RECOVERABLE CONCEALED DATA AGGREGATION USING SHARED KEY SIGNATURE IN WIRELESS SENSOR NETWORKS

Size: px
Start display at page:

Download "RECOVERABLE CONCEALED DATA AGGREGATION USING SHARED KEY SIGNATURE IN WIRELESS SENSOR NETWORKS"

Transcription

1 RECOVERABLE CONCEALED DATA AGGREGATION USING SHARED KEY SIGNATURE IN WIRELESS SENSOR NETWORKS 1 SUCHITHRA M. S, 2 L. MALATHI 1,2 Vivekananda College of Engineering for Women, Tiruchengodu, Tamil Nadu, India suchithrams194@gmail.com, malasumathi@gmail.com Abstract Wireless sensor networks are undoubtedly one of the largest growing types of networks today. Wireless sensor networks consist of large number of sensor nodes with sensing and communication capabilities. The main goal of data aggregation algorithms is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. In privacy homomorphism encryption, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. To overcome the above two drawbacks, the base station can recover all sensing data even these data has been aggregated. This property is called recoverable. In this paper, we are going to recover the concealed data aggregation for authenticity and data integrity in wireless sensor networks. The aim of the project is to use shared key signature algorithm for providing security and authenticity in wireless sensor network. This technique is an enhancement over existing encryption and signature verification algorithms. Here the key used for each sensor is shared for these algorithms. It reduces memory usage and delay in communication. Keywords LEACH, Recoverable Concealed data aggregation, Shared key signature algorithm, Wireless sensor networks. I. INTRODUCTION Wireless sensor networks are fast becoming one of the largest growing types of networks today and, as such, have attracted quite a bit of research interest. These are used in many aspects of lives including environmental analysis and monitoring, battlefield surveillance and management, emergency response, medical monitoring and inventory management. Their reliability, cost-effectiveness, ease of deployment and ability to operate in an unattended environment, among other positive characteristics, make sensor networks the leading choice of networks for these applications. Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of data that need to send to base station. The main goal of data aggregation algorithms is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. Wireless sensor networks (WSN) offer an increasingly Sensor nodes need less power for processing as compared to transmitting data. It is preferable to do in network processing inside network and reduce packet size. One such approach is data aggregation which attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have limited computational power and limited memory and battery power, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. With advance in technology, sensor networks composed of small and cost effective sensing devices equipped with wireless radio transceiver for environment monitoring have become feasible. The key advantage of using these small devices to monitor the environment is that it does not require infrastructure such as electric mains for power supply and wired lines for Internet connections to collect data, nor need human interaction while deploying. These sensor nodes can monitor the environment by collecting information from their surroundings, and work cooperatively to send the data to a base station, or sink, for analysis. The main goal of data aggregation algorithms is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity as shown in figure 1.Data aggregation is an important mechanism used in sensor networks to conserve the already limited battery power of the sensor devices. Traditional approaches to data aggregation, which centered on the base station, required that all data be routed from sensor to sensor towards the base station where the aggregate of the data is calculated. This causes sensors to expend much of their energy transmitting data [1]. More recently, research on data aggregation in sensor networks has resulted in energy-conserving and less centralized approaches in which data is aggregated at each sensor and the resulting aggregates are forwarded to the base station [2]. Data aggregation is a process of aggregating the sensor data using aggregation approaches. The general data aggregation algorithm works as shown in the below figure. The algorithm uses the sensor data from the sensor node 81

2 and then aggregates the data by using some aggregation algorithms such as centralized approach, LEACH (low energy adaptive clustering hierarchy),tag(tiny Aggregation)etc. This aggregated data is transfer to the sink node by selecting the efficient path. For secure data aggregation, several schemes, such as ESPDA and SRDA have been proposed [3] [4]. Although this type of protocols yields sub-optimal results, these are more efficient for large-scale networks and thus more suitable for distributed environments. However, these schemes restrict the data type of aggregation or cause extra transmission overhead. Besides, an adversary can still obtain the sensing data of its cluster members after capturing a cluster head. To solve above problems completely, two ideas are used in recent research. First, data are encrypted during transmission. Second, cluster heads directly aggregate encrypted data without decryption. A well-known approach named Concealed Data Aggregation (CDA) has been proposed based on these two ideas. CDA provides both end-to-end encryption and in-networking processing in WSN [5]. Since CDA applies privacy homomorphism (PH) encryption with additive homomorphism, cluster heads are capable of executing addition operations on encrypted numeric data. constrained. For example, these schemes only allow cluster heads to perform additive operations on cipher texts sent by sensors; therefore, these are ineffective if the base station desires to query the maximum value of all sensing data. Second, the base station cannot verify the integrity and authenticity of each sensing data [7]. These problems seem to be solved if the base station can receive all sensing data rather than aggregated results, but this method is in direct contradiction to the concept of data aggregation that the base station obtains only aggregated results. Thus, attempt to design an approach that allows the base station to receive all sensing data but still reduce the transmission overhead. Here introduce a concept named Recoverable Concealed Data Aggregation (RCDA) [13]. In this paper, recover the concealed aggregated data with authenticity and data integrity in wireless sensor networks. The base station can recover all sensing data even these data has been aggregated in cluster head. The aim of this paper is to use shared key signature algorithm for providing security and authenticity in wireless sensor network. II. ARCHITECTURE MODEL The architecture model forms the networks with 100 nodes. Initialize the node size, position, and color in the network. It is shown in the figure 3. Finally it analyzes the performance of simulation of nodes with speed with respect to time. The simulation work has been done with The Network Simulator ns-2, Version In the simulation 100 nodes are randomly distributed within the network field of size 1000 m * 1000m. Then vary the node speed from 5m/s to 30m/s. Wireless Architecture model follows following steps Define Properties (Channel, MAC, Antenna types) Create NS Instant (Simulator object) Create Nam & Trace Figure 1. General architecture of the data aggregation algorithm Later, several PH-based data aggregation schemes have been proposed to achieve higher security levels [6]. In the above PH-based schemes, the base station receives only the aggregated results. However, it brings two problems. First, the usage of aggregation functions is Figure. 2. Homogeneous WSN environment 82

