Open Access Open Access  Restricted Access Subscription Access

Detecting and Replacing Beacon Node Failure and Secure Communication in WSNs (DRBF)


Affiliations
1 Department of Electronics and Communication Engineering, St. Peter’s University, Chennai - 600054, Tamil Nadu, India
2 Department of Electronics and Communication Engineering, Sathyabama University, Chennai - 600119, Tamil Nadu, India
 

Objective: The objective of this scheme is to improve the quality of service in WSNs. Method: In this paper, we propose Detecting and Replacing Beacon Node Failure (DRBF) and Secure Communication in WSNs. DRBF focus on Beacon Node Failure and reliable data transmission in WSNs. Findings: The beacon node fails due to resource, hardware failure or some other reasons whereas the Base Station (BS) replaces that beacon node by mobile user. This mobile user acts as the beacon nodes and updates the location information to the sensor nodes. The cryptography key technique provides secure data transmission to the network. Improvement: The DRBF reduces both the packet loss rate and delay, which are shown in the simulation results.

Keywords

Beacon Node, Clustering, Key Management, Localization, Mobile User, Security.
User

Abstract Views: 159

PDF Views: 0




  • Detecting and Replacing Beacon Node Failure and Secure Communication in WSNs (DRBF)

Abstract Views: 159  |  PDF Views: 0

Authors

S. Velmurugan
Department of Electronics and Communication Engineering, St. Peter’s University, Chennai - 600054, Tamil Nadu, India
E. Logashanmugam
Department of Electronics and Communication Engineering, Sathyabama University, Chennai - 600119, Tamil Nadu, India

Abstract


Objective: The objective of this scheme is to improve the quality of service in WSNs. Method: In this paper, we propose Detecting and Replacing Beacon Node Failure (DRBF) and Secure Communication in WSNs. DRBF focus on Beacon Node Failure and reliable data transmission in WSNs. Findings: The beacon node fails due to resource, hardware failure or some other reasons whereas the Base Station (BS) replaces that beacon node by mobile user. This mobile user acts as the beacon nodes and updates the location information to the sensor nodes. The cryptography key technique provides secure data transmission to the network. Improvement: The DRBF reduces both the packet loss rate and delay, which are shown in the simulation results.

Keywords


Beacon Node, Clustering, Key Management, Localization, Mobile User, Security.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i39%2F126231