Abstract
Wireless sensor networks consist of many small nodes with distributing devices to monitor conditions at different locations. Usually wireless sensor nodes are sprinkled in a sensor field grouping limited areas. This paper highlights the Enhanced Cluster Based Key management (ECBK) protocol to achieve secure data delivery based on clustering mechanism. This protocol gives more importance to Cluster Coordinator node, which is used to coordinate the members and provide protective communication among the sensor nodes to enhance reliability. In Enhanced Cluster Based Key management two types of nodes are deployed. The high power nodes form clusters with surrounding nodes to enable the routing process without interference. This paper introduces ECBK protocol that balances the load among the clusters, achieves high throughput, end to end delay will be reduced, routing overhead also reduced and also it prolongs the network lifetime. Simulation results show that the presence of high transmission nodes reduces the delay, load balance, routing overhead, and enhances the throughput increased by 45% compared to other similar methods.
Highlights
Wireless sensor network (WSN) is a collection of micro sensors that are powered by low energy batteries andHow to cite this paper: Robinson, Y.H., Balaji, S. and Rajaram, M. (2016) Enhanced Cluster Based Key management (ECBK): Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service
The network throughput of ECBK is highest compared to the other protocols, as seen in Figure 5 because high energy nodes are chosen as Cluster Heads and only nodes with the threshold reception power are chosen for intermediate hops
In this paper clustering with key management scheme ECBK is proposed for routing in WSN
Summary
Wireless sensor network (WSN) is a collection of micro sensors that are powered by low energy batteries and. Security of these networks emerges as a critical issue [1]. Enhanced Cluster Based Key management scheme for wireless sensor network can be used to increase the network lifetime in a secured way.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.