Secured data transmission and malicious node detection in wireless sensor network

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless Sensor Network (WSN) is developed extremely because of their low installation cost and various applications. WSN has compact and inexpensive sensor nodes for monitoring the physical environment. WSNs are susceptible to many attacks (e.g. malicious nodes) because of its distinct characteristics. The performance of node and network is affected by the malicious nodes. Moreover, the communication among the sensor nodes also required to be secured for preventing the data from the hackers. In this paper, the architecture of the WSN is generated by using the Fuzzy-C-Means clustering (FCM). Then the detection of the malicious nodes is performed by using the Acknowledgement Scheme (AS). This AS is integrated in the Ant Colony Optimization (ACO) based routing for avoiding the malicious nodes while generating the route from the source to the Base Station (BS). Then the Hybrid Encryption Algorithm (HEA) is used for performing the secure data transmission through the network and this proposed method is named as HEA-AS. The performance of the HEA-AS method is evaluated in terms of End to End Delay (EED), network lifetime, throughput, Packet Delivery Ratio (PDR) and Packet Loss Ratio (PLR). The proposed HEA-AS method is compared with the existing method called as CTCM to evaluate the effectiveness of the HEA-AS method.

Cite

CITATION STYLE

APA

Biradar, D. N., & Vishanath, T. S. (2019). Secured data transmission and malicious node detection in wireless sensor network. International Journal of Engineering and Advanced Technology, 8(6), 1062–1069. https://doi.org/10.35940/ijeat.F8300.088619

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free