3 With P as the cluster-head probability, r as the number of the current round and G as the set of nodes that have not been cluster-heads in the last 1/P rounds. This algorithm ensures that every node becomes a cluster-head exactly once within 1/P rounds. III. Figure. 3. Simulated result of architecture model Create Topology Define GOD Set Properties to Topology Create Node Create Node Position Create Node Mobility Create Agents Create application and/or traffic sources Start simulation CLUSTER FORMATION The process of grouping the sensor nodes in a densely deployed large-scale sensor network is known as clustering. The intelligent way to combine and compress the data belonging to a single cluster is known as data aggregation in cluster based environment. There are some issues involved with the process of clustering in a wireless sensor network. First issue is, how many clusters should be formed that could optimize some performance parameter. Second could be how many nodes should be taken in to a single cluster. Third important issue is the selection procedure of cluster-head in a cluster. Another issue is that user can put some more powerful nodes, in terms of energy, in the network which can act as a cluster-head and other simple node work as cluster-member only. In this study, it form the network as cluster as shown in figure 4 and choosing cluster head, collect the information from cluster members who reduce the energy and produce aggregated result to the sink. It is shown in figure 2. It is based on level of sensors. Elect the cluster head based upon energy of the nodes. Assume divide the level of sensors based on complexity. In order to select cluster-heads each node n determines a random number between 0 and 1. If the number is less than a threshold T (n), the node becomes a cluster-head for the current round. The threshold is set as follows: LEACH forms clusters by using a distributed algorithm, where nodes make autonomous decisions without any centralized control. It is an energy-efficient routing protocol. The goal is to design a cluster formation algorithm such that there are a certain number of clusters, during each round. In addition, if nodes begin with equal energy, the goal is to try to evenly distribute the energy load among all the nodes in the network so that there are no overlyutilized nodes that will run out of energy before the others. As being a cluster head node is much more energy intensive than being a non-cluster head node, this requires that each node take its turn as cluster head. LEACH is a cluster-based protocol, which includes distributed cluster formation. LEACH randomly selects a few sensor nodes as cluster heads (CHs) and rotates this role to evenly distribute the energy load among the sensors in the network. The operation of LEACH is separated into two phases, the setup phase and the steady state phase. In the setup phase, the clusters are organized and CHs are selected. The operation of LEACH is divided into rounds. In the steady state phase, the actual data transfer to the base station takes place. In setup phase, each node chooses a random number between 0 and 1. If the number is less than the threshold, the node is the cluster head. It will broadcast news to other nodes, and each node decides to join which cluster node according to signal strength. In steady state phase, cluster nodes will process data which is sent from nodes such as data fusion and aggregation, and transmit it to sink. Cluster formed as dynamically, in ns2 simulation it is performed by movement random selection. The simulated cluster architecture is shown in figure 5. Figure. 4. Cluster Formation 83

