CFP last date
20 January 2025
Reseach Article

Performance Analysis of Security in Flat and Hierarchical routing protocols for Distributed Sensor Networks

Published on None 2011 by Suresha, Dr. Nalini .N
International Conference on VLSI, Communication & Instrumentation
Foundation of Computer Science USA
ICVCI - Number 17
None 2011
Authors: Suresha, Dr. Nalini .N
814040de-4db8-42e9-8b04-bf4eeb4981be

Suresha, Dr. Nalini .N . Performance Analysis of Security in Flat and Hierarchical routing protocols for Distributed Sensor Networks. International Conference on VLSI, Communication & Instrumentation. ICVCI, 17 (None 2011), 13-18.

@article{
author = { Suresha, Dr. Nalini .N },
title = { Performance Analysis of Security in Flat and Hierarchical routing protocols for Distributed Sensor Networks },
journal = { International Conference on VLSI, Communication & Instrumentation },
issue_date = { None 2011 },
volume = { ICVCI },
number = { 17 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 13-18 },
numpages = 6,
url = { /proceedings/icvci/number17/2756-1641/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on VLSI, Communication & Instrumentation
%A Suresha
%A Dr. Nalini .N
%T Performance Analysis of Security in Flat and Hierarchical routing protocols for Distributed Sensor Networks
%J International Conference on VLSI, Communication & Instrumentation
%@ 0975-8887
%V ICVCI
%N 17
%P 13-18
%D 2011
%I International Journal of Computer Applications
Abstract

Distributed Sensor Networks (DSNs) are an emerging technology, recently finding extensive application in scientific and military surveillance. DSNs operate under severe energy constraints and are largely characterized by short range a multi-hop data transmission, which drives the need for energy-efficient routing schemes in such networks. In this paper, the comparisons of Flat and Hierarchical protocols have been made with respect to Energy Dissipation for transmission of data and also with and without security features for the routing protocols. The proposed model estimates the energy required for providing security features for the routing protocols.

References
  1. routing and reliability issues in distributed sensor networks," Signal Processing, IEEE Transactions on , vol.40, no.12, pp.3012-3021, Dec 1992.
  2. Zhao, Shousheng; Yu, Fengqi; Zhao, Baohua; , "An Energy Efficient Directed Diffusion Routing Protocol," Computational Intelligence and Security, 2007 International Conference on , vol., no., pp.1067-1072, 15-19 Dec. 2007
  3. Cryptography & Network Security, Behrouz A. forouzan, The McGraw-Hill Companies, Edition 2007.
  4. Cryptography and Network Security, Principles and Practices, William Stallings, Eastern Economy Edition, Fourth edition.
  5. Lauter, K, "The advantages of elliptic curve cryptography for wireless security," Wireless Communications, IEEE , vol.11, no.1, pp. 62- 67, Feb 2004
  6. Zhiyong Peng; Xiaojuan Li; "The improvement and simulation of LEACH protocol for WSNs," Software Engineering and Service Sciences (ICSESS), 2010 IEEE International Conference on , vol., no., pp.500-503, 16-18 July 2010.
  7. Intanagonwiwat, C.; Govindan, R.; Estrin, D.; Heidemann, J.; Silva, F.; "Directed diffusion for wireless sensor networking," Networking, IEEE/ACM Transactions on , vol.11, no.1, pp. 2- 16, Feb
  8. W. R.Heinzelman, A. Chandrakasan, and H. Balakrishnan,Energy-efficient communication protocols for wireless micro sensor networks", Proc. Hawaii Int. Conf. Systems Sciences, pp. 3005 - 3014, 2000.
  9. http://www.cmpe.boun.edu.tr/courses/cmpe526/spring2005/C mpe526-20050324-AliAkkaya-PublicKeyCryptography.pdf
  10. Nishanth T.S, Rajesh A.N.K.S, Aditya Bharadwaj B N, Nikhil Chakravarthi M S, Dr.Nalini, Suresha, Mylara Reddy. C. ” Implementation and Comparison of LEACH and NON-LEACH Protocols in Wireless Sensor Networks”, IC-CANA 2011, International Conference, NAMA Institute of Technology, Nitte, 8-9 Jan 2011.
  11. Jing Chen; Hong Shen; , "MELEACH-L: More Energy- Efficient LEACH for Large-Scale WSNs," Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on , vol., no., pp.1-4, 12-14
  12. Xueying Zhang; Heys, H.M.; Cheng Li; , "An Analysis of Link Layer Encryption Schemes in Wireless Sensor Networks," Communications (ICC), 2010 IEEE International Conference on , vol., no., pp.1-6, 23-27 May 2010.
  13. http://research.microsoft.com/enus/um/people/klauter/ieeefina l.pdf
Index Terms

Computer Science
Information Sciences

Keywords

Routing Protocols Security Directed Diffusion LEACH ECC Elgamal