Energy Proficient Hybrid Secure Scheme for Wireless Sensor Networks

  • PDF / 2,153,056 Bytes
  • 21 Pages / 439.37 x 666.142 pts Page_size
  • 99 Downloads / 249 Views

DOWNLOAD

REPORT


Energy Proficient Hybrid Secure Scheme for Wireless Sensor Networks M. Yuvaraju1 · K. A. Pranesh1  Accepted: 29 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract One way hash chain with a new key indicating the performance of the node as well to isolate malicious nodes from the network. Public key cryptography is derived using elliptical curve cryptography (ECC) have couple of key for decryption and encryption. Public key cryptography provides protection and verification using numerous algorithms. In addition secret session key is generated for secured data transmission and improve energy efficiency in WSN. Advanced encryption standard (AES) is applied for message cipher text once the key validation process gets finished. Energy proficient hybrid secure scheme (EPHSS) is proposed to provide secured and energy efficient data transmissions in WSN. To utilise the node energy in a proper way node clustering process is carried out. Clustering process efficiently reduces unnecessary energy wastage during node communication. Graded coprime keys are generated for public and private keys, also encrypting functions are performed for providing security mechanisms. This mechanism improves security measures and simultaneously reduces energy consumption among nodes. The route should be undetectable by malicious nodes and the data should not be lacerate by the opponent node even it gets to know the public key. Identifying private key component [B, n] is difficult for malevolent; thus building it computationally infeasible for discovering decryption type at receiver side. Simulation presentations of the networks are analysed by network simulator tool. Efficiency of the proposed scheme is computed by taking delivery rates of packets which results in 18% better than the conventional ECCSAS scheme. Keywords  Energy efficient · Co-prime numbers · Elliptical curve cryptosystem · Advanced encryption standard · Wireless sensor network

1 Introduction Information provided by the sensor nodes should be trustworthy since many activities are taken according to the obtained information. Information should be kept secret from illegal users (seclusion), prohibited from some amendment (integrity) and should be * K. A. Pranesh [email protected] 1



Department of Electrical and Electronics Engineering, Anna University Regional Campus Coimbatore, Coimbatore, Tamil Nadu, India

13

Vol.:(0123456789)



M. Yuvaraju, K. A. Pranesh

enthusiastically accessible to approved user (accessibility) Stallings [16]. Hence three main goals for providing security measures are seclusion, integrity and accessibility. Numerous challenges had been experienced while providing safety efforts since nodes are usually energy constrained. To defend digital information data protection is mandate long side safety measures intimidation from illegal user access. In WSN, energy efficiency is a significant factor. Generally, the cluster-based protocols are used to save the sensor energy Lee et  al. [8]. Clustering method minimizes