MANAGING OF PERFORMANCE IMPROVEMENT FOR CLUSTER BASIS NETWORKS

P.Sreekanth Reddy, M. Anusha, Dr. J.Sasi Kiran, D.Koteswara Rao

Abstract


Practical data transmission is one of most important issues for sensor networks. Identity-based digital signature system concept as set up as a significant management in wireless sensor networks for security. Data transmission of secure and efficient is, in particular essential in numerous realistic sensor networks. Cluster-based wireless sensor networks were gaining importance for the past few years, on the other hand the functioning of cluster-based construction in real world is relatively complex. In the system of cluster-based wireless networks, every cluster contain a leader sensor node, considered as cluster head which aggregates data that is collected by leaf nodes in its cluster. Secure and resourceful data Transmission procedures were introduced for cluster-based wireless sensor networks known as secure as well as efficient data transmission-identity-based digital signature as well as Secure as well as efficient data transmission- Identity-based online/offline digital signature system. Identity-based scheme of online/ offline digital signature was projected to decrease computation as well as storage costs of signature processing. It may be effective for key management in wireless sensor networks. Well-organized communication within identity-based digital signature depends on ID based cryptography. The key perception of these protocols is to confirm the encrypted sensed information, by introducing digital signatures towards resourceful message packets, in communication and apply key management for safeguarding.


Keywords


Data transmission, wireless sensor networks, Cluster, Identity-based digital signature, Key management.

References


W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660- 670, Oct. 2002.

A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol,” IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.

S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.

P. Banerjee, D. Jacobson, and S. Lahiri, “Security and Performance Analysis of a Secure Clustering Protocol for Sensor Networks,” Proc. IEEE Sixth Int’l Symp. Network Computing and Applications (NCA), pp. 145-152, 2007.

K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management,” Proc. Fourth Int’l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM), pp. 1-5, 2008.

S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf. Comm., Computing & Security (ICCCS), pp. 146-151, 2011.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.