DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.
Title: SDTOR: Secure Data Transmission of Optimum Routing protocol in wireless sensor networks for surveillance applications
Authors: E. Vishnupriya, T. Jayasankar, P. Maheswara Venkatesh
Journal: ARPN Journal of Engineering and Applied Sciences
Publisher: Khyber Medical College, Peshawar
Country: Pakistan
Year: 2015
Volume: 10
Issue: 16
Language: English
Sensor networks are used sometime in very sensitive applications such as health care and military. Wireless sensor networks require the need for effective security mechanism. In a secure data transmission scenario need to decrypt the encrypted data to perform aggregation. In this paper, ECC (Elliptic Curve Cryptography) algorithm is using for encryption and decryption method. It protects all data against malicious modification and information forgery. The optimum routing protocols are such as LEACH, PEGASIS, APTEEN and AOMDV routing protocols. Sensor network routing protocols were very simple and not developed as security in mind. So the adversary can launch various attacks in the network. The ECC algorithm is used to safe guard from different attacks by building a secure route from source to sink node. The routing protocol suffers from many attacks like spoofing or altering the route information, selective forwarding, sinkhole attack, worm hole attack, Sybil attack, flooding attack. Encryption and decryption has been evaluated in terms of data delivery ratio and level of security. Data delivery ratio can be achieved 85% using ECC algorithm. Level of security up to the level compared to other asymmetric and symmetric algorithms. Base station should receive unaltered and fresh data.
Loading PDF...
Loading Statistics...