Recouping the Modified Data in Intruder-Based Environment
Sensor networks are playing an important role in many applications. These networks mainly used as monitoring tool are deployed in harsh and unsupervised environment. Hence securing these nodes and the data which is being transmitted becomes a basic requirement. To adapt security to the network, the study uses cluster-based arrangement of nodes. The encryption key is generated based on location, which enhances security by incorporating authentication, reliability and confidentiality of data. The packets are being analysed for its fidelity by the nodes which fall in path of the base station. Compared to the previous contributions certain amount of energy is conserved. Addition to this procedure, the data can be retrieved if modified by the adversary. The scheme enhances the security against sinkhole, wormhole and Sybil attacks.