An Efficient User Authentication and Secure Data Transfer for End_to_End Routing Protocol in Wireless Sensor Network

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-52 Number-2
Year of Publication : 2017
Authors : Nagudu Haritha, Kasukurthi Venkata Rao

Citation 

Nagudu Haritha, Kasukurthi Venkata Rao "An Efficient User Authentication and Secure Data Transfer for End_to_End Routing Protocol in Wireless Sensor Network", International Journal of Engineering Trends and Technology (IJETT), V52(2),64-69 October 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Now a day’s wireless sensor network is most important technology for transferring data through network with secure manner. Before transferring message from source node to destination node we can find out path consisting of connected links. To identify the routing from source node to destination node so many end to end routing protocols are existing in the world. In this paper we are implementing a novel design secure end to end routing protocol for transfer data with securely. Before performing data transformation process we can implement two more fundamental concepts are user key establishment and authentication. The user authentication process enables for identify users by group key manager. The generation key we are using differ Hellman key exchange algorithm. The authentication of both users we are implementing a random nonce based authentication schema. Before transferring data to destination node the source will send ids to group key manager. The server will find routing from source node to destination node, using that path data will be transferred to destination node. Before transferring message the source node will encrypt the message and send to destination node. By performing data encryption and decryption process we are using cryptography technique. So that by implementing those concepts we can improve efficiency of network and also provide more security of transferred message.

Reference
[1]. I.F. Akyildiz et al, W.Su, Y.Sankarasubramaniam, E.Cayirci “Wireless sensor networks: a survey”, Computer Networks, Vol. 38, pp. 393- 422, March 2002.
[2] K.Akkaya, M younis “A survey on routing protocols for wireless sensor networks” Ad Hoc Networks 3 (2005), pp 325- 345, 2005.
[3]. M. L. Das, “Two-factor user authentication in wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1086–1090, Mar. 2009.
[4]. L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proc. ACM Conf. CCS, 2002, pp. 41–47.
[5]. L. Harn and C. F. Hsu, “Predistribution scheme for establishing group keys in wireless sensor networks,” IEEE Sensors J., vol. 15, no. 9, pp. 5103–5108, Sep. 2015.
[6] W. Gu, N. Dutta, S. Chellappan, and X. Bai, “Providing endto- end secure communications in wireless sensor networks,” IEEE Trans. Netw. Service Manage., vol. 8, no. 3, pp. 205–218, Sep. 2011.
[7]. “21 ideas for the 21st century”, Business Week, Aug. 30 1999, pp. 78-167.
[8]. S.K. Singh, M.P. Singh, and D.K. Singh, “A survey of Energy-Efficient Hierarchical Cluster-based Routing in Wireless Sensor Networks”, International Journal of Advanced Networking and Application (IJANA), Sept.–Oct. 2010, vol. 02, issue 02, pp. 570–580.
[9]. S.K. Singh, M.P. Singh, and D.K. Singh, "Energy-efficient Homogeneous Clustering Algorithm for Wireless Sensor Network", International Journal of Wireless & Mobile Networks (IJWMN), Aug. 2010, vol. 2, no. 3, pp. 49-61.
[10]. Jun Zheng and Abbas Jamalipour, “Wireless Sensor Networks: A Networking Perspective”, a book published by A John & Sons, Inc, and IEEEE, 2009.
[11]. Luis Javier García Villalba, Ana Lucila Sandoval Orozco, Alicia Triviño Cabrera, and Cláudia Jacy Barenco Abbas, “Routing Protocol in Wireless Sensor Networks”, Sensors 2009, vol. 9, pp. 8399- 8421.
[12]. E. Zanaj, M. Baldi, and F. Chiaraluce, “Efficiency of the Gossip Algorithm for Wireless Sensor Networks”, In Proceedings of the 15th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split–Dubrovnik, Croatia, September, 2007.

Keywords
wireless sensor network, authentication, cryptography, routing, shared key, encryption and decryption.