Abstract

The efficiency of selecting the cluster head plays a major role in resolving the complexities faced in network management aiming to improve the longevity of sensors in the network. The clustering process is followed by selecting proper cluster heads with the consideration of energy conservation among participant nodes. While coming to security concept on WSN, the trust based cluster head selection is significant with the assumption of cooperation of all sensor nodes. In view of this assumption, the traditional methods could not help in defining the ideal cluster head of the network. This work proposes Voronoi Clustered Secure Contextual Cryptographic Algorithm (VC-SCCA) by combining Voronoi method for clustering process and cryptographic algorithm for secure data transmission. This is considered as two-tier architecture whereas, clustering takes place in first tier and encryption along with decryption takes place in the second tier. The proposed algorithm is compared with two state-of-art methods such as, Secured WSN (SeC‐WSN) and Taylor based Cat Salp Swarm Algorithm (Taylor C-SSA) in terms of energy consumption, Packet Delivery Ratio (PDR), network lifetime, encryption time and decryption time. As a result, the proposed VC-SCCA achieves 53.2% of energy consumption, 98.6% of packet delivery ratio, 97.5% of network lifetime, 62.8sec of encryption time and 71.2sec decryption time.

Highlights

  • The rapid development in Wireless Sensor Networks (WSN) has motivatedto provide cost effective and power efficient devices

  • Extensive experiments were carried with the proposed Voronoi Clustered Secure Contextual Cryptographic Algorithm (VC-SCCA) withexisting methods such as Secured WSN (SeC‐WSN) and Taylor based Cat Salp Swarm Algorithm (Taylor C-SSA)

  • The performance is analyzed with parameters like energy consumption, Packet Delivery Ratio (PDR), network lifetime, encryption time and decryption time

Read more

Summary

Introduction

The rapid development in WSN has motivatedto provide cost effective and power efficient devices. Sensors are comprised of signal processing and sensing devices which offer numerous processingabilities for nodes in WSN to provide wireless communication. Wireless Sensor Network consists of various nodesthatcollects the packets from its neighborswhich further forwards them to its sink node independently [1]. Sensors are inexpensive and provide less battery power; thereby causing energy issues. In applications where the data has to be gathered, every node is responsible to sense data packets [3]. Under wireless sensor application the Sensor Nodes (SNs) forwards the identifieddatavia multi-hop manner. In multi-hop each sensor nodeneeds the assistance of its neighbours for forwarding the information to base station / sink node [6] and it generates numerous vulnerabilities in WSN.

Performance analysis
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call