Open Access
Subscription Access
Open Access
Subscription Access
A Study and Modelling for Improving Secure Communication in Wireless Sensor Networks
Subscribe/Renew Journal
Storage nodes play a vital role in wireless sensor networks for carrying out the storage activity of data sent by the sensor node once after capturing the details of the environment and in turn to answer the sensor data related query to the network owner. Because of the less storage capacity on the sensor node, storage node takes the whole responsibility for pre-processing the data as well as to respond to queries returned by the owner. Duplicate sensor/storage node imposes a major threat to the wireless sensor networks. The proposed approach focusses on carrying out the effective techniques for data transfer by using Elliptic Curve Encryption for encrypting the image captured from the environment and also to transmit the encrypted critical text data from source to destination, aggregate Signature to validate the sender of the message for data verification, steganography to hide the encrypted content within an image. The proposed ideas are well suited for transferring the details secure in WSN.
Keywords
ECC, Steganography, Aggregate Signature, Wireless Sensor Networks (WSN), Reliability.
Subscription
Login to verify subscription
User
Font Size
Information
- Butun, I., Morgera, S. D., & Sankar, R (2014). A Survey of Intrusion Detection Systems in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 12(6), 2818-2822.
- Cristofaro, E. D., & Pietro, R. D. (2013). Adversaries and Counter-measures in Privacy-enhanced Urban Sensing Systems. IEEE Systems Journal, 7(2), 312-320.
- Hasan, O., Brunie, L., Bertino, E., & Shang, N. (2013). A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. IEEE Transactions on Information Forensics and Security, 8(6), 950-960.
- He, D., Chan, S., & Tang, S. (2014). A Novel and Lightweight System to Secure Wireless Medical Sensor Networks. IEEE Journal of Biomedical and Health Informatics, 18(1), 317-324.
- Li, F., Luo, B., Liu, P., Lee, D., & Chu, C. H. (2013). Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. IEEE Transactions on Information Forensics and Security, 8(6), 889-895.
- Mahmoud, M. M. E. A., Taha, S., Misicand, J., & Shen, X. S. (2014). Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks. IEEE Transactions on Parallel and Distributed systems, 25(8), 2078-2088.
- Lu, H., Li, J., & Guizani, M. (2014). Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks. IEEE Transactions on Knowledge and Data Engineering, 26(8), 1854-1864.
- Yu, C. M., Ni, G. K., Chen, I. Y., Gelenbe, E., & Kuo, S. (2014). Top-k Query Result Completeness Verification in Tiered Sensor Networks. IEEE Transactions on Information Forensics and Security, 9(1), 109-123.
- Yu, L., Li, J., Cheng, S., Xiong, S., & Shen, H. (2014). Secure Continuous Aggregation in Wireless Networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 763-773
- Zhang, R., Shi, J., Zhang, Y., & Huang, X. (2014). Secure Top-k Query Processing in Unattended Tiered Sensor Networks. IEEE Communication and Information System, Huazhong University of Science and Technology, 25(3), 763-773.
- Chen, T., & Chen, L. (2013). Optimizing Multi-Top-k Queries over Uncertain Data Streams. IEEE Transactions on Knowledge and Data Engineering, August.
Abstract Views: 388
PDF Views: 0