Review Paper on Secure Data Packet Transmission in Cluster Head and Base Station Using Wireless Sensor Network
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)Publication Date: 2015-03-05
Authors : Ashutosh S. Patil; Akhilesh A. Tyade;
Page : 2067-2072
Keywords : Cluster-based WSNs; secure data transmission protocol; enhanced secure data transmission protocol;
Abstract
Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. We study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. The LEACH in wireless sensor networks (WSNs) achieves good performance with reserving energy consumption and decreasing system delay. LEACH protocol does not consider a security issue for ensuring the protection of the network. So the security in LEACH is a complicated task. were we improved the LEACH protocol called a novel algorithm to select cluster heads with highest and balanced energy in wireless sensor networks to choose the cluster head with the highest energy. Were the cluster heads gathered data from the surrounding nodes and send it to the base station. But this data collecting from surrounding area to the cluster heads and base station without consider about security. We improved a novel algorithm to select cluster heads with highest and balanced energy in wireless sensor networks with authentication protocol to protect our previous work and network from attackers. This protocol uses RSA algorithms to secure packet during send to both cluster heads and base station. The results of simulation not only prolong the lifetime of wireless sensor networks, but also enhance routing security strongly.
Other Latest Articles
- Load Balancing in P2P Networks using Random Walk Algorithm
- The Alternate Low Cost Non Conventional Energy Production Plant - Bio Gas Plant in a Tertiary Hospital Center
- Finding Maximal Clique In A Graph
- Securing TCP/IP Stacks Using IP Tables
- New Secure and Advanced Algorithm for Stream Ciphers Extended RC4 and FPGA Implementation
Last modified: 2021-06-30 21:34:49