Author : Krishna Murthy 1
Date of Publication :7th November 2016
Abstract: The advancements in the Wireless technology activate the wireless users, to obtain its services with resource constraints.Due to the constraints in transmission range, multiple counts of ‘hops’ are needed to build a network to efficiently transfer the data across the networks. Therefore, the multi-hop networks should be protected from any external or internal attackers. The data should be delivered at the receiver end,without any modification. In order to protect the data from any intruders, we build trust aware routing protocol systems.We propose a trusted framework for hop-by-hop authentication scheme in wireless sensor networks. The objective of the study is to significantly reduce the data modification rate from the attackers. In addition to, a scalable Elliptic Curve Cryptography (ECC) is studied to establish an effective authentication process. By doing so, the data transmission between sender and receiver is effective, without considering the threshold issue. It supports for better decision making process.Both conceptual analysis and parallel results demonstrate that our proposed scheme is more efficient than existing works.
Reference :