Research Article | Open Access | Download PDF
Volume 8 | Issue 2 | Year 2018 | Article Id. IJPTT-V8I2P402 | DOI : https://doi.org/10.14445/22492615/IJPTT-V8I2P402An Improved Novel Design for user Authentication and Secure Transmission of Data in End to End Routing in Wireless Sensor Network
K RupaRani, K. Jagdeeshwara Rao
Citation :
K RupaRani, K. Jagdeeshwara Rao, "An Improved Novel Design for user Authentication and Secure Transmission of Data in End to End Routing in Wireless Sensor Network," International Journal of P2P Network Trends and Technology (IJPTT), vol. 8, no. 2, pp. 8-13, 2018. Crossref, https://doi.org/10.14445/22492615/IJPTT-V8I2P402
Abstract
Now a day’s wireless sensor network is most important technology for transferring data through network with secure manner. Before transferring message from source node to destination node we can find out path consisting of connected links. To identify the routing from source node to destination node so many end to end routing protocols are existing in the world. In this paper we are implementing a novel design secure end to end routing protocol for transfer data with securely. Before performing data transformation process we can implement two more fundamental concepts are user authentication and key establishment. The user authentication process enables for identify users by group key manager. After completion of authentication process the group key manager will generate polynomial equation for establishing secret session key and shared that key to all communication entities. Such that all communication entities will exchange information can be protected using this secret key. Before transferring data to destination node the source will send ids to group key manager. The group key manager will find routing from source node to destination node, using that path data will be transferred to destination node. Before transferring message the source node will encrypt the message and send to destination node. By performing data encryption and decryption process we are using cryptography technique. So that by implementing those concepts we can improve efficiency of network and also provide more security of transferred message.
Keywords
Group Key Generation, Secrecy of Data, End to End Routing, Source Node, Destination Node.
References
[1] I.F. Akyildiz et al, W.Su, Y.Sankara subramaniam, E.Cayirci
“Wireless sensor networks: a survey”, Computer Networks,
Vol. 38, pp. 393- 422, March 2002
[2] K.Akkaya, M younis “A survey on routing protocols for
wireless sensor networks” Ad Hoc Networks 3 (2005), pp
325-345, 2005.
[3] M. L. Das, “Two-factor user authentication in wireless sensor
networks,” IEEE Trans. Wireless Commun., vol. 8, no. 3, pp.
1086–1090, Mar. 2009.
[4] L. Eschenauer and V. D. Gligor, “A key-management
scheme for distributed sensor networks,” in Proc. ACM Conf.
CCS, 2002, pp. 41–47.
[5] L. Harn and C. F. Hsu, “Predistribution scheme for
establishing group keys in wireless sensor networks,” IEEE
Sensors J., vol. 15, no. 9,
[6] pp. 5103–5108, Sep. 2015.
[7] W. Gu, N. Dutta, S. Chellappan, and X. Bai, “Providing endto-end secure communications in wireless sensor networks,”
IEEE Trans. Netw. Service Manage., vol. 8, no. 3, pp. 205–
218, Sep. 2011.
[8] “21 ideas for the 21st century”, Business Week, Aug. 30
1999, pp. 78-167.
[9] S.K. Singh, M.P. Singh, and D.K. Singh, “A survey of
Energy-Efficient Hierarchical Cluster-based Routing in
Wireless Sensor Networks”, International Journal of
Advanced Networking and Application (IJANA), Sept.–Oct.
2010, vol. 02, issue 02, pp. 570–580.
[10] S.K. Singh, M.P. Singh, and D.K. Singh, "Energy-efficient
Homogeneous Clustering Algorithm for Wireless Sensor
Network", International Journal of Wireless & Mobile
Networks (IJWMN), Aug. 2010, vol. 2, no. 3, pp. 49-61.
[11] Jun Zheng and Abbas Jamalipour, “Wireless Sensor
Networks: A Networking Perspective”, a book published by
A John & Sons, Inc, and IEEEE, 2009.
[12] Luis Javier García Villalba, Ana Lucila Sandoval Orozco,
Alicia Triviño Cabrera, and Cláudia Jacy Barenco Abbas,
“Routing Protocol in Wireless Sensor Networks”, Sensors
2009, vol. 9, pp. 8399- 8421.
[13] E. Zanaj, M. Baldi, and F. Chiaraluce, “Efficiency of the
Gossip Algorithm for Wireless Sensor Networks”, In
Proceedings of the 15th International Conference on
Software, Telecommunications and Computer Networks
(SoftCOM), Split–Dubrovnik, Croatia, September, 2007.