4 V. SIGNATURE VERIFICATION It performs the signature verification process. After receiving the data from cluster head it decrypt the data from aggregated result. Then decode the data and then verify the signature of individual nodes of the network. The base station decrypts the data and verifies the signature. Based on signature it retrieves the data. Boneh proposed an aggregate signature scheme which merges a set of distinct signatures into one aggregated signature. This scheme consists of five procedures: key generation (KeyGen), signing (Sign), verifying (Verify), aggregation (Agg), and verifying aggregated signature (Agg-Verify). IV. Figure. 5. Simulated result of Cluster Architecture ENCRYPTION In this study, it encrypts the sensing data of cluster members and sends it to cluster head. And also add the signature to all the sensing data of the node. Then aggregate the result and send to the cluster head. First generate the keys for each sensor node by using encryption algorithm and add the signature for that data of sensor node in the network. After adding cipher text and signature, send to the cluster head. Then aggregate the data which sent by all nodes of the network. Mykletun proposed a concealed data aggregation scheme based on the elliptic curve ElGamal (EC-EG) cryptosystem as shown in figure 6. It consists of four procedures: key generation (KeyGen), encryption (Enc), aggregation (Agg), and decryption (Dec). RCDA-HOMO is composed of four procedures: Setup, Encrypt-Sign, Aggregate, and Verify. The Setup procedure is to prepare and install necessary secrets for the BS and each sensor. When a sensor decides to send sensing data to its CH, it performs Encrypt-Sign and sends the result to the CH. Once the CH receives all results from its members, it activates Aggregate to aggregate what it received, and then sends the final results (aggregated cipher text and signature) to the BS. The last procedure is Verify. The BS first extracts individual sensing data by decrypting the aggregated cipher text. Afterward, the BS verifies the authenticity and integrity of the decrypted data based on the corresponding aggregated signature. VI. ANALYSIS It is used to analyze the performance of the network parameters such as Packet delivery ratio, Throughput, Delay. It focuses on the performance of the algorithm. It evaluates the performance using the tool X graph in ns2. A. SECURITY ANALYSIS: Figure 6. Simulated result of Data transmission We first assume that an adversary does not compromise sensors. The proposed schemes are secure because sensing data are encrypted. In RCDA- HOMO, each sensor encrypts their data with private key of base station before transmitting. Besides, our design generates the corresponding signature for each sensing data. Consequently, an adversary cannot modify messages and inject forged messages since he cannot sign forged messages without private keys. If an adversary has the ability to compromise sensors, we consider the following situations. An adversary can compromises a sensor and perform it as a legal one. Detecting compromised sensors that still act normally is infeasible in all existing detection mechanisms in WSN. Also, if the value of a forged message is in a reasonable range, detecting it is still infeasible. An adversary can also try to manipulate the aggregated result. He may generate false data, modify legal messages or impersonate other sensors. 84

5 The proposed schemes are still secure against above attacks because of the signature required for each generated message. A malicious sender cannot impersonate other legal sensors because he lacks the corresponding keys of legal sensors. Based on the attack model, data aggregation scheme must satisfy the following security requirements [8] [9] [10]. 1) Data Privacy: All sensing data must be encrypted and concealed from CH, especially in homogeneous WSN. It implies that a CH must have an ability to aggregate the cipher texts without decryption. 2) Data Integrity/Authenticity: The integrity ensures the base station can detect altered data by unauthorized entity during transmission. Besides, authenticity can trace the source of data; the base station can verify the data sender. 3) Prevent Decryption with Compromised Secrets: An adversary cannot decrypt the cipher text or aggregated results after compromising sensors[11]. 4) Prevent Encryption with Compromised Secrets: An adversary cannot generate the forged cipher text through compromised secrets. 5) Prevent Unauthorized Aggregation: An adversary cannot aggregate the cipher text and modify aggregate results if he does not compromise sensors or cluster heads[12]. These security requirements may broaden the scope of the assumptions defined in the past research. For example, CDA cannot satisfy all these requirements, but it can be solved by combining other mechanisms such as node authentication approaches [13]. However, in this analysis, our design can achieve all security requirements without collaborating with other mechanisms. It seems more cost efficient. VII. SIMULATIONS To simulate a WSN, we select NS2 as our simulation platform due to its popularity. We allocate 100, 500, and 1000 sensors to a predefined square with a random topology. Also, we adjust the density of a WSN to evaluate the impact from different degree. Simulation program begins to deploy sensors with random coordinates. When the deployment ends, the program builds links with estimated distances (Euclidean Distance) and estimated signal. Once possible links are created, the network triggers the routing procedure to form the cluster-based topology and finishes the bootstrapping. When the base station launches the data query task, all leaf nodes send their data (in our setting, each leaf send only one packet during each simulation) to the internal nodes. Then packets finally reach the base station. During transmission, cluster heads (or internal nodes) receive the packets and then perform 85 aggregation or directly forwarding based on the mechanism aggregation or directly forwarding [14]. To measure the pros and cons on aggregation, we defined the following metrics: 1) Energy consumption: Evaluate the communication energy consumed on internal nodes (or called cluster heads). This metric could measure the efficiency of energy saving by aggregation mechanism offered by the proposed scheme. 2) Delay time: Evaluate the longest delay during transmission. This metric gives us an estimated delays caused by RCDA-HOMO and RCDA-HETE, respectively. CONCLUSION In this paper, recoverable concealed data aggregation using shared key signature providing secure and authenticated data aggregation in wireless sensor network. The idea behind this scheme is the ability to share the key used in each sensors for encryption and signature verification. These approaches have the advantages like reducing the memory usage and avoid the communication delay. It also reduces the transmission overhead in wireless sensor network. The modifications of Mykletun et al. s Encryption Scheme and Boneh et al. s Signature Scheme are implemented to enhance security and authenticity in wireless sensor network. To summarize the above results, we obtain the following conclusions. First, applying the proposed scheme, RCDA-HOMO can reduce the energy consumption through aggregation significantly (at least 50%) because the CHs (or internal nodes) deliver fewer packets during communication. However, delay is the major cost when we apply the proposed schemes. Meanwhile, we ensure that processing delay causes a great impact than aggregation delay. Total delay is acceptable when the proportion of leaf is less than 50%, in the scheme. In conclusion, the proposed schemes can save energy with an acceptable delay; they are suitable for low degree (and high depth) WSNs. REFERENCES [1] R. Rajagopalan and P. Varshney, Data-Aggregation Techniques in Sensor Networks: A Survey, IEEE Comm. Surveys Tutorials, vol. 8, no. 4, pp , Oct.-Nov [2] J.-Y. Chen, G. Pandurangan, and D. Xu, Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis, IEEE Trans. Parallel Distributed Systems, vol. 17, no. 9, pp , Sept [3] H. Cam, S. Ozdemir, P. Nair, D. Muthuavinashiappan, and H.Ozgur Sanli, Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks, J. Computer Comm., vol. 29,pp , [4] H. Sanli, S. Ozdemir, and H. Cam, SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks, Proc. IEEE 60th Int l Conf. Vehicular Technology (VTC 04-Fall), vol. 7, pp , Sept

