alexa Authenticated Channel Aware Encryption For Wireless Se
ISSN ONLINE(2278-8875) PRINT (2320-3765)

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Authenticated Channel Aware Encryption For Wireless Sensor Network

S.Velmurugan*, P.M. Rubesh Anand,Diana Aloshius, AarthiAvanthiga Department of Electronics and Communication Engineering, Hindustan University, Chennai, India
Related article at Pubmed, Scholar Google
 
To read the full article Peer-reviewed Article PDF image

Abstract

Wireless sensor network (WSN) is a collection of sensors organized into a cooperative network. Security and energy consumptionsare considered to be long-lasting technical challenges in WSNs as sensors usually suffer from complexity and energy constraints.In order to avoid the security and energy consumption problems, we propose Channel Aware Encryption along with Key management technique. The core function of exchanging and sharing a secret key between two endpoints is the methodology used in secure key management and it is one of the most critical elements need to be more concerned while integrating cryptographic functions into the system. The proposed work is to apply key pre-distribution schemes for securing and allocating the routes for data transmission from sensor nodes to Ally Fusion Center (AFC). The source node transmits its data to the Ally Fusion Center only through the relay nodes which are having the maximum authentication key value since the key is generated by considering the energy of a node and the distance between two nodes.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords