CFP last date
20 January 2025
Reseach Article

Implementation and Result Analysis of Secure Strategy for High Speed Transmission and Efficient Collection of Data in Wireless Sensor Network

by Kamal Kr. Gola, Bhumika Gupta, Zubair Iqbal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 12
Year of Publication: 2014
Authors: Kamal Kr. Gola, Bhumika Gupta, Zubair Iqbal
10.5120/18963-0297

Kamal Kr. Gola, Bhumika Gupta, Zubair Iqbal . Implementation and Result Analysis of Secure Strategy for High Speed Transmission and Efficient Collection of Data in Wireless Sensor Network. International Journal of Computer Applications. 108, 12 ( December 2014), 19-27. DOI=10.5120/18963-0297

@article{ 10.5120/18963-0297,
author = { Kamal Kr. Gola, Bhumika Gupta, Zubair Iqbal },
title = { Implementation and Result Analysis of Secure Strategy for High Speed Transmission and Efficient Collection of Data in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 12 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 19-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number12/18963-0297/ },
doi = { 10.5120/18963-0297 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:42:48.061667+05:30
%A Kamal Kr. Gola
%A Bhumika Gupta
%A Zubair Iqbal
%T Implementation and Result Analysis of Secure Strategy for High Speed Transmission and Efficient Collection of Data in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 12
%P 19-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this work, the main focus is to provide Security in WSN (wireless sensor networks) as well as to provide the strategy to collect the high speed data in an efficient manner. Sensor networks are usually deployed in hostile and unattended environment where an adversary can read and modify the content of the data packet. In such situation the most popular type of attack is the external attack and replay attack. The node needs to be authenticated before data transmission takes place. In external attack the node does not belong to the network try to read and modify the packet. For that we also need to authenticate the node before data transmission. To overcome this problem we are using the concept of public and private key (Modified RSA Digital Signature Scheme). So this work tries to develop an algorithm which will form a network structure in wireless sensor network through which data can be transmitted faster to the base station without affecting life time of network and it also provide the security during communication. The cluster head in a cluster is generally involved in long distance transmission that's why its energy level decreases faster than other cluster members in a cluster. To overcome this problem we used the concept of re-clustering to rotate the responsibility of cluster head among the cluster members in a cluster so that energy can be properly distributed among the nodes.

References
  1. Yao, Y. and Gehrke, J. , September 2002. The cougar approach to in-network query processing in sensor networks. In SIGMOD Record.
  2. Karlof, Chris. and Wagner, David. , September 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol. 1, issue 2-3, pages 293–315.
  3. Newsome, James. Shi, Elaine. Song, Dawn. and Perrig, Adrian. The Sybil attack in sensor networks: analysis& defenses. In IPSN'04: Proceedings of the third international symposium on Information processing in sensor networks 2004, pages 259–268, New York, NY, USA, ACM Press.
  4. Anthony D. Wood and John A. Stankovic. , 2002. Denial of service in sensor networks", IEEE Computer, vol. 35, issue 10, pages 54–62.
  5. Heinzelman, W. R. Chandrakasan, A. and Balakrishnan, H. , October 2002. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Tmnsactions on Wireless Communications. Vol. 1(4), pp. 660-670.
  6. Lindsey, S. and Raghavendra, C. S. PEGASIS: Power-efficient Gathering in Sensor Information System. Proceedings IEEE Aerospace Conference Mar, 2002, vol. 3, Big Sky, MT, pp. 1125-1130.
  7. H¨useyin Ozg¨ur Tan. and Ibrahim K Orpeoglu. , 2003. Power efficient data gathering and aggregation in wireless sensor networks. ACM Sigmod Record, 32 (4): 66–71.
  8. Sun, Xianwei. C-H Huang, Scott. and Li, Minming. , 2012. Data collection time in sensor networks", In Wireless Algorithms, Systems, and Applications, pages 120–131. Springer.
  9. Wang, Weizhao. Wang, Yang Li, Yu. Wen-Zhan Song, Xiang and Frieder, Ophir. Efficient interference-aware TDMA link scheduling for static wireless networks. In Proceedings of the 12th annual international conference on Mobile computing and networking,2006, pages 262–273. ACM.
  10. Chatterjee, M. Das, and Turgut. , 2001. WCA: a weighted clustering algorithm for mobile ad hoc networks. Cluster Computing, Vol. 5, No. 2, pp. 193–204.
  11. Cheng-Hsi and Wu Tzung-Pei Hong, "An Improved Weighted Clustering Algorithm for Determination of Application Nodes in Heterogeneous Sensor Networks", Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, pp. 173-184, (2011).
  12. Bathla, Gaurav. Khan, Gulista. ,2011. Energy efficient routing protocol for Homogeneous WSN, International Journal of Cloud Computing services and Architecture(IJCCSA), Volume 1,Number 2.
  13. Khan, Gulista. Ali, Wajid. Arya, Swati. Sharma,Vaibhav. , Feb 2014. Green Routing Strategy For Dynamically Arranged Omogeneous Wsn- Msct2, International Journal Of Computers & Technology, Vol 12, No. 6.
  14. Heinzelman, W. R. Chandrakasan, A. and Balakrishnan, H. , Energy Efficient Communication Protocol forWireless Microsensor Networks. in Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS'00), Jan, 2000, Maui, HI, pp. 3005-3014
Index Terms

Computer Science
Information Sciences

Keywords

WSN energy efficient cluster head data aggregation function shortest path algorithm base station modified RSA digital signature scheme re-clustering process and QoS parameters.