DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

SDTOR: Secure Data Transmission of Optimum Routing protocol in wireless sensor networks for surveillance applications


Article Information

Title: SDTOR: Secure Data Transmission of Optimum Routing protocol in wireless sensor networks for surveillance applications

Authors: E. Vishnupriya, T. Jayasankar, P. Maheswara Venkatesh

Journal: ARPN Journal of Engineering and Applied Sciences

HEC Recognition History
Category From To
Y 2023-07-01 2024-09-30
Y 2022-07-01 2023-06-30
Y 2021-07-01 2022-06-30
X 2020-07-01 2021-06-30

Publisher: Khyber Medical College, Peshawar

Country: Pakistan

Year: 2015

Volume: 10

Issue: 16

Language: English

Categories

Abstract

Sensor networks are used sometime in very sensitive applications such as health care and military. Wireless sensor networks require the need for effective security mechanism.  In a secure data transmission scenario need to decrypt the encrypted data to perform aggregation. In this paper, ECC (Elliptic Curve Cryptography) algorithm is using for encryption and decryption method. It protects all data against malicious modification and information forgery. The optimum routing protocols are such as LEACH, PEGASIS, APTEEN and AOMDV routing protocols. Sensor network routing protocols were very simple and not developed as security in mind. So the adversary can launch various attacks in the network. The ECC algorithm is used to safe guard from different attacks by building a secure route from source to sink node. The routing protocol suffers from many attacks like spoofing or altering the route information, selective forwarding, sinkhole attack, worm hole attack, Sybil attack, flooding attack. Encryption and decryption has been evaluated in terms of data delivery ratio and level of security. Data delivery ratio can be achieved 85% using ECC algorithm. Level of security up to the level compared to other asymmetric and symmetric algorithms. Base station should receive unaltered and fresh data.


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...