An Improved Novel Design for user Authentication and Secure Transmission of Data in End to End Routing in Wireless Sensor Network

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2018 by IJPTT Journal
Volume-8 Issue-2
Year of Publication : 2018
Authors : K RupaRani, K. Jagdeeshwara Rao

Citation

K RupaRani, K. Jagdeeshwara Rao "An Improved Novel Design for user Authentication and Secure Transmission of Data in End to End Routing in Wireless Sensor Network". International Journal of P2P Network Trends and Technology (IJPTT).V8 (2) 8-13 March to April 2018. ISSN:2249-2615. www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

Now a day’s wireless sensor network is most important technology for transferring data through network with secure manner. Before transferring message from source node to destination node we can find out path consisting of connected links. To identify the routing from source node to destination node so many end to end routing protocols are existing in the world. In this paper we are implementing a novel design secure end to end routing protocol for transfer data with securely. Before performing data transformation process we can implement two more fundamental concepts are user authentication and key establishment. The user authentication process enables for identify users by group key manager. After completion of authentication process the group key manager will generate polynomial equation for establishing secret session key and shared that key to all communication entities. Such that all communication entities will exchange information can be protected using this secret key. Before transferring data to destination node the source will send ids to group key manager. The group key manager will find routing from source node to destination node, using that path data will be transferred to destination node. Before transferring message the source node will encrypt the message and send to destination node. By performing data encryption and decryption process we are using cryptography technique. So that by implementing those concepts we can improve efficiency of network and also provide more security of transferred message.

References

[1]. I.F. Akyildiz et al, W.Su, Y.Sankara subramaniam, E.Cayirci “Wireless sensor networks: a survey”, Computer Networks, Vol. 38, pp. 393- 422, March 2002
[2] K.Akkaya, M younis “A survey on routing protocols for wireless sensor networks” Ad Hoc Networks 3 (2005), pp 325-345, 2005.
[3]. M. L. Das, “Two-factor user authentication in wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1086–1090, Mar. 2009.
[4]. L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proc. ACM Conf. CCS, 2002, pp. 41–47. [
5]. L. Harn and C. F. Hsu, “Predistribution scheme for establishing group keys in wireless sensor networks,” IEEE Sensors J., vol. 15, no. 9, pp. 5103–5108, Sep. 2015.
[6] W. Gu, N. Dutta, S. Chellappan, and X. Bai, “Providing end-to-end secure communications in wireless sensor networks,” IEEE Trans. Netw. Service Manage., vol. 8, no. 3, pp. 205–218, Sep. 2011.
[7]. “21 ideas for the 21st century”, Business Week, Aug. 30 1999, pp. 78-167.
[8]. S.K. Singh, M.P. Singh, and D.K. Singh, “A survey of Energy-Efficient Hierarchical Cluster-based Routing in Wireless Sensor Networks”, International Journal of Advanced Networking and Application (IJANA), Sept.–Oct. 2010, vol. 02, issue 02, pp. 570–580.
[9]. S.K. Singh, M.P. Singh, and D.K. Singh, "Energy-efficient Homogeneous Clustering Algorithm for Wireless Sensor Network", International Journal of Wireless & Mobile Networks (IJWMN), Aug. 2010, vol. 2, no. 3, pp. 49-61.
[10]. Jun Zheng and Abbas Jamalipour, “Wireless Sensor Networks: A Networking Perspective”, a book published by A John & Sons, Inc, and IEEEE, 2009.
[11]. Luis Javier García Villalba, Ana Lucila Sandoval Orozco, Alicia Triviño Cabrera, and Cláudia Jacy Barenco Abbas, “Routing Protocol in Wireless Sensor Networks”, Sensors 2009, vol. 9, pp. 8399- 8421.
[12]. E. Zanaj, M. Baldi, and F. Chiaraluce, “Efficiency of the Gossip Algorithm for Wireless Sensor Networks”, In Proceedings of the 15th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split–Dubrovnik, Croatia, September, 2007.

Keywords
Group Key Generation, Secrecy of Data, End to End Routing, Source Node, Destination Node.