6 [5] D. Westhoff, J. Girao, and M. Acharya, Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation, IEEE Trans. Mobile Computing, vol. 5, no. 10, pp , Oct [6] C. Castelluccia, E. Mykletun, and G. Tsudik, Efficient Aggregation of Encrypted Data in Wireless Sensor Networks, Proc. Second Ann. Int l Conf. Mobile and Ubiquitous Systems, pp , July [7] E. Mykletun, J. Girao, and D. Westhoff, Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks, Proc. IEEE Int l Conf. Comm., vol. 5, pp , Jun [8] Y. Yang, X. Wang, S. Zhu, and G. Cao, SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks, ACM Trans. Information and System Security (TISSEC), vol. 11, no. 4, pp. 1-43, [9] S. Roy, S. Setia, and S. Jajodia, Attack-Resilient Hierarchical Data Aggregation in Sensor Networks, Proc. ACM Fourth Workshop Security of Ad Hoc and Sensor Networks, pp , [10] H. Yu, Secure and Highly-Available Aggregation Queries in Large-Scale Sensor Networks via Set Sampling, Proc. IEEE Int l Conf. Information Processing in Sensor Networks, pp. 1-12, [11] D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, Proc. 22 nd Int l Conf. Theory and Applications of Cryptographic Techniques (Eurocrypt), pp , [12] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, An Application-Specific Protocol Architecture for Wireless Microsensor Networks, IEEE Trans. Wireless Comm., vol. 1, no. 4, pp , Oct [13] Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung- Min Sun RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks, April [14] Hung-Min Sun, Chiung-Hsun Chen and Po-Chi Li A Lightweight Secure Data Aggregation Protocol For Wireless Sensor Networks National Tsing Hua University November 2011International Journal of Innovative Computing, 2012 ISSN [15] M. Abbasi Dezfouli, S. Mazraeh, M. H. Yektaie The New Method of Concealed Data Aggregation in Wireless Sensor: A Case Study World Academy of Science, Engineering and Technology [16] JiaGuo, Jian'an Fang, Xuemin Chen Survey on secure data aggregation for wireless sensor networks Service Operations, Logistics, and Informatics (SOLI), 2011 IEEE International Conference [17] Ameer Ahmed Abbasi a, Mohamed Younis b A survey on clustering algorithms for wireless sensor networks June 2007 [18] H. Chan, M. Luk, A. Perrig, Using clustering information for sensor network localization, in: Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS 05), Marinadel Rey, CA, USA, June [19] H. Huang, J. Wu, A probabilistic clustering algorithm in wireless sensor networks, in: Proceeding of IEEE 62nd Semiannual Vehicular Technology Conference (VTC), Dallas, TX September [20] P. Ding, J. Holliday, A. Celik, Distributed energy efficient hierarchical clustering for wireless sensor networks, in: Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems(DCOSS 05), Marina Del Rey, CA, June [21] B. Sun, X. Jin, K. Wu, Y. Xiao, Integration of secure innetwork aggregation and system monitoring for wireless sensor networks, in: Proceedings of IEEE International Conference on Communications (IEEE ICC 07), 2007, pp [22] B. Sun, N. Chand, K. Wu, Y. Xiao, Change-point monitoring for secure in-network aggregation in wireless sensor networks, in: Proceedings of IEEE Global Telecommunications Conference, IEEE GLOBECOM, 2007, pp [23] H. Çam, S. Ozdemir, False data detection and secure data aggregation in wireless sensor networks, in: Yang Xiao (Ed.), Security in Distributed Grid Mobile and Pervasive Computing, Auerbach Publications, CRC Press, [24] B. Parekh, H. Çam, Minimizing false alarms on intrusion detection for wireless sensor networks in realistic environments, in: Proceedings of IEEE Military Communications Conference, 2007,pp [25] K. Wu, D. Dreef, B. Sun, Y. Xiao, Secure data aggregation without persistent cryptographic operations in wireless sensor networks, Ad Hoc Networks 5 (1) (2007) [26] S. Ozdemir, Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism, in: Proceedings of the ICPS 07: IEEE International Conference on Pervasive Services,Istanbul, Turkey, 2007, pp [27] J. Yick, B. Mukherjee, D. Ghosal, Wireless sensor network survey, Comput. Networks 52 (12) (2008) [28] K. Akkaya, M. Demirbas, R.S. Aygun, The Impact of Data Aggregation on the Performance of Wireless Sensor Networks, Wiley Wireless Commun. Mobile Comput. (WCMC) J. 8 (2008) [29] E. Fasolo, M. Rossi, J. Widmer, M. Zorzi, In-network aggregation techniques for wireless sensor networks: a survey, IEEE Wireless Commun. 14 (2) (2007)

