scholarly journals Trends of Recent Secure Communication System and its Effectiveness in Wireless Sensor Network

Author(s):  
Manjunath B ◽  
P.V. Rao
Author(s):  
Jose Javier Martinez ◽  
Peio Lopez-Iturri ◽  
Erik Aguirre ◽  
Leire Azpilicueta ◽  
Constantinos Patsakis ◽  
...  

Author(s):  
Ashim Pokharel ◽  
Ethiopia Nigussie

Due to limited energy resources, different design strategies have been proposed in order to achieve better energy efficiency in wireless sensor networks, and organizing sensor nodes into clusters and data aggregation are among such solutions. In this work, secure communication protocol is added to clustered wireless sensor network. Security is a very important requirement that keeps the overall system usable and reliable by protecting the information in the network from attackers. The proposed and implemented AES block cipher provides confidentiality to the communication between nodes and base station. The energy efficiency of LEACH clustered network and with added security is analyzed in detail. In LEACH clustering along with the implemented data aggregation technique 48% energy has been saved compared to not clustered and no aggregation network. The energy consumption overhead of the AES-based security is 9.14%. The implementation is done in Contiki and the simulation is carried out in Cooja emulator using sky motes.


Author(s):  
Md. Habibur Rahman ◽  
Md. Ibrahim Abdullah

The nodes within a cluster of Wireless Sensor Network deployed in adverse areas face the security threats of eavesdropping and capturing. The fundamental issue in wireless sensor network security is to initialize secure communication between sensor nodes by setting up secret keys between communicating nodes. Because of limited hardware capacity, conventional network cryptography is infeasible for sensor network. In this paper a key management technique is proposed for clustered sensor network that uses some cryptographic operation to generate secret keys. This key is updated in response to the message of cluster head or base station. The key update instructions are stored in each sensor nodes before deployed in sensor field. The updated secret key is used to communicate between nodes and cluster head.


2021 ◽  
Author(s):  
Abolfazl Mehbodniya ◽  
Prikshat Kumar Angra ◽  
V. Hindumathi ◽  
Satyendra Vishwakarma ◽  
P. Rajasekar ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document