Design and Develop A Secure Energy Efficient Data Transmission Technique for Wireless Sensor Networks
Keywords:
Wireless Sensor Networks, Energy Efficiency, Data Transmission, Security, Cryptography, Optimization, Routing ProtocolsAbstract
Wireless Sensor Networks (WSNs) play a vital role in various applications such as environmental monitoring, healthcare, and smart cities. However, energy consumption is a critical concern in WSNs due to the limited power supply of sensor nodes. This research paper proposes a novel approach to address this challenge by designing and developing a secure energy-efficient data transmission technique for WSNs. The proposed technique aims to minimize energy consumption while ensuring data confidentiality, integrity, and authenticity. By leveraging cryptographic algorithms, optimization strategies, and intelligent routing protocols, the proposed technique enhances the security and efficiency of data transmission in WSNs. Experimental results demonstrate the effectiveness and feasibility of the proposed approach in improving the overall performance of WSNs in terms of energy consumption, communication overhead, and security.
Downloads
References
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102-114.
Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP: efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(4), 500-528.
Dhillon, H. S., Chana, I., & Khosla, P. K. (2016). A review on secure routing in wireless sensor networks. Procedia Computer Science, 78, 484-489.
Dunkels, A., Gronvall, B., & Voigt, T. (2004). Contiki—a lightweight and flexible operating system for tiny networked sensors. In Proceedings of the 29th annual IEEE international conference on local computer networks (pp. 455-462).
Raghunath, S., Gupta, B. B., & Gupta, R. (2018). A survey on energy-efficient routing protocols in wireless sensor networks. Journal of Network and Computer Applications, 106, 21-46.
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks, 1(2-3), 293-315.
Lindsey, S., & Raghavendra, C. S. (2002). PEGASIS: power-efficient GAthering in sensor information systems. In Proceedings IEEE Aerospace Conference. IEEE.
El-Hajj, M., & Chehab, A. (2019). Energy efficient secure communication in IoT: A review. Computers & Security, 81, 232-250.
Yoon, S., Kim, H., & Shahabi, C. (2017). Energy efficient and secure data transmission protocol for WBANs. IEEE Transactions on Mobile Computing, 16(4), 1009-1020.
Mishra, A., Nadimi, E., & Jha, S. (2019). A review of energy-efficient routing protocols in wireless sensor networks. Computer Communications, 131, 81-105.
Singh, S., Tripathi, G., & Tripathi, V. (2016). Energy efficient and secure data transmission in wireless sensor networks: A survey. Computers & Electrical Engineering, 51, 226-244.
Lee, Y. H., & Gerla, M. (2009). Energy-efficient and collision-free data gathering protocols in wireless sensor networks. Ad Hoc Networks, 7(6), 1022-1037.
Smaragdakis, G., Matta, I., & Bestavros, A. (2004). SEP: a stable election protocol for clustered heterogeneous wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 1-13).
Dezfouli, B., & Aliahmadi, A. (2018). An energy-efficient and secure data transmission protocol in IoT systems. Future Generation Computer Systems, 86, 995-1008.
Garg, S., & Jain, S. (2015). Energy-efficient and secure data transmission protocol for wireless sensor networks. Procedia Computer Science, 45, 159-168.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.