Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download file Download BibTeX

Title

Secure energy efficient routing protocol for wireless sensor network

Authors

Year of publication

2016

Published in

Foundations of Computing and Decision Sciences

Journal year: 2016 | Journal volume: vol. 41 | Journal number: no. 1

Article type

scientific article

Publication language

english

Keywords
EN
  • wireless sensor network
  • sensors
  • hash chain
  • machine authentication code
  • cluster
  • cluster head
  • security
Abstract

EN The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task. This paper proposes a new routing technique to prevent from both external threats and internal threats like hello flooding, eavesdropping and wormhole attack. In this approach one way hash chain is used to reduce the energy drainage. Level based event driven clustering also helps to save energy. The simulation results show that the proposed scheme extends network lifetime even when the cluster based wireless sensor network is under attack.

Pages (from - to)

3 - 27

DOI

10.1515/fcds-2016-0001

URL

https://www.sciendo.com/article/10.1515/fcds-2016-0001

License type

CC BY-NC-ND (attribution - noncommercial - no derivatives)

Full text of article

Download file

Access level to full text

public

Ministry points / journal

15

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.