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS)

CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network Deepthi G B 1 Mrs. Netravati U M 2 P G Scholar (Digital Electronics), Assistant Professor Department of ECE Department

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (  1 Multiple Sensor Application using Secure Data Aggregation Shanthi.G.S 1, Chandrakala.K.R.S 2 1, 2 Department of Computer Science and Engineering, Sriram Engineering College,Perumalpattu 602 024 Abstract

More information

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Volume 2 Issue 9, 213, ISSN-2319-756 (Online) An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Nishi Sharma Rajasthan Technical University Kota, India Abstract: The popularity of Wireless

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina Rajasekaran 1, Rashmi 2 1 Asst. Professor, Department of Electronics and Communication, St. Joseph College of Engineering,

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Performance Comparison of Energy Efficient Clustering Protocol in Heterogeneous Wireless Sensor Network

Performance Comparison of Energy Efficient Clustering Protocol in Heterogeneous Wireless Sensor Network Performance Comparison of Energy Efficient Clustering Protocol in Heterogeneous Wireless Sensor Network Priyanka.B.Patil 1 Student,Department of Electronics &Telecommunication D.Y. Patil College of Engineering

More information

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

An Energy Efficient Clustering in Wireless Sensor Networks

An Energy Efficient Clustering in Wireless Sensor Networks , pp.37-42 http://dx.doi.org/10.14257/astl.2015.95.08 An Energy Efficient Clustering in Wireless Sensor Networks Se-Jung Lim 1, Gwang-Jun Kim 1* and Daehyon Kim 2 1 Department of computer engineering,

More information

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks S. Faisal 1, N. Javaid 1, A. Javaid 2, M. A. Khan 1, S. H. Bouk 1, Z. A. Khan 3 1 COMSATS Institute of Information Technology, Islamabad,

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks

Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks G. Beni (Assistant Professor) Department of Information Technology, C.S.I Institute of Technology, Thovalai, Tamil Nadu, India.

More information

Keywords Wireless Sensor Network, Cluster, Energy Efficiency, Heterogeneous network, Cluster, Gateway

Keywords Wireless Sensor Network, Cluster, Energy Efficiency, Heterogeneous network, Cluster, Gateway Energy Efficient (EEC) Clustered rotocol for Heterogeneous Wireless Sensor Network Surender Kumar Manish rateek Bharat Bhushan Department of Computer Engg Department of Computer Engg Department of Computer

More information

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK Md. Nadeem Enam 1, Ozair Ahmad 2 1 Department of ECE, Maulana Azad College of Engineering & Technology, Patna, (India)

More information

An Energy-efficient Distributed Self-organized Clustering Based Splitting and Merging in Wireless Sensor Networks

An Energy-efficient Distributed Self-organized Clustering Based Splitting and Merging in Wireless Sensor Networks RESEARCH ARTICLE OPEN ACCESS An Energy-efficient Distributed Self-organized Clustering Based Splitting and Merging in Wireless Sensor Networks Mrs.J.Monisha, PG scholar, Mrs.M.MuthuSelvi, Assistant Professor,

More information

SCH-BASED LEACH ALGORITHM TO ENHANCE THE NETWORK LIFE TIME IN WIRELESS SENSOR NETWORK (WSN)

SCH-BASED LEACH ALGORITHM TO ENHANCE THE NETWORK LIFE TIME IN WIRELESS SENSOR NETWORK (WSN) SCH-BASED LEACH ALGORITHM TO ENHANCE THE NETWORK LIFE TIME IN WIRELESS SENSOR NETWORK (WSN) Md. Nadeem Enam 1, Arun Kumar Bag 2 1 M.tech Student, 2 Assistant.Prof, Department of ECE, Bengal Institute of

More information

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 , pp.40-46 http://dx.doi.org/10.14257/astl.2016.142.07 TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 Hae Young Lee and Hyung-Jong Kim Department of Information Security

More information

New Data Clustering Algorithm (NDCA)

New Data Clustering Algorithm (NDCA) Vol. 7, No. 5, 216 New Data Clustering Algorithm () Abdullah Abdulkarem Mohammed Al-Matari Information Technology Department, Faculty of Computers and Information, Cairo University, Cairo, Egypt Prof.

