A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION IN WSNS
Journal Title: International Journal of Advanced Research in Engineering and Technology - Year 2019, Vol 10, Issue 2
Abstract
A wireless sensor network is comprised of a base station (BS) and numerous sensor nodes. The sensor nodes lack security because they function in an open environment, such as the military. In particular, a false statement injection attack seizures and compromises sensor nodes. The attack then causes the compromised nodes to create forward false reports. Due to the false report injection attack, not only does the sensor network have a false alarm, but its limited energy is also emptied. In order to preserve the false report injection attack, over the past few years, several studies have been made looking for a resolution to the attack. Ye et al. studied statistical en-route filtering (SEF). SEF is a method of randomly verifying event reports in the en-route filtering phase. SEF can filter many false reports early using proof of intermediate nodes. However, because the number of keys in a sensor node is fixed by the system, the sensor network cannot control the event report proof probability depending on the conditions of the network. Therefore, it is tough to proficiently consume energy of the sensor network. In order to resolve the problem, we suggest a technique which controls the event report verification probability by using a key sequence level of an event report. In the suggested method, when an intermediate node obtains an event report, the node authenticates the event report by relating a key sequence level of the report and its key sequence level. Elements defining the key sequence level comprise the concentration of neighbor nodes in the sensing range of a center of stimulus (CoS), the number of stages from the CoS to the BS, and the average of the key sequence level of intermediate nodes in each track. We imitated the projected technique and the SEF technique to assess the performance in terms of energy efficiency and security. In the recreation results, the projected technique disbursed an average of 7.9% less energy of the sensor nodes compared to SEF method. The number of untrue reports inward at the BS of the proposed technique was also fewer, by an average of 6.4, compared to the SEF technique. Concluded the results, we can understand that when the number of false report is huge in the sensor network, the proposed technique is more energy-efficient and protected than the SEF technique
Authors and Affiliations
SYEDA GAUHAR FATIMA, SYEDA KAUSAR FATIMA, SYED ABDUL SATTAR, NASEER AHMED KHAN and SYED ADIL
INFLUENCE OF AN INTERVENTION PROGRAMME ON KNOWLEDGE OF HEALTH AMONG SCHOOL CHILDREN IN MANGALORE CITY.
Health is a prime factor in an individual’s life. Good health is a priceless blessing in life. It is truly said that, of all things in the world health is the most valuable that one can possess. The famous saying Healt...
EXAMINING THE THERMAL PERFORMANCE OF OLD INDIGENOUS ARCHITECTURE OF KOLKATA TO ATTAIN SUSTAINABLE DEVELOPMENT
Urbanization is a global phenomenon that needs to take up serious sustainable approaches in this time when rapid global warming is looming large on the earth. Like other science and technology domains, architecture is...
WIDEBAND MICROSTRIP ANTENNA USING PARASITIC PATCH ELEMENT
A wideband microstrip antenna using parasitic patch element is proposed in this paper. Initially a circular patch antenna is designed. The antenna is found to resonate at 5.2 GHz and provides impedance bandwidth of 3.8...
EVALUATION OF PROPERTIES OF AERATED CONCRETE PARTIALLY REPLACED BY CEMENT WITH FLY ASH
Aerated concrete is a type of light weight concrete which consist of a binder, fine aggregate and an aerating agent. Aluminium powder is the most commonly used aerating agent and it reacts with calcium hydroxide libera...
FPGA IMPLEMENTATION OF PRIORITY-ARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
An efficient Priority-Arbiter based Router is designed along with 2X2 and 3X3 mesh topology based NOC architecture are designed. The Priority –Arbiter based Router design includes Input registers, Priority arbiter, and...