Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Study and Modelling for Improving Secure Communication in Wireless Sensor Networks


Affiliations
1 Department of Computer Science and Engineering, Anand Institute of Higher Technology, Chennai, Tamil Nadu, India
     

   Subscribe/Renew Journal


Storage nodes play a vital role in wireless sensor networks for carrying out the storage activity of data sent by the sensor node once after capturing the details of the environment and in turn to answer the sensor data related query to the network owner. Because of the less storage capacity on the sensor node, storage node takes the whole responsibility for pre-processing the data as well as to respond to queries returned by the owner. Duplicate sensor/storage node imposes a major threat to the wireless sensor networks. The proposed approach focusses on carrying out the effective techniques for data transfer by using Elliptic Curve Encryption for encrypting the image captured from the environment and also to transmit the encrypted critical text data from source to destination, aggregate Signature to validate the sender of the message for data verification, steganography to hide the encrypted content within an image. The proposed ideas are well suited for transferring the details secure in WSN.

Keywords

ECC, Steganography, Aggregate Signature, Wireless Sensor Networks (WSN), Reliability.
Subscription Login to verify subscription
User
Notifications
Font Size


  • Butun, I., Morgera, S. D., & Sankar, R (2014). A Survey of Intrusion Detection Systems in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 12(6), 2818-2822.
  • Cristofaro, E. D., & Pietro, R. D. (2013). Adversaries and Counter-measures in Privacy-enhanced Urban Sensing Systems. IEEE Systems Journal, 7(2), 312-320.
  • Hasan, O., Brunie, L., Bertino, E., & Shang, N. (2013). A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. IEEE Transactions on Information Forensics and Security, 8(6), 950-960.
  • He, D., Chan, S., & Tang, S. (2014). A Novel and Lightweight System to Secure Wireless Medical Sensor Networks. IEEE Journal of Biomedical and Health Informatics, 18(1), 317-324.
  • Li, F., Luo, B., Liu, P., Lee, D., & Chu, C. H. (2013). Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. IEEE Transactions on Information Forensics and Security, 8(6), 889-895.
  • Mahmoud, M. M. E. A., Taha, S., Misicand, J., & Shen, X. S. (2014). Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks. IEEE Transactions on Parallel and Distributed systems, 25(8), 2078-2088.
  • Lu, H., Li, J., & Guizani, M. (2014). Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks. IEEE Transactions on Knowledge and Data Engineering, 26(8), 1854-1864.
  • Yu, C. M., Ni, G. K., Chen, I. Y., Gelenbe, E., & Kuo, S. (2014). Top-k Query Result Completeness Verification in Tiered Sensor Networks. IEEE Transactions on Information Forensics and Security, 9(1), 109-123.
  • Yu, L., Li, J., Cheng, S., Xiong, S., & Shen, H. (2014). Secure Continuous Aggregation in Wireless Networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 763-773
  • Zhang, R., Shi, J., Zhang, Y., & Huang, X. (2014). Secure Top-k Query Processing in Unattended Tiered Sensor Networks. IEEE Communication and Information System, Huazhong University of Science and Technology, 25(3), 763-773.
  • Chen, T., & Chen, L. (2013). Optimizing Multi-Top-k Queries over Uncertain Data Streams. IEEE Transactions on Knowledge and Data Engineering, August.

Abstract Views: 387

PDF Views: 0




  • A Study and Modelling for Improving Secure Communication in Wireless Sensor Networks

Abstract Views: 387  |  PDF Views: 0

Authors

B. Vidhya
Department of Computer Science and Engineering, Anand Institute of Higher Technology, Chennai, Tamil Nadu, India
Mary Joseph
Department of Computer Science and Engineering, Anand Institute of Higher Technology, Chennai, Tamil Nadu, India
D. Rajini Girinath
Department of Computer Science and Engineering, Anand Institute of Higher Technology, Chennai, Tamil Nadu, India
A. Malathi
Department of Computer Science and Engineering, Anand Institute of Higher Technology, Chennai, Tamil Nadu, India

Abstract


Storage nodes play a vital role in wireless sensor networks for carrying out the storage activity of data sent by the sensor node once after capturing the details of the environment and in turn to answer the sensor data related query to the network owner. Because of the less storage capacity on the sensor node, storage node takes the whole responsibility for pre-processing the data as well as to respond to queries returned by the owner. Duplicate sensor/storage node imposes a major threat to the wireless sensor networks. The proposed approach focusses on carrying out the effective techniques for data transfer by using Elliptic Curve Encryption for encrypting the image captured from the environment and also to transmit the encrypted critical text data from source to destination, aggregate Signature to validate the sender of the message for data verification, steganography to hide the encrypted content within an image. The proposed ideas are well suited for transferring the details secure in WSN.

Keywords


ECC, Steganography, Aggregate Signature, Wireless Sensor Networks (WSN), Reliability.

References