A node to node security for sensor nodes implanted in cross cover multi-layer architecture using Mc-Nie algorithm
- PDF / 2,571,897 Bytes
- 17 Pages / 595.276 x 790.866 pts Page_size
- 94 Downloads / 161 Views
SPECIAL ISSUE
A node to node security for sensor nodes implanted in cross cover multi‑layer architecture using Mc‑Nie algorithm Kumar Babu Batta1 · Venkateswara Rao Gurrala1 · Vishnu Srinivasa Murthy Yarlagadda2 Received: 21 April 2020 / Revised: 27 July 2020 / Accepted: 22 August 2020 © Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract Security, and lifetime enhancement are the two key factors in the field of wireless sensor networks. Since the sensor nodes are placed in critical regions and are irreplaceable, it is essential to improve their lifetime through avoiding the energy consumption unnecessarily. Moreover, it is found that the sensor nodes are easily vulnerable due to their random placement. We propose a cross covered multi-layer architecture with an efficient Mc-Nie security algorithm. Moreover, the details of various attacks are also given in this paper. It is found that the proposed approach is performing well when compared to the recent state-of-the-art approaches. We have considered various parameters such as energy consumption, detecting the attacks, attack detection percentage, packet loss, and packet overhead in order to evaluate the performance of the proposed system. The improvement in energy consumption rate is around 81% when compared to the non-cross covered architecture. Keywords Cross covered multi-layer architecture · Cross-layered architecture · Energy consumption in WSN · Mc-Nie cryptosystem · Multi-layer architecture · Network lifetime · Sensor nodes · Wireless sensor networks
1 Introduction Nowadays, the advancements in technologies such as wireless communication systems, and microelectronic mechanical systems (MEMS) have propagated the importance of wireless sensor networks (WSNs). There is considerable growth in wireless communication and microelectronic mechanical systems (MEMS), which leads to the expansion of wireless sensor networks (WSNs) [2]. A single WSN can be defined as a collection of nodes where each node can sense the surroundings data, which can be further used to control the environment or situation. The data will be continuously sensed to control the surroundings avoiding a huge loss. The number of nodes placed to control
* Vishnu Srinivasa Murthy Yarlagadda [email protected] Kumar Babu Batta [email protected] Venkateswara Rao Gurrala [email protected] 1
Department of CSE, GITAM, Visakhapatnam 530 045, India
School of Computer Science and Engineering, Vellore Institute of Technology (VIT), Vellore 632 014, India
2
the surroundings is generally having characteristics like low power, low capacity, low cost, and also their transmission speed is also less. The placement of such nodes will be done in critical regions. Humans are unable to travel to such places in order to collect the data [8, 18]. Hence, all the nodes are embedded with a network module to transfer the information. The basic architecture of WSN is shown in Fig. 1, which clearly gives information about how the sensor nodes get decentralized and distributed. Moreover, al
Data Loading...