Sheltered and Dexterous Data Communication for Team- Based Wireless Antenna Networks

International Journal of Computer Science and Engineering
© 2015 by SSRG - IJCSE Journal
Volume 2 Issue 7
Year of Publication : 2015
Authors : S Palani, N.Manikantan, P.Viswanatha Reddy

pdf
Citation:
MLA Style:

S Palani, N.Manikantan, P.Viswanatha Reddy, "Sheltered and Dexterous Data Communication for Team- Based Wireless Antenna Networks" SSRG International Journal of Computer Science and Engineering 2.7 (2015): 22-26.

APA Style:

S Palani, N.Manikantan, P.Viswanatha Reddy, (2015). Sheltered and Dexterous Data Communication for Team- Based Wireless Antenna Networks. SSRG International Journal of Computer Science and Engineering 2.7, 22-26.

Abstract:

Sheltered information Communication is a basic issue for Wireless Sensor Networks (WSNs). Grouping is a powerful and viable approach to upgrade the framework execution of WSNs. In this project, we concentrate on a protected information transmission for bunch based WSNs (CWSNs), where the bunches are framed progressively and occasionally. We propose two Secure and Efficient information Transmission (SET) conventions for CWSNs, called SET-IBS and SET-IBOOS, by utilizing the Identity- Based computerized Signature (IBS) plan and the Identity-Based Online/Offline advanced Signature (IBOOS) plan, separately. In SET-IBS, security depends on the hardness of the Diffie-Hellman issue in the blending space. SET-IBOOS further diminishes the computational overhead for convention security, which is pivotal for WSNs, while its security depends on the hardness of the discrete logarithm issue. We demonstrate the practicality of the SET-IBS and SET-IBOOS conventions as for the security necessities and security investigation against different assaults. The computations and reproductions are given to represent the effectiveness of the proposed conventions. The outcomes demonstrate that, the proposed conventions have preferable execution over the current secure conventions for CWSNs, regarding security overhead and vitality utilization

References:

[1] T. Hara, V.I. Zadorozhny, and E. Buchmann, Wireless Sensor Network Technologies for the Information Explosion Era, Studies in Computational Intelligence, vol. 278. Springer-Verlag, 2010. 
[2] S. Xu, Y. Mu, and W. Susilo, “Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security,” Proc. 11th Australasian Conf. Information Security and Privacy, pp. 99-110, 2006. 
[3] K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management,” Proc. Fourth Int’l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM), pp. 1-5, 2008. 
[4] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007. 
[5] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47-53, 1985. 
[6] S. Even, O. Goldreich, and S. Micali, “On-Line/Off-Line Digital Signatures,” Proc. Advances in Cryptology (CRYPTO), pp. 263-275, 1990. 
[7] J. Liu et al., “Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network,” Int’l J. Information Security, vol. 9, no. 4, pp. 287-296, 2010. 
[8] K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management,” Proc. Fourth Int’l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM), pp. 1-5, 2008. 
[9] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006. 
[10] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Micro sensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660- 670, Oct. 2002.

Key Words:

SET-IBS, SET-IBOOS, Clustering and CO-CO Transmission.