More information

DE-LEACH: Distance and Energy Aware LEACH

DE-LEACH: Distance and Energy Aware LEACH DE-LEACH: Distance and Energy Aware LEACH Surender Kumar University of Petroleum and Energy Studies, India M.Prateek, N.J.Ahuja University of Petroleum and Energy Studies, India Bharat Bhushan Guru Nanak

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Low Energy Adaptive Clustering Hierarchy based routing Protocols Comparison for Wireless Sensor Networks

Low Energy Adaptive Clustering Hierarchy based routing Protocols Comparison for Wireless Sensor Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. II (Nov Dec. 2014), PP 56-61 Low Energy Adaptive Clustering Hierarchy based routing Protocols

More information

Clustering Based Effective and Ensures Data Dissemination in Wireless Sensor Network

Clustering Based Effective and Ensures Data Dissemination in Wireless Sensor Network Clustering Based Effective and Ensures Data Dissemination in Wireless Sensor Network Kavitha R 1 Radha Priya S 2 Assistant Professor Department of Computer Science KG College of Arts and Science Coimbatore

More information

Accepted 10 May 2014, Available online 01 June 2014, Vol.4, No.3 (June 2014)

Accepted 10 May 2014, Available online 01 June 2014, Vol.4, No.3 (June 2014) Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Performance

More information

Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network

Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network C.Divya1, N.Krishnan2, A.Petchiammal3 Center for Information Technology and Engineering Manonmaniam Sundaranar

More information

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing

More information

Hierarchical Energy Efficient Clustering Algorithm for WSN

Hierarchical Energy Efficient Clustering Algorithm for WSN Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 108-117, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.ssps.30 Hierarchical Energy

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME Jae Kwan Lee 1 and Tae Ho Cho 2 1, 2 College of Information and Communication Engineering,

More information

International Journal of Research in Advent Technology Available Online at:

International Journal of Research in Advent Technology Available Online at: HETEROGENEOUS CLUSTER BASED ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK- A SURVEY Padmavati 1, T.C. Aseri 2 1 2 CSE Dept 1 2 PEC University of Technology 1 padmavati@pec.ac.in, trilokchand@pec.ac.in ABSTARCT:

More information

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples Dalimir Orfanus (IFI UiO + ABB CRC), 27.10.2011, Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples Clustering in Wireless Sensor Networks Agenda LEACH Energy efficient

More information

Intrusion Resilience Using Self-Healing Mechanism in Mobile Unattended WSNs Yuvapiriyaa T #1, Pradeepa R *2

Intrusion Resilience Using Self-Healing Mechanism in Mobile Unattended WSNs Yuvapiriyaa T #1, Pradeepa R *2 ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK

IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 3, May-June 2016, pp. 99 107, Article ID: IJCET_07_03_009 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=3

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Comparative study on dynamic key-management techniques for cluster-based sensor networks

Comparative study on dynamic key-management techniques for cluster-based sensor networks Comparative study on dynamic key-management techniques for cluster-based sensor networks 1 Jaydeepsinh Barad, 2 Bintu Kadhiwala 1 PG Student, 2 Asst. Prof. 1 Department of Computer Engineering, 1 SCET

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2

More information

Abstract. 1. Introduction

Abstract. 1. Introduction SOOAWSN: A complete framework for Wireless Sensor Networks Graduate Student Paper Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela,

More information

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department

More information

Energy Consumption for Cluster Based Wireless Routing Protocols in Sensor Networks

Energy Consumption for Cluster Based Wireless Routing Protocols in Sensor Networks Energy Consumption for Cluster Based Wireless Routing Protocols in Sensor Networks 1 J.Daniel Mano, 2 Dr.S.Sathappan 1 Ph.D Research Scholar, 2 Associate Professor 1 Department of Computer Science 1 Erode

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK DRINA: A SECURE CLUSTERING ALGORITHM POONAM V. SADAFAL, RAHUL C. SALUNKHE Dept.

