SecNRCC: a loss-tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks

2014 ◽  
Vol 27 (10) ◽  
pp. 2668-2680 ◽  
Author(s):  
Mande Xie ◽  
Urmila Bhanja ◽  
Guiyi Wei ◽  
Yun Ling ◽  
Mohammad Mehedi Hassan ◽  
...  
Author(s):  
C. R. Bharathi ◽  
Alapati Naresh ◽  
Arepalli Peda Gopi ◽  
Lakshman Narayana Vejendla

In wireless sensor networks (WSN), the majority of the inquiries are issued at the base station. WSN applications frequently require collaboration among countless sensor nodes in a network. One precedent is to persistently screen a region and report occasions. A sensor node in a WSN is initially allocated with an energy level, and based on the tasks of that sensor node, energy will be reduced. In this chapter, two proposed methods for secure network cluster formation and authentication are discussed. When a network is established then all the nodes in it must register with cluster head and then authentication is performed. The selection of cluster head is done using a novel selection algorithm and for authenticating the nodes. Also, a novel algorithm for authentication is used in this chapter. The validation and authorization of nodes are carried over by managing the keys in WSN. The results have been analyzed using NS2 simulator with an aid of list of relevant parameters.


2009 ◽  
pp. n/a-n/a ◽  
Author(s):  
Sungkyu Cho ◽  
Hyojeong Shin ◽  
Seungjae Han ◽  
Hojung Cha ◽  
Rhan Ha

Sign in / Sign up

Export Citation Format

Share Document