Energy Efficient and Secured Key Based Management in Area Monitor by WSN
K.R. Asha1, M.C. Supriya2
1K.R. Asha, Department of Master of Computer Application, SSIT, Tumkur, India.
2M.C. Supriya, Department of Master of Computer Application, SSIT, Tumkur, India.
Manuscript received on 19 October 2019 | Revised Manuscript received on 25 October 2019 | Manuscript Published on 29 June 2020 | PP: 142-151 | Volume-8 Issue-10S2 August 2019 | Retrieval Number: J102708810S19/2019©BEIESP | DOI: 10.35940/ijitee.J1027.08810S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Popular Technology for monitoring Environment, observation of battle field, caring of health, tracking of object, managing during various types of attack is by Wireless sensor networks. Whenever, area which is strictly monitoring by WSNs it has to handle all the critical situation. That is, when area affected by radiation creates node outage problems with in the critical areas monitoring by WSNs. For that solution should be needed when communication problem arises between the nodes. Reliable Transferring of information from nodes to the base station, less utilization of energy to improve the network life time and also along with these secure mechanisms are also needed to save the sensed information from hostile environment. In this paper clustering process with security mechanisms are used. Key based security approach used to validate data inside cluster and outside the cluster during data reaches to the base station. RSA encoding of the data to hide data from external persons. A security mechanism of our scheme shows that our protocol is effective in defending against radiation attack and intentionally node attacked hackers. Key based security approach implemented in Linux OS and simulate it using NS2 simulator to assess its time, energy, communication, and memory performance.
Keywords: Key Based Security and WSN.
Scope of the Article: Block Chain-Enabled IoT Device and Data Security and Privacy.