cluster node. Here, the symmetric communication will be achieved using secure hash algorithm. The work also includes the balanced cluster management over the network. As a new node enters to the system, the cluster heads in range will be identified and the cluster head will send the request to the base station for the acceptance of the new node. After the node identification, a key is generated for communication. In the same way, key exchange mechanism is also performed. Here sensor nodes are battery-operated. So energy saving is an important factor in WSN. In this paper, I have simulated communication graph theory based cluster which is the updated version of LEACH protocol and DEED protocol, which is one of the clustering-based energy-efficient routing protocols using MATLAB.

There are no comments for this item.

Log in to your account to post a comment.
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha