Transmitting Data Securely and Efficiently in Cluster-based Wireless Sensor Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
The most critical issue in wireless sensor networks is Secure data transmission. The system performance of WSNs can be improved by Clustering which is an effective and practical way to. In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the IdentityBased Online/Offline digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks. The calculations and simulations are provided to illustrate the efficiency of the proposed protocols. The results show that, the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.
Authors and Affiliations
Mugada Sri Lakshmi Vani| M.Tech (CSE), Usha Rama College of Engineering and Technology, A.P., India, Dr. B. RajaSrinivasa Reddy| Professor,Dept. of Computer Science & Engineering, Usha Rama College of Engineering and Technology, A.P., India
Attribute Based Secure Military Data Retrieval System for Decentralized Disruption Tolerant Networks
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are...
Advances the Forward Security in Parallel Network File System using An Efficient and Reliable Key Exchange Protocols
In parallel file system we can disperse data over numerous nodes to permit simultaneous access by various errands of a parallel application. By play out the numerous errands in a parallel system is commonly to reduce...
Load Harmonizing Standard Based On Cloud Segregating For The Public Cloud
Concept of Harmonizing Load in cloud computing has an important effect on the performance. A cloud computing system which does not use load Harmonizing has numerous drawbacks. Now-a days the usage of internet and rel...
A High Speed 16*16 Multiplier Based On Urdhva Tiryakbhyam Sutra
It is an ancient methodology of Indian mathematics as it contains a 16 SUTRAS (formulae). A high speed complex 16 *16 multiplier design by using urdhva tiryakbhyam sutra is presented in this paper. By using this sutr...
Power Quality Improvement For PV/Battery Hybrid System Using Fuzzy Logic Controlling Technique
power quality improvement for pv/battery hybrid system using fuzzy logic controlling technique has been presented this paper. The PV side cascaded boost DC-DC converter is controlled by P&O algorithm to extract the m...