Energy Efficient Secure Data Transmission in Wireless Sensor Network

Author(s):  
Venu Madhav Kuthadi ◽  
Rajalakshmi Selvaraj ◽  
Tshilidzi Marwala
10.29007/cchb ◽  
2018 ◽  
Author(s):  
Jignesh Joshi ◽  
Dr. Jagdish Rathod ◽  
Dr. Kinita Wandra

This paper proposes energy efficient LEACH protocol for secure data transmission for wireless networks. The proposed work uses Networks Simulator – NS2.27 for the simulation of cluster based routing protocol LEACH in wireless sensor network. The work is to enhance the performance of LEACH in terms of energy saving and secure data transmission. Instead of random selection of Cluster Head (CH) the selection method is based on residual energy and vicinity of the node. With this hybrid approach, the node, which is eligible for the CH, will become cluster head and it enhances the performance of traditional LEACH. Traditional LAECH does not support secure data transmission and authentication of nodes in the clusters. By adding security between CH and CM using XOR function and key management, secure data transmission and authentication is carried out for selected application where security is the most important aspect. The proposed LEACH enhances lifetime of the wireless sensor network with security.


Webology ◽  
2021 ◽  
Vol 18 (05) ◽  
pp. 1226-1235
Author(s):  
Vasuki C ◽  
Dr. Kavitha S ◽  
Bhuvaneswari S

Wireless sensor networks are greatly utilized by various applications and environments to sense and transmit the data. As wireless sensor network doesn’t have any centralized architecture, there will be various issues occurs in the network such as data transmission failure, data security issues, energy resource limitation and so on. Various authors focused these issues and published different research works to resolve these issues. In this analysis work, energy efficient and secured data transmission techniques introduced by various authors has been discussed in detailed based on their working procedure and simulation methods. And also this research work provided the overall analysis of the research work based on merits and demerits and each and every technique discussed in the literature section. And also, this research work concluded with numerical evaluation between most recent works in terms of energy consumption and security level. This numerical evaluation is done in the NS2 simulation environment.


Wireless Sensor Network (WSN) is developed extremely because of their low installation cost and various applications. WSN has compact and inexpensive sensor nodes for monitoring the physical environment. WSNs are susceptible to many attacks (e.g. malicious nodes) because of its distinct characteristics. The performance of node and network is affected by the malicious nodes. Moreover, the communication among the sensor nodes also required to be secured for preventing the data from the hackers. In this paper, the architecture of the WSN is generated by using the Fuzzy-C-Means clustering (FCM). Then the detection of the malicious nodes is performed by using the Acknowledgement Scheme (AS). This AS is integrated in the Ant Colony Optimization (ACO) based routing for avoiding the malicious nodes while generating the route from the source to the Base Station (BS). Then the Hybrid Encryption Algorithm (HEA) is used for performing the secure data transmission through the network and this proposed method is named as HEA-AS. The performance of the HEA-AS method is evaluated in terms of End to End Delay (EED), network lifetime, throughput, Packet Delivery Ratio (PDR) and Packet Loss Ratio (PLR). The proposed HEA-AS method is compared with the existing method called as CTCM to evaluate the effectiveness of the HEA-AS method.


2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Dae-Young Kim ◽  
Zilong Jin ◽  
Jungwook Choi ◽  
Ben Lee ◽  
Jinsung Cho

In a wireless sensor network, sensor nodes are deployed in an ad hoc fashion and they deliver data packets using multihop transmission. However, transmission failures occur frequently in the multihop transmission over wireless media. Thus, a loss recovery mechanism is required to provide end-to-end reliability. In addition, because the sensor nodes are very small devices and have insufficient resources, energy-efficient data transmission is crucial for prolonging the lifetime of a wireless sensor network. This paper proposes a transmission power control mechanism for reliable data transmission, which satisfies communication reliability through recovery of lost packets. The proposed method calculates packet reception rate (PRR) of each hop to maintain end-to-end packet delivery rate (PDR), which is determined based on the desired communication reliability. Then, the transmission power is adjusted based on the PRR to reduce energy consumption. The proposed method was evaluated through extensive simulations, and the results show that it leads to more energy-efficient data transmission compared to existing methods.


Sign in / Sign up

Export Citation Format

Share Document