More information

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks R. Tanuja, M. K. Rekha, S. H. Manjula, K. R. Venugopal, S. S. Iyengar and L. M. Patnaik Abstract Wireless

More information

INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET)

INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976-6480 (Print) ISSN 0976-6499 (Online) Volume 4, Issue 1, January- February (2013), pp. 50-58 IAEME: www.iaeme.com/ijaret.asp

More information

Student, Dept of ECE, IFET College of Engineering, Villupuram 2. Associate Professor, Dept of ECE, IFET College of Engineering, Villupuram

Student, Dept of ECE, IFET College of Engineering, Villupuram 2. Associate Professor, Dept of ECE, IFET College of Engineering, Villupuram Enhancing the lifetime of WSN using distributed algorithm and balancing the cluster size. S.Divyadharshini. 1 and R.Murugan 2 1 Student, Dept of ECE, IFET College of Engineering, Villupuram 2 Associate

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level Ali Abdi Seyedkolaei 1 and Ali Zakerolhosseini 2 1 Department of Computer, Shahid Beheshti University, Tehran,

More information

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and

More information

Selective Forwarding Attacks Detection in WSNs

Selective Forwarding Attacks Detection in WSNs Selective Forwarding Attacks Detection in WSNs Naser M. Alajmi and Khaled M. Elleithy Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA nalajmi@my.bridgeport.edu,

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF

More information

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-

More information

Energy Efficient System for Wireless Sensor Networks using Modified RECHS Protocol

Energy Efficient System for Wireless Sensor Networks using Modified RECHS Protocol Energy Efficient System for Wireless Sensor Networks using Modified RECHS Protocol Mr. Nikhil Vilasrao Deshmukh Department of Electronics Engineering K.I.T. s College of Engineering Kolhapur, India n.deshmukh83@gmail.com

More information

An Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model. Zhang Ying-Hui

An Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model. Zhang Ying-Hui Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) An Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model Zhang Ying-Hui Software

More information

Adapting Distance Based Clustering Concept to a Heterogeneous Network

Adapting Distance Based Clustering Concept to a Heterogeneous Network International Journal of Computer Theory and Engineering, Vol. 7, No. 3, June 215 Adapting Distance Based Clustering Concept to a Heterogeneous Network N. Laloo, M. Z. A. A. Aungnoo, and M. S. Sunhaloo

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

Energy Efficient Clustering Protocol for Wireless Sensor Network

Energy Efficient Clustering Protocol for Wireless Sensor Network Energy Efficient Clustering Protocol for Wireless Sensor Network Shraddha Agrawal #1, Rajeev Pandey #2, Mahesh Motwani #3 # Department of Computer Science and Engineering UIT RGPV, Bhopal, India 1 45shraddha@gmail.com

More information

A ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN

A ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN A ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN Saranya.N 1, Sharmila.S 2, Jeevanantham.C 3 1,2,3 Assistant Professor, Department of ECE, SNS College of Engineering

More information

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable

More information

Heterogeneous LEACH Protocol for Wireless Sensor Networks

Heterogeneous LEACH Protocol for Wireless Sensor Networks Volume: 5 Issue: 1 Pages:1825-1829 (13) ISSN : 975-29 1825 Heterogeneous LEACH Protocol for Wireless Sensor Networks Nishi Sharma Department of Computer Science, Rajasthan Technical University Email: nishi.engg@gmail.com

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

Study on Wireless Sensor Networks Challenges and Routing Protocols

Study on Wireless Sensor Networks Challenges and Routing Protocols International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 5 (7): 824-828 Science Explorer Publications Study on Wireless Sensor Networks

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication

More information

Prianka.P 1, Thenral 2

Prianka.P 1, Thenral 2 An Efficient Routing Protocol design and Optimizing Sensor Coverage Area in Wireless Sensor Networks Prianka.P 1, Thenral 2 Department of Electronics Communication and Engineering, Ganadipathy Tulsi s

More information

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer

More information

Lifetime Enhancement of Wireless Sensor Networks using Duty Cycle, Network Coding and Cluster Head Selection Algorithm

Lifetime Enhancement of Wireless Sensor Networks using Duty Cycle, Network Coding and Cluster Head Selection Algorithm Lifetime Enhancement of Wireless Sensor Networks using Cycle, Network Coding and Cluster Head Selection Algorithm 1 Mrunal V. Funde, B.D.C.E Sevagram,Maharashtra,India, 2 Dr. M.A. Gaikwad, Principal, B.D.C.E

More information

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN: Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The

More information

An Improved Approach in Clustering Algorithm for Load Balancing in Wireless Sensor Networks

An Improved Approach in Clustering Algorithm for Load Balancing in Wireless Sensor Networks An Improved Approach in Clustering Algorithm for Load Balancing in Wireless Sensor Networks 1 J S Rauthan 1, S Mishra 2 Department of Computer Science & Engineering, B T Kumaon Institute of Technology,

More information

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network G.Premalatha 1, T.K.P.Rajagopal 2 Computer Science and Engineering Department, Kathir College of Engineering

More information

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department

More information

Energy Efficient Hierarchical Cluster-Based Routing for Wireless Sensor Networks

Energy Efficient Hierarchical Cluster-Based Routing for Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.4, April 2016 115 Energy Efficient Hierarchical Cluster-Based Routing for Wireless Sensor Networks Shideh Sadat Shirazi,

More information

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,

More information

SCALABLE MESSAGE AUTHENTICATION SCHEME BASED ON ECC IN WIRELESS SENSOR NETWORKS

SCALABLE MESSAGE AUTHENTICATION SCHEME BASED ON ECC IN WIRELESS SENSOR NETWORKS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 SCALABLE MESSAGE AUTHENTICATION SCHEME BASED ON ECC IN WIRELESS SENSOR NETWORKS Ms. S.Banumathi #1,Ms., Ms.M. Mr.

