Energy efficient secure data transmission in wireless sensor network

Venu Madhav Kuthadi, Rajalakshmi Selvaraj, Tshilidzi Marwala

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Wireless sensor network (WSN) turns out to be a vital innovation identified with systems as well as it is by and large broadly connected and received in the present day control and checking functions. In any case, problems with respect to vitality proficiency create huge worries during the time spent in remote sensor system. For problems concerning vitality, power efficient adaptive clustering hierarchy (PEACH) tradition has been suggested essentially for WSNs so as to criticize vitality use of hubs and expanding life range of the system. The hubs in the remote sensor system structure as a gathering. The most noteworthy vitality hub in the gathering has been chosen as a bunch head. The bunch head determination has a few criteria in choosing: (1) based on the vitality levels of sensors in group (i.e., the hub with higher vitality would be chosen as a bunch head). (2) based on hub degree (total number of hubs associated with it) (i.e., the hub with advanced hub degree would be chosen as a bunch head). The time differential of arrival (TDA) has been proposed for vitality consumption of sensor hubs in the system. TDA decreases the vitality utilization of hubs and expanding the system life duration. The node connectivity algorithm (NCA) has been proposed to discover the availability with neighbor’s hub in the remote sensor system. The bunch head confirms the gathering hubs and transfers the confirmation data to server. On the off chance that any noxious hub available in the system, the server would recognize through self-mending key appropriation procedure and the bunch head would shut the hub and toss out the hub from the bunch. The noxious hub assets would be stored into the server. It will make the system more ensured and safe one. To broadcast the parcels from resource to goal, figure the most limited way with the assistance of Dijkstra algorithm. The bundle encodes at source and unscrambled once it gets to the goal by means of Advanced Encryption Standard (AES) encryption calculation.

Original languageEnglish
Title of host publicationSmart Computing and Informatics - Proceedings of the 1st International Conference on SCI 2016
EditorsVikrant Bhateja, Swagatam Das, Suresh Chandra Satapathy
PublisherSpringer Science and Business Media Deutschland GmbH
Pages275-287
Number of pages13
ISBN (Print)9789811055430
DOIs
Publication statusPublished - 2018
Event1st International Conference on Smart Computing and Informatics, SCI 2016 - Visakhapatnam, India
Duration: 3 Mar 20174 Mar 2017

Publication series

NameSmart Innovation, Systems and Technologies
Volume77
ISSN (Print)2190-3018
ISSN (Electronic)2190-3026

Conference

Conference1st International Conference on Smart Computing and Informatics, SCI 2016
Country/TerritoryIndia
CityVisakhapatnam
Period3/03/174/03/17

Keywords

  • Base station
  • Dijkstra algorithm
  • Power efficient adaptive clustering hierarchy
  • Time differential of arrival
  • Wireless sensor networks

ASJC Scopus subject areas

  • General Decision Sciences
  • General Computer Science

Fingerprint

Dive into the research topics of 'Energy efficient secure data transmission in wireless sensor network'. Together they form a unique fingerprint.

Cite this