ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor Networks

Journal: International Journal for Modern Trends in Science and Technology (IJMTST) (Vol.2, No. 4)

Publication Date:

Authors : ;

Page : 77-85

Keywords : Volume: 2 | Issue: 04 | April 2016 | ISSN: 2455-3778;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A Novel Energy-efficient Min-max Optimization (NEMO) is proposed to improve the data delivery performance and provide security in WSN. The NEMO scheme is applied in the virtual grid environment to periodically collect the data from source node to the mobile sink through the cell headers. Here the movement of sink is in controlled fashion and collects the data from the border line cell headers. For efficient data delivery Fruit Fly Optimization (FFO) algorithm is applied here to find the best path by using the fitness value calculated between the nodes based on the distance. The optimal path is chosen by first calculating the minimum hop count paths and then finds the maximum of total fitness value along those paths. In that way best path is selected by considering the shortest path which improves the data delivery performance and also it minimizes the energy consumption. The proposed scheme enables the sensor nodes to maintain the optimal path towards the latest location of mobile sink by using the FFO algorithm which leads to maximize the network lifetime in wireless sensor networks. RSA digital signature is used to provide the security between the intermediate nodes during the data delivery. The source node generates the keys and broadcast it to all other nodes in the network. Source node signs the data using its private key and the intermediate nodes verifies the data using the source’s public key which is already broadcasted by the source node. If the data is valid then it forwards to the next intermediate nodes and till the sink node gets the data, forwarding takes place. Else the data packets are dropped and inform that node as misbehaving node and the source chooses the next best path without having that misbehaving node in the path..

Last modified: 2016-04-28 12:31:11