High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Energy Efficient and Secure Routing Protocol for Wireless Sensor Network

Author(s):

V.VASANTHI , SRI ESHWAR COLLEGE OF ENGINEERING; V.VINU RAJA, SRI ESHWAR COLLEGE OF ENGINEERING; CHRISTOPHER, CALIBER INTERCONNECT SOLUTIONS

Keywords:

Uniform Energy Distribution, Secure Aggregation, Node Mobility, Wireless Sensor Networks

Abstract

Wireless Sensor networks (WSNs) are vastly scattered networks of tiny, trivial wireless nodes, deployed in large counts to scrutinize the milieu or system by the measurement of physical parameters such as temperature, pressure, or relative humidity. For these necessities of WSNs, high efficient routing protocols design ought to energy efficient as feasible to extend their lifetime, and secure data delivery. And designed protocol must be adaptable for sensor nodes mobility which may be static or dynamic. For these needs an energy-balanced routing method based on uniform distribution of energy is designed with change of cluster head for each round of data transmission. This energy efficient algorithm is proposed with verification algorithm which ensures that the secure data transmission is achieved without releasing private sensor readings and without introducing significant overhead on the battery-limited sensors. Cluster based wireless sensor networks maximize the node lifetime and these clusters are formed periodically and dynamically. We propose Short path Secure and Efficient data Transmission protocols for sensor networks where security relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is essential for WSNs, while its security relies on the hardness of the discrete logarithm problem. The calculations and simulations are provided to exemplify the competence of the proposed protocols. The results show that, the anticipated protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.

Other Details

Paper ID: IJSRDV3I2396
Published in: Volume : 3, Issue : 2
Publication Date: 01/05/2015
Page(s): 868-872

Article Preview

Download Article