z-logo
open-access-imgOpen Access
Secure Hash Authentication And Cryptography Based Geographical Routing (SHAC-GR) For Wireless Sensor Networks
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.b2442.078219
Subject(s) - computer science , computer network , wireless sensor network , hash function , cryptography , node (physics) , energy consumption , distributed computing , computer security , engineering , electrical engineering , structural engineering
The expeditious growth in manufacturing anvils industries has lead towards the development of tiny devices. This growth has motivated to develop small and battery-operated sensor nodes that are widely adopted for establishing the reliable wireless communication. The wireless sensor based communication is generally divided into hierarchal and geographical deployment. Hierarchical system based approaches are widely studied in this field, limited work is present in the field of geographical WSN. In this work, we focus on the geographical WSN. Generally, these networks suffer from energy efficiency and security related issues. Hence, in this work we preset a combined approach to address these challenges. In order to mitigate the energy sparsity issue, we develop geographical routing scheme which selects the neighboring node based on residual energy of the node and distance from the sink node i.e. the maximum residual energy node from the neighboring node which is having less distance from the sink node is selected as next-hop. Due to this approach, the path computation and other network parameters computation is not required hence it reduces the power consumption. Further, we address the security issues where we present Hash modeling to secure the location, Key Exchange model for authentication by using ECDH approach , later we present ECIS based encapsulation method for data security and finally, a trust model based security system is developed. The trust computation of node helps to the routing whether to select the node for next hop or not. This multistage security approach is called as Secure Hash, Authentication and Cryptography based geographical routing (SHAC-GR) protocol. The proposed approach is simulated using MATLAB simulation tool and the performance of proposed approach is compared with existing technique that shows that the proposed approach improves the network performance in terms of network lifetime, energy and packet delivery rate.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here