基于蚁群算法在聚类WSN中实现椭圆曲线密码

S. Malathy, J. Geetha, A. Suresh, S. Priya
{"title":"基于蚁群算法在聚类WSN中实现椭圆曲线密码","authors":"S. Malathy, J. Geetha, A. Suresh, S. Priya","doi":"10.1109/AEEICB.2018.8480856","DOIUrl":null,"url":null,"abstract":"Monitoring security at the border and prevention of intruders attack are the challenging problems in every developed country. Wireless sensor network are the effective solution for constructing the monitoring system which possess a sensor nodes deployed randomly to detect any objects or events crossing in a particular region. Power conservation is the major criteria in wireless sensor network as the sensor nodes that are battery powered once deployed cannot be recharged in the field. This paper is focused on two major concepts for efficient detection of intruders with secured and efficient transmission by enhancing the network lifetime. In this work, an enhanced energy aware clustering algorithm by Ant approach (ACO) is used to detect any events or objects by balancing the power at each sensor nodes and also to maximize the lifetime of the network. Authentication is done by implementing Elliptical Curve Cryptography which provides keys for limited and authorized users for efficient and secured data transmission in WSN.","PeriodicalId":423671,"journal":{"name":"2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Implementing Elliptic Curve Cryptography with ACO Based Algorithm in Clustered WSN for Border Surveillance\",\"authors\":\"S. Malathy, J. Geetha, A. Suresh, S. Priya\",\"doi\":\"10.1109/AEEICB.2018.8480856\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Monitoring security at the border and prevention of intruders attack are the challenging problems in every developed country. Wireless sensor network are the effective solution for constructing the monitoring system which possess a sensor nodes deployed randomly to detect any objects or events crossing in a particular region. Power conservation is the major criteria in wireless sensor network as the sensor nodes that are battery powered once deployed cannot be recharged in the field. This paper is focused on two major concepts for efficient detection of intruders with secured and efficient transmission by enhancing the network lifetime. In this work, an enhanced energy aware clustering algorithm by Ant approach (ACO) is used to detect any events or objects by balancing the power at each sensor nodes and also to maximize the lifetime of the network. Authentication is done by implementing Elliptical Curve Cryptography which provides keys for limited and authorized users for efficient and secured data transmission in WSN.\",\"PeriodicalId\":423671,\"journal\":{\"name\":\"2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AEEICB.2018.8480856\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AEEICB.2018.8480856","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

边境安全监控和防范入侵者攻击是每个发达国家都面临的难题。无线传感器网络是构建监控系统的有效解决方案,它具有随机部署的传感器节点,以检测在特定区域内穿越的任何物体或事件。在无线传感器网络中,由于传感器节点在部署时使用电池供电,因此无法在现场进行充电,因此节能是无线传感器网络的主要标准。本文重点讨论了通过提高网络生存期来有效检测安全传输的入侵者和有效传输的两个主要概念。在这项工作中,一种增强的能量感知聚类算法采用蚁群方法(ACO),通过平衡每个传感器节点的功率来检测任何事件或物体,并最大化网络的生命周期。在无线传感器网络中,认证通过椭圆曲线加密实现,椭圆曲线加密为有限用户和授权用户提供密钥,从而实现高效、安全的数据传输。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Implementing Elliptic Curve Cryptography with ACO Based Algorithm in Clustered WSN for Border Surveillance
Monitoring security at the border and prevention of intruders attack are the challenging problems in every developed country. Wireless sensor network are the effective solution for constructing the monitoring system which possess a sensor nodes deployed randomly to detect any objects or events crossing in a particular region. Power conservation is the major criteria in wireless sensor network as the sensor nodes that are battery powered once deployed cannot be recharged in the field. This paper is focused on two major concepts for efficient detection of intruders with secured and efficient transmission by enhancing the network lifetime. In this work, an enhanced energy aware clustering algorithm by Ant approach (ACO) is used to detect any events or objects by balancing the power at each sensor nodes and also to maximize the lifetime of the network. Authentication is done by implementing Elliptical Curve Cryptography which provides keys for limited and authorized users for efficient and secured data transmission in WSN.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Microbial Isolates for Enhancement of Seed Germination A Precise on Wearable ECG Electrodes for Detection Of Heart Rate and Arrthymia Classification Web based Biometric Validation Using Biological Identities: An Elaborate Survey Induction Motor Parameter Monitoring System using Zig bee Protocol & MATLAB GUI : Automated Monitoring System Compressive Sensing and Hyper-Chaos Based Image Compression-Encryption
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1