Privacy Preserving of Data transmission for Cluster Based Wireless Sensor Network

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2015 by IJETT Journal
Volume-30 Number-3
Year of Publication : 2015
Authors : K. Mallikarjuna Reddy, Mula.Sudhakar

Citation 

K. Mallikarjuna Reddy, Mula.Sudhakar"Privacy Preserving of Data transmission for Cluster Based Wireless Sensor Network", International Journal of Engineering Trends and Technology (IJETT), V30(3),151-154 December 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Efficient data transmission in wireless sensor network is an important issue in the networks. So that to provide the efficient data sharing in the wireless sensor network we can perform the any one of cryptography technique. Before provide security of data we can perform the clustering of nodes in the wireless sensor network. Clustering of nodes is an effective way of to enhance the performance of wireless sensor network. By performing the clustering of nodes in the network we improve the network efficiency and also reduce the time complexity for the transmitting data. The clustering node can be performed by the dynamically and periodically. In this paper we proposed the midpoint clustering algorithm for the generation of number of cluster group. Before generation of clusters we can perform the authentication process of each node in the wireless sensor network. The authentication process can be done by implementing identity based polynomial signature algorithm. After that we can perform the clustering process and also provide security of transferring data. To provide security of data we are using bit sequence message integrity protocol. By using this protocol we can perform the encryption and decryption of transferring message. By implementing those concepts we can improve efficiency of wireless sensor network.

 References

[1]. A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.
[2]. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660- 670, Oct. 2002.
[3]. K. Pradeepa, W.R. Anne, and S. Duraisamy, “Design and Implementation Issues of Clustering in Wireless Sensor Networks,” Int’l J. Computer Applications, vol. 47, no. 11, pp. 23-28, 2012.
[4]. Abdullah, M.Y., Gui Wei Hua,” Cluster-Based Security for Wireless Sensor Networks”, Communications and Mobile Computing, CMC `09. WRI International Conference on Volume: 3, Page(s): 555- 559, Publication Year: 2009
[5] Tingyao Jiang, Gangliang Wang, Heng Yu, “A dynamic intrusion detection scheme for cluster-based wireless sensor networks”, World Automation Congress (WAC), Page(s): 259- 261, Publication Year: 2012
[6]. A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. Advances in Cryptology (CRYPTO), pp. 47- 53,1985.
[7]. R. Yasmin, E. Ritter, and G. Wang, “An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures,” Proc. IEEE Int’l Conf. Computer and Information Technology (CIT), pp. 882-889, 2010.
[8]. H. Lu, J. Li, and H. Kameda, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using ID-Based Digital Signature,” Proc. IEEE GLOBECOM, pp. 1-5, 2010.
[9]. J. Sun et al., “An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks,” IEEE Trans. Parallel & Distributed Systems, vol. 21, no. 9, pp. 1227-1239, Sept. 2010.
[10]. F. Hess, “Efficient Identity Based Signature Schemes Based on Pairings,” Proc. Ninth Ann. Int’l Workshop Selected Areas in Cryptography (SAC), pp. 310-324, 2003.
[11]. Y. Jia, L. Zhao, and B. Ma, “A Hierarchical Clustering- Based Routing Protocol for Wireless Sensor Networks Supporting Multiple Data Aggregation Qualities,” IEEE Trans. Parallel & Distributed Systems, vol. 4, nos. 1/2, pp. 79-91, 2008.
[12]. D. Liu and P. Ning, “Multilevel _TESLA: Broadcast Authentication for Distributed Sensor Networks,” ACM Trans. Embedded Computing Systems, vol. 3, pp. 800-836, 2004.

Keywords
Cluster-based WSNs, secure data transmission, digital signature, privacy, cryptography.