International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-8  ( Aug, 2024 )
Past issues
  1. Volume-12,Issue-7  ( Jul, 2024 )
  2. Volume-12,Issue-6  ( Jun, 2024 )
  3. Volume-12,Issue-5  ( May, 2024 )
  4. Volume-12,Issue-4  ( Apr, 2024 )
  5. Volume-12,Issue-3  ( Mar, 2024 )
  6. Volume-12,Issue-2  ( Feb, 2024 )
  7. Volume-12,Issue-1  ( Jan, 2024 )
  8. Volume-11,Issue-12  ( Dec, 2023 )
  9. Volume-11,Issue-11  ( Nov, 2023 )
  10. Volume-11,Issue-10  ( Oct, 2023 )

Statistics report
Dec. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 140
Paper Published : 1656
No. of Authors : 4371
  Journal Paper


Paper Title :
Cluster Based Secure Data Transmission Over Homogeneous Environment In WSN

Author :Vignesh Karthik.R, Anandaraj.A, Tamil Arasu D, Pritto Paul.P, M.Usha

Article Citation :Vignesh Karthik.R ,Anandaraj.A ,Tamil Arasu D ,Pritto Paul.P ,M.Usha , (2014 ) " Cluster Based Secure Data Transmission Over Homogeneous Environment In WSN " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 65-67, Volume-2,Issue-10

Abstract : The objective of this paper is to focus on secure and efficient routing over wireless sensor networks which comprises of a number of spatially dispersed autonomous nodes interfaced with sensors. From health to defense, WSN’s play a vital role in monitoring physical and environmental conditions. Since these nodes are often deployed in hostile environments, they are vulnerable to various attacks urging to the need of more secure and sophisticated mechanism to tackle these threats. In this paper Energy Efficient Clustering Scheme (EECS) is deployed to enhance efficiency over a cluster based multipath routing environment and improvise security which is a prime concern of WSN. We have focused to provide a feasible but not optimal solution to selective forwarding attack through Elgamal public key cryptosystem. First we choose a cluster head based on few parameters considering their energy level and distance that a node has to the base station and second, depending on the scalability of the node, public key encryption (PKC) scheme is used to provide an elucidation to the selective forwarding attack over WSN.

Type : Research paper

Published : Volume-2,Issue-10


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1327   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 60
| Published on 2014-10-01
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY