Open Access   Article Go Back

A Problem Evaluation of Algorithm for Secure Node Authentication in Wireless Sensor Network

Jatinder Kaur1 , Er. Navroz Kahlon2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 660-666, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.660666

Online published on Aug 31, 2018

Copyright © Jatinder Kaur, Er. Navroz Kahlon . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jatinder Kaur, Er. Navroz Kahlon , “A Problem Evaluation of Algorithm for Secure Node Authentication in Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.660-666, 2018.

MLA Style Citation: Jatinder Kaur, Er. Navroz Kahlon "A Problem Evaluation of Algorithm for Secure Node Authentication in Wireless Sensor Network." International Journal of Computer Sciences and Engineering 6.8 (2018): 660-666.

APA Style Citation: Jatinder Kaur, Er. Navroz Kahlon , (2018). A Problem Evaluation of Algorithm for Secure Node Authentication in Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 6(8), 660-666.

BibTex Style Citation:
@article{Kaur_2018,
author = {Jatinder Kaur, Er. Navroz Kahlon },
title = {A Problem Evaluation of Algorithm for Secure Node Authentication in Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {660-666},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2751},
doi = {https://doi.org/10.26438/ijcse/v6i8.660666}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.660666}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2751
TI - A Problem Evaluation of Algorithm for Secure Node Authentication in Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - Jatinder Kaur, Er. Navroz Kahlon
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 660-666
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
299 221 downloads 106 downloads
  
  
           

Abstract

The Wireless sensor is an improved technology for gathering highly sensitive information. Wireless sensor devices are used to gather this information with the help of sensing nodes. These devices are used in various fields but the rapid consumption of energy in wireless network and its usage is still a challenge for researchers. This paper has been designed to provide the security to user credentials as well as private key distribution for the data transmission of secure. We are proposing a new algorithm in this research paper to trim down the consumption of energy as well as to provide security in the network. It will improve the lifespan of the network.

Key-Words / Index Term

Wireless sensor network (WSN), cluster head, authentication, Homomorphic algorithm, energy consumption, LEACH

References

[1]. Geetha D. Devanagavi, N. Nalini .”Trusted Neighbors Based Secured Routing Scheme Using Agents.” Springer transactions on routing algorithm,014-1704-4. 2014.
[2]. Monia , Sushma Jain ,Sukhchandan randhava .” An Efficient Trust Management Algorithm in Wireless Sensor Network .”Springer 0287-8_26. 2016
[3]. Mukesh Kumar and Kamlesh Dutta.“.A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks.” Springer India . 2009.
[4]. Vinod Kumar, Surinder Singh, N.P. Pathak .”Various trusted and reputation models wireless sensor networks.” Springer Science ,1144-4. 2015
[5]. Weidong Fang , Chuanlei Zhang , Shi Qing Zhao. “Evaluation system and reputation Beta-based Trust in WSN” 1084-8045 Published by Elsevier Ltd. 2015
[6]. X Anita , M.A. Bhagyaveni. “Collaborative Lightweight Trust Management Scheme.” Published in Springer Science ,014-1998-2. 2014
[7]. Yun Liu, Qing-An Zeng. “.Improved trust management scheme for secure data aggregation” .Springer publications 015-0078-6. 2015
[8]. Yannis Stelios, Sitiris Maniatis, Helen C. Leligoug. “.Routing based Distributed Energy-Aware Trust Management System in Wireless Sensor Networks”. Institute for Computer Sciences and Telecommunication 85-92. 2016
[9]. Rong Fan, Ling-Di Ping, Jian-Qing Fu , Xue-Zeng.” Two tired architecture of WSN.” Pan College of Computer Science and Technology Zhejiang University 5626600.2010
[10]. Gun-Wook Choi . “paired base key distribution scheme in wireless sensor network.”IEEE publication 10.1109. 2017
[11]. Karim ZKIK Ghizlane ORHANOU Said EL HAJJI .” Secure framework using ECC”.10.1109/ICEngTechnol.2017.8308144 .2017
[12]. longzhe Han , Xin Song, Yi Buz .” province key laboratory of water information cooperative sensing processing” 330099. 2015
[13]. Kamal, L.K. W- LEACH, abdulsalam .” Weighted low energy adaptive clustering hierarchy aggregation algorithm for data stream in WSN”. IEEE 1-8. 2010
[14]. Younis, M A, Akkaya. “ A survey on routing protocols for WSNs”. 325-349. 2005
[15]. .” A survey on sensor networks.” IEEE communication. 102 - 14.2016
[16]. Kamal, A.E. “Routing techniques in wireless sensor networks.” IEEE, 6-28.2012
[17]. Maja J Matari c, Andrew Howard and Gaurav S Sukhatme .”Mobile sensor network deployment using potential fields”. DARS02 425-6788.2010
[18]. Holliday, J,Ding..”A distributed energy efficient hierarchical clustering for wireless sensor network”. IEEE conference on distributed computing in sensor networks. 322-339. Fan, X.; Song, Y. Improvement on LEACH Protocol of Wireless Sensor Network. In Proceedings of International Conference on Sensor Technologies and Applications, Valencia, Spain, 14–20 October 2007, pp. 260–264. 2015
[19]. Fereris , Kowshik,N.M. H Kumar. “Fundamentals of large sensor networks.” IEEE, 98, 1828-1846. 2010
[20]. A. bestavros, G. Smaragdakis, I. Matta,.” A stable selection protocol for herogenous wireless sensor network.”1245-1267. 2017
[21]. Halpern, Haas, Z,J, Li, L . “Gossip based adhoc routing in WSN.” INFOCOM, New York, pp. 1707-1716. 2016