Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:4 Issue:3 Year: 31 March,2016 Pages:634-643
A traditional setting, investigations on group communication focus on system reliability in the face of network failures or group member changes. However, sensor networks face serious obstacles like limited energy resources and high vulnerability to harsh environmental conditions that have to be considered carefully. In our concept, sink selects the nodes to create a cluster head based on node received signal strength. Cluster head assigns digital signature to each node for transmits sensed data to sink through cluster head using RCS (Resource Conscious Secure Routing) protocols. The protocol is used to authenticate the digital signature of that authorized node, which are efficient for communication and applying the key management for security. After packet transmission sink conduct recycling process to select new cluster head based on node threshold value. Although all sub nodes id and cluster head changed based on RCS. We are using localization algorithm to detect the attack in cluster head. Sink to detect the active attack based on checking the new node arrival using localization algorithm. After identification of attacker, that attacker node goes to inactive state. For security purposes, the content of each message can also be encoded by using pattern encoding method and decoded at the sink node by knowing the swapping bit position. So, unauthenticated person cannot access the original data. By this way, the protocol provides a secure message delivery option to maximize the message delivery ratio under adversarial attacks.
routing, message delivery ratio, energy balance, pattern encoding, random walking.
[1] G. J. Pottie and W. J. Kaiser, “Wireless integrated network sensors,” Commun. ACM, vol. 43, no. 5, pp. 51–58, May 2000. [2] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energyefficient communication protocol for wireless micro sensor networks,” in Proc. 33rd Annu. Hawaii Int. Conf. Syst. Sci., Jan. 2000, p. 8020. [3] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A survey,” Comput. Netw., vol. 38, no. 12, pp. 393–422, Aug. 2002. [4] Hung, C.C., K.J. Lin, C.C. Hsu, C.F. Chou and C.J. Tu, 2010. “On enhancing network- lifetime using opportunistic routing in wireless sensor networks,” in Computer Communications and Networks (ICCCN), 2010 Proceedings of 19th International Conference on, Aug.