More information

Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack

Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack Jayanti Pandey, Dr. Achala Deshmukh M.E Student, Department of Electronics & Telecommunication, Sihngad College of Engineering,

More information

High Speed Data Collection in Wireless Sensor Network

High Speed Data Collection in Wireless Sensor Network High Speed Data Collection in Wireless Sensor Network Kamal Kr. Gola a, *, Bhumika Gupta b, Zubair Iqbal c a Department of Computer Science & Engineering, Uttarakhand Technical University, Uttarakhand,

More information

A Secure Routing Protocol for Wireless Adhoc Network Creation

A Secure Routing Protocol for Wireless Adhoc Network Creation Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88

More information

Energy Enhanced Base Station Controlled Dynamic Clustering Protocol for Wireless Sensor Networks

Energy Enhanced Base Station Controlled Dynamic Clustering Protocol for Wireless Sensor Networks Journal of Advances in Computer Networks, Vol. 1, No. 1, March 213 Energy Enhanced Base Station Controlled Dynamic Clustering Protocol for Wireless Sensor Networks K. Padmanabhan and P. Kamalakkannan consume

More information

Survivability Evaluation in Wireless Sensor Network

Survivability Evaluation in Wireless Sensor Network 2011 3rd International Conference on Advanced Management Science IPEDR vol.19 (2011) (2011) IACSIT Press, Singapore Survivability Evaluation in Wireless Sensor Network Vahid Mavaji 1, Bahareh Abbasi 2

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide

More information

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS 1 M.KARPAGAM, 2 DR.N.NAGARAJAN, 3 K.VIJAIPRIYA 1 Department of ECE, Assistant Professor, SKCET, Coimbatore, TamilNadu, India

More information

Energy Efficient Collection Tree Protocol in Wireless Sensor Networks

Energy Efficient Collection Tree Protocol in Wireless Sensor Networks Indian Journal of Science and Technology, Vol 9(45), DOI: 10.17485/ijst/2016/v9i45/89793, December 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Energy Efficient Collection Tree Protocol in Wireless

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION ABSTRACT 1st International Conference on Applied Soft Computing Techniques 22 & 23.04.2017 In association with International Journal of Scientific Research in Science and Technology Optimal Polling Point

More information

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor

More information

Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs

Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs Prabhleen Kaur Punjab Institute of Technology, Kapurthala (PTU Main Campus), Punjab India ABSTRACT Wireless Sensor Network has gained

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Enhancement of Hierarchy Cluster-Tree Routing for Wireless Sensor Network

Enhancement of Hierarchy Cluster-Tree Routing for Wireless Sensor Network Enhancement of Hierarchy Cluster-Tree Routing for Wireless Sensor Network Xuxing Ding Tel: 86-553-388-3560 E-mail: dxx200@163.com Fangfang Xie Tel: 86-553-388-3560 E-mail: fangtinglei@yahoo.com.cn Qing

More information

Energy Efficiency and Latency Improving In Wireless Sensor Networks

Energy Efficiency and Latency Improving In Wireless Sensor Networks Energy Efficiency and Latency Improving In Wireless Sensor Networks Vivekchandran K. C 1, Nikesh Narayan.P 2 1 PG Scholar, Department of Computer Science & Engineering, Malabar Institute of Technology,

More information

A Survey on Energy Efficient Hierarchical Routing Protocol in Wireless Sensor Network

A Survey on Energy Efficient Hierarchical Routing Protocol in Wireless Sensor Network International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) A Survey on Energy Efficient Hierarchical Routing Protocol in Wireless Sensor Network Kaushik N. Gotefode

More information

A Comprehensive Review of Distance and Density Based Cluster Head Selection Schemes

A Comprehensive Review of Distance and Density Based Cluster Head Selection Schemes Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

MESSCH PROTOCOL AN ENERGY EFFICIENT ROUTING PROTOCOL FOR WSN

MESSCH PROTOCOL AN ENERGY EFFICIENT ROUTING PROTOCOL FOR WSN MESSCH PROTOCOL AN ENERGY EFFICIENT ROUTING PROTOCOL FOR WSN Syed Tazirul Ilm 1 1 Assistant Professor, Dept. of Computer Science, AIMT, Guwahati, Assam, India. Abstract The rapid development in the diversified

More information