Crswsn-Based Framework For Secure Routing In Wireless Sensor Networks
Main Article Content
Abstract
The collection of sensor nodes is termed as wireless sensor network. The back bone of WSN is sensor. The sensors are used to sense the environment and transfer the data by the use of network infrastructure and to meet the user’s requirements. The sensor node has the limitations in terms of storage, communication and computational capabilities. The application which may utilize WSN can be of susceptible and necessitate superior secured environment. As sensors are used to monitor the environment, security and energy efficiency is most essential considerations when designing wireless sensor networks. The security of WSN must be remunerated concentration to because it is supported by lofty content and multifarious structure. The framework suggested three algorithms such as contribution 1 proposed secure dynamic authentication for WSN using Salt key approach and contribution II suggested secure text encryption scheme for WSN using Dynamic Key approach, contribution III introduced energy efficient secured dynamic routing for cluster based WSN.
Introduction: Wireless Sensor Network has several nodes where each node is connected to one or more sensors. Achieving Security along with Energy sustainable is not a easy task. The typical sensor node has four main blocks which are power unit, communication unit, processing and sensing unit. Sensor nodes are used to monitor static and dynamic events where as monitoring static events are easy, on the other hand the dynamic events are typically needs efficient protocol performance. Protocols are in the form of specific functionality. In the field of WSN have many challenges.
Objectives: Increase the network parameters performance such as Latency, Throughput and Security.
Methods: Hash based Algorithm and Dynamic Key approach, Salt key Approach and Secure Dynamic routing protocol structure
Results: Security
Security is important in any area, but it is especially important in network security, which resembles the strength of the network architecture The proposed method's average security value is 98.3 percent, which is higher than that of other current methods; the lowest security level is 97 percent, and the highest security level is 98 percent.
Conclusions: The contribution methods proposed three different algorithms for achieving better results in security. The proposed method of ESDSA suggested the algorithm for achieving user registration and sensor node registration and the method of ESEDK provides the methodology for creating the salt key to achieve the security and the method of ESDRC provides the algorithm for forming the clusters along with cluster head based on the distance and energy and to achieve the security. The methodology is used to reduce energy consumption and secure data delivery. It uses energy, distance to the base station and the number of neighbors based parameters for cluster head selection. The cluster head is used to transmit data packets from the sensor node to the base station. The simulation results proved that the CRSWSN algorithms provided the better lifetime, security and less energy consumption.