期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks
1
作者 S.M.Udhaya Sankar Mary Subaja Christo P.S.Uma Priyadarsini 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2337-2351,共15页
Energy conservation has become a significant consideration in wireless sensor networks(WSN).In the sensor network,the sensor nodes have internal batteries,and as a result,they expire after a certain period.As a result,... Energy conservation has become a significant consideration in wireless sensor networks(WSN).In the sensor network,the sensor nodes have internal batteries,and as a result,they expire after a certain period.As a result,expanding the life duration of sensing devices by improving data depletion in an effective and sustainable energy-efficient way remains a challenge.Also,the clustering strategy employs to enhance or extend the life cycle of WSNs.We identify the supervisory head node(SH)or cluster head(CH)in every grouping considered the feasible strategy for power-saving route discovery in the clustering model,which diminishes the communication overhead in the WSN.However,the critical issue was determining the best SH for ensuring timely communication services.Our secure and energy concise route revamp technology(SECRET)protocol involves selecting an energy-concise cluster head(ECH)and route revamping to optimize navigation.The sensors transmit information over the ECH,which delivers the information to the base station via the determined optimal path using our strategy for effective data transmission.We modeled our methods to accom-plish power-efficient multi-hop routing.Furthermore,protected navigation helps to preserve energy when routing.The suggested solution improves energy savings,packet delivery ratio(PDR),route latency(RL),network lifetime(NL),and scalability. 展开更多
关键词 Wireless sensor network wireless security wireless routing CLUSTERING ad hoc network
在线阅读 下载PDF
Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes
2
作者 S.M.Udhaya Sankar S.Thanga Revathi R.Thiagarajan 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期625-640,共16页
An ad-hoc sensor network(ASN)is a group of sensing nodes that transmit data over a wireless link to a target node,direct or indirect,through a series of nodes.ASN becomes a high-risk group for several security exploit... An ad-hoc sensor network(ASN)is a group of sensing nodes that transmit data over a wireless link to a target node,direct or indirect,through a series of nodes.ASN becomes a high-risk group for several security exploits due to the sensor node’s limited resources.Internal threats are more challenging to protect against than external attacks.The nodes are grouped,and calculate each node’s trust level.The trust level is the result of combining internal and external trust degrees.Cluster heads(CH)are chosen based on the anticipated trust levels.The communications are then digitally signed by the source,encoded using a key pair given by a trustworthy CH,decoded by the recipient,and supervised by verifications.It authenticates the technique by identifying the presence of both the transmitter and the recipient.Our approach looks for a trustworthy neighboring node that meets the trust threshold condition to authenticate the key produced.The companion node reaffirms the node’s reliability by getting the public-key certification.The seeking sensor node and the certification issuer node must have a close and trusting relationship.The results of the proposed hybrid authentication using a node trustworthy(HANT)system are modeled and tested,and the suggested approach outperforms conventional trust-based approaches in throughput,latency,lifetime,and vulnerability methods. 展开更多
关键词 Ad hoc sensor network wireless security clustering CRYPTOGRAPHY key management
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部