首页    期刊浏览 2024年12月01日 星期日
登录注册

文章基本信息

  • 标题:Preventing Data Transmission from Vulnerable Attacks in CWSNs
  • 本地全文:下载
  • 作者:Anuradha Patnala ; P.Hema Venkataramana
  • 期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
  • 印刷版ISSN:2347-6710
  • 电子版ISSN:2319-8753
  • 出版年度:2015
  • 卷号:4
  • 期号:11
  • 页码:10873
  • DOI:10.15680/IJIRSET.2015.0411088
  • 出版社:S&S Publications
  • 摘要:The use of wireless sensor networks (WSNs) has grown enormously in the last decade, pointing out thecrucial need for scalable and energy-efficient routing and data gathering and aggregation protocols in correspondinglarge-scale environments. Clustering is an effective and practical way to enhance the system performance of WSNs. InCluster-based Wireless Sensor Networks identifying the various types of attacks is main problem. In this paper, wegroup attack models into three categories according to their attacking means as follows, and study how these attacksmay be applied to affect the proposed protocols and we proposed The Concentric Clustering Scheme (CCS) has beenproposed to reduce the energy consumption loopholes in PEGASIS (Power-Efficient. Gathering in Sensor InformationSystems).The main idea of CCS is to consider the location of the BS to enhance its performance and to prolong thelifetime of the network. Along with mainly we proposed two Secure and Efficient data Transmission (SET) protocolsfor CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and theIdentity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on thehardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computationaloverhead for protocol security, which is crucial for WSNs, while its security relies on the hardness of the discretelogarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the securityrequirements and security analysis against various attacks. The calculations and simulations are provided to illustratethe efficiency of the proposed protocols. The results show that, the proposed protocols have better performance than theexisting secure protocols for CWSNs, in terms of security overhead and energy consumption
  • 关键词:Cluster; WSNs; Concentric; SET-IBS; SET- IBOOS; Secure Data Transmission Protocol.
国家哲学社会科学文献中心版权所有