Ensuring Security Using Core Based Routing Algorithm In Wireless Sensor Networks | Revista Publicando
Ensuring Security Using Core Based Routing Algorithm In Wireless Sensor Networks
PDF (EN)

Cómo citar

Azath, & Dinesh. (2018). Ensuring Security Using Core Based Routing Algorithm In Wireless Sensor Networks. Revista Publicando, 5(15(2), 1051-1061. Recuperado a partir de https://revistapublicando.org/revista/index.php/crv/article/view/1414

Resumen

Wireless sensor networks (WSNs) circulate hundreds to thousands of modest miniaturized scale sensor hubs in their locales and these hubs are vital parts of Internet of Things (IoT). In WSN-helped IoT, the hubs are asset obliged from multiple points of view, for example, stockpiling assets, figuring assets, vitality assets, et cetera. Powerful steering conventions are required to keep up a long system lifetime and accomplish higher vitality use. To upgrade WSNs for secured data transmission both at group head and base station data aggregation is required. Data aggregation is performed in each switch while sending data. The life time of sensor arranges lessens in view of utilizing vitality wasteful hubs for data aggregation. Thus aggregation process in WSN ought to be upgraded in vitality proficient way. ESCR will enhance the performance of the system with good potential. Therefore ensuring security using core based routing (ESCR) algorithm in WSNs is proposed. Simulation results show that ESCR perform better than the existing algorithms.

PDF (EN)

Citas

Shahbazi, Mehrdad, Mohammad Reza Bemanian, and Hamid Reza Saremi. "Analysis of Effective Key Factors in Adaptability of a Building in the Future with an Emphasis on Flexibility in Historical Buildings (Case Study: Bu-Ali of Hamadan)." Space Ontology International Journal 6.1 (2017): 69-78.

ALITAJER, S., SAJADZADEH, H., SAADATIVAGHAR, P., & SHAHBAZI, M. (2016). The Role of Physical Factors in the Sociopetalness of Informal Settlements: The Case of Hesar-e Emam and Dizaj Neighborhoods in Hamedan.

Mahan, A., Bazvandi, F., Shahbazi, M., & Bazvand, K. N. (2014). Evaluation of Compatibility of Architectural Styles in Change of Use in Historical Buildings Case Study: The Study of Change of Use in Tabriz Leather Factory to Islamic Art University

Bemanian, Mohammadreza, Reza Oryaninejad, and Mehrdad Shahbazi. "Typology of spatial expansion new sprawl pattern (Case study: Urumia urban region)." Journal of Turism Hospitality Research 5.4 (2016): 65-80.

BEMANIAN, MOHAMMAD REZA, and MEHRDAD SHAHBAZI. "FUNCTIONAL ROLE IN THE VITALITY OF URBAN OPEN SPACES (CASE STUDY: ERAM PARK HAMADAN)." (2017): 57-68..

Roy, S., Conti, M., Setia, S., & Jajodia, S. (2014). Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact. IEEE Transactions on Information Forensics and Security, 9(4), 681-694.

Pradeepa, K., Anne, W. R., & Duraisamy, S. (2012). Design and implementation issues of clustering in wireless sensor networks. International Journal of Computer Applications, 47(11).

Alcaraz, C., Lopez, J., Roman, R., & Chen, H. H. (2012). Selecting key management schemes for WSN applications. Computers & Security, 31(8), 956-966.

Azarderskhsh, R., & Reyhani-Masoleh, A. (2011). Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 893592.

Dietrich, I., & Dressler, F. (2009). On the lifetime of wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 5(1), 5.

Padmaja, P., Marutheswar, G. V., & Niharika, K. S. (2016). Optimization Of Wireless Sensor Networks In Secured Data Aggregation. International Journal of Electrical and Electronis Engineering Research, 7(2), 94-100.

Lim, H. S., Moon, Y. S., & Bertino, E. (2010, September). Provenance-based trustworthiness assessment in sensor networks. In Proceedings of the Seventh International Workshop on Data Management for Sensor Networks (pp. 2-7). ACM.

Yang, Y., Wang, X., Zhu, S., & Cao, G. (2008). SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. ACM Transactions on Information and System Security (TISSEC), 11(4), 18.

Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(3), 15.

Mishra, M. R., Kar, J., & Majhi, B. (2014, May). One-pass authenticated key establishment protocol on bilinear pairings for wireless sensor networks. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on (pp. 1-7). IEEE.

Descargas

La descarga de datos todavía no está disponible.