29,392 research outputs found

    A Survey on Two New Secure and Efficient Data Transmission Protocols SET-IBS and SET-IBOOS for WSN

    Get PDF
    Data transmission in a secure way is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. The system proposes two new Secure and Efficient Data Transmission Protocols. This technique is useful for Cluster Based Wireless Sensor Networks. SET-IBS and SET-IBOOS are proposed protocols which uses Identity Based Digital Signature (IBS) and Identity Based Online/Offline Digital Signatures respectively. In general, for any secure data transmission protocols key exchange is a big overhead. This is removed in the proposed system by introducing Base Station. SET-IBOOS Scheme reduces the computational overhead. DOI: 10.17762/ijritcc2321-8169.15036

    MANAGING OF PERFORMANCE IMPROVEMENT FOR CLUSTER BASIS NETWORKS

    Get PDF
    Practical data transmission is one of most important issues for sensor networks. Identity-based digital signature system concept as set up as a significant management in wireless sensor networks for security. Data transmission of secure and efficient is, in particular essential in numerous realistic sensor networks. Cluster-based wireless sensor networks were gaining importance for the past few years, on the other hand the functioning of cluster-based construction in real world is relatively complex. In the system of cluster-based wireless networks, every cluster contain a leader sensor node, considered as cluster head which aggregates data that is collected by leaf nodes in its cluster. Secure and resourceful data Transmission procedures were introduced for cluster-based wireless sensor networks known as secure as well as efficient data transmission-identity-based digital signature as well as Secure as well as efficient data transmission- Identity-based online/offline digital signature system. Identity-based scheme of online/ offline digital signature was projected to decrease computation as well as storage costs of signature processing. It may be effective for key management in wireless sensor networks. Well-organized communication within identity-based digital signature depends on ID based cryptography. The key perception of these protocols is to confirm the encrypted sensed information, by introducing digital signatures towards resourceful message packets, in communication and apply key management for safeguarding

    Secure and Energy Efficient Data Aggregation Technique for Cluster Based Wireless Sensor Network

    Get PDF
    In the past few years secure transmission of data along with efficiency is a serious issue for wireless sensor networks (WSNs).Clustering is a powerful and convenient way to enhance performance of the WSNs system. In this project work, a secure transmission of data for cluster-based WSNs (CWSNs) is studied, where the clusters are formed dynamically and infrequently. Basically protocols for CWSNs, called SET-IBS (Identity-Based digital Signature)scheme and SET-IBOOS (Identity-Based Online / Offline digital Signature)scheme, correspondingly. In SET-IBS, security relies on the hardness of the Dill-Hellman difficulty in the pairing area. Data aggregation is the process of abbreviation and combining sensor data in order to reduce the amount of data transmission in the network. This paper investigates the relationship between security and data aggregation process in wireless sensor networks. In this paper propose SET-IBS and data aggregation techniques for secure and efficient data transmission. For energy consumption using DRINA algorithm. DRINA means Data Routing for In-Network Aggregation, that has some key aspects such as high aggregation rate, a reduced number of messages for setting up a routing

    SDAMQ: Secure Data Aggregation for Multiple Queries in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Network consists of severely energy constrained sensor nodes and are susceptible to security attacks due to broadcast communication model. It is necessary to optimize the transmission of packets to reduce the energy consumption. In addition data has to be encrypted in order to overcome the attack from the compromising nodes. We propose Secure Data Aggregation for Multiple Queries (SDAMQ) in Wireless Sensor Networks where multiple aggregate queries from the sink are authenticated and distributed to the sensor nodes. The sensor nodes respond by aggregating data belonging to multiple coexisting queries into a single packet, there by reducing the transmission cost. The intermediary nodes aggregate the encrypted data using additively homomorphic encryption. Thus authenticated query propagation combined with homomorphic encryption provide secure data aggregation at low energy consumption. Simulation results shows that SDAMQ provides better performance

    A Secure Data Transmission Scheme in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSNs) play a very important role in the Internet of Things. But, how to save the energy of the wireless sensor nodes and prolong the lifetime of such networks is an emergent task for the wide adoption of the networks. Considering the characteristics of wireless sensor nodes where energy consumption for transmitting data is much more than that for computation, this paper presents method for pre-calculating a secure and efficient path before data transmission begins. The basic idea of the proposed method is that the path length based Floyd algorithm and trust degree between neighboring nodes are used as the reference for the selection of the routes. Data is then transmitted along the secure and efficient path in the WSNs

    Attacks on Geographic Routing Protocols for Wireless Sensor Network

    Get PDF
    With the increase in the military and several other applications of Wireless Sensor Network, provisions must be made for secure transmission of sensitive information throughout the network. Most of the routing protocols proposed for ad-hoc networks and sensor networks are not designed with security as a goal. Hence, many routing protocols are vulnerable to an attack by an adversary who can disrupt the network or harness valuable information from the network. Routing Protocols for wireless sensor networks are classified into three types depending on their network structure as Flat routing protocols, Hierarchical routing protocol and Geographic routing protocols. Large number of nodes in a wireless sensor network , limited battery power and their data centric nature make routing in wireless sensor network a challenging problem. We mainly concentrate on location-based or geographic routing protocol like Greedy Perimeter Stateless Routing Protocol. Sybil attack and Selective forwarding attack are the two attacks feasible in GPSR. These attacks are implemented in GPSR and their losses caused to the network are analysed
    corecore