IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Node Authentication Model in Wireless Sensor Networks With Locked Cluster Generation

A Node Authentication Model in Wireless Sensor Networks With Locked Cluster Generation
View Sample PDF
Author(s): C. R. Bharathi (Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India), Alapati Naresh (Vignan's Nirula Institute of Technology and Science for Women, India), Arepalli Peda Gopi (Vignan's Nirula Institute of Technology and Science for Women, India)and Lakshman Narayana Vejendla (Vignan's Nirula Institute of Technology and Science for Women, India)
Copyright: 2021
Pages: 15
Source title: Design Methodologies and Tools for 5G Network Development and Application
Source Author(s)/Editor(s): P. Suresh (Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India), G. Vairavel (Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India)and U. Saravanakumar (Muthayammal Engineering College, India)
DOI: 10.4018/978-1-7998-4610-9.ch012

Purchase

View A Node Authentication Model in Wireless Sensor Networks With Locked Cluster Generation on the publisher's website for pricing and purchasing information.

Abstract

In wireless sensor networks (WSN), the majority of the inquiries are issued at the base station. WSN applications frequently require collaboration among countless sensor nodes in a network. One precedent is to persistently screen a region and report occasions. A sensor node in a WSN is initially allocated with an energy level, and based on the tasks of that sensor node, energy will be reduced. In this chapter, two proposed methods for secure network cluster formation and authentication are discussed. When a network is established then all the nodes in it must register with cluster head and then authentication is performed. The selection of cluster head is done using a novel selection algorithm and for authenticating the nodes. Also, a novel algorithm for authentication is used in this chapter. The validation and authorization of nodes are carried over by managing the keys in WSN. The results have been analyzed using NS2 simulator with an aid of list of relevant parameters.

Related Content

J. Mangaiyarkkarasi, J. Shanthalakshmi Revathy. © 2024. 34 pages.
Gummadi Surya Prakash, W. Chandra, Shilpa Mehta, Rupesh Kumar. © 2024. 22 pages.
Duygu Nazan Gençoğlan. © 2024. 35 pages.
Smrity Dwivedi. © 2024. 20 pages.
Pallavi Sapkale, Shilpa Mehta. © 2024. 21 pages.
Pardhu Thottempudi, Vijay Kumar. © 2024. 43 pages.
Sathish Kumar Danasegaran, Elizabeth Caroline Britto, S. Dhanasekaran, G. Rajalakshmi, S. Lalithakumari, A. Sivasangari, G. Sathish Kumar. © 2024. 18 pages.
Body Bottom