oalogo2  

AUTHOR(S):

M. P. Vani

 

TITLE

Secured and Efficient Transfer of Clustered Data Using Wireless Sensor Networks

pdf PDF

ABSTRACT

Safe in sequence communication is a serious subject designed for wireless sensor networks (WSNs). cluster exist an efficient in addition to sensible technique in the direction of improving the scheme by demonstrating the WSNs. during the document, the protected information communication intended for cluster-based WSNs (CWSNs), anywhere the cluster be shaped animatedly in addition to from time to time. We suggest two Secure in addition to efficient data Transmission (SET) protocol designed for CWSNs, call SET-IBS in addition to SET-IBOOS, through by means of the Identity-Based digital Signature (IBS) method in addition to the Identity-Based Online/Offline digital Signature (IBOOS) method, correspondingly. within SET-IBS, safety relies resting on the stability of the Diffie-Hellman difficulty during the coupling area. SET-IBOOS additional reduce the computational transparency designed for set of rules safety, which be critical designed for WSNs, though its safety relies resting on the stiffness of the separate logarithm difficulty. We demonstrate the probability of the SET-IBS in addition to SET-IBOOS protocol by means of admiration in the direction of the protection supplies in addition in the direction of safety investigation next to different attack. The calculation in addition to simulation provide the direction of demonstrating the effectiveness of the projected protocol. The consequences demonstrate with the intention of, the future protocol contain improved construction than the presented protected protocol intended for CWSNs, during conditions of safety diagram layer in adding jointly in the direction of strength expenditure.

KEYWORDS

CWSN, Ibs, protocol ,Secure ,Set-Ibs ,Set-Iboos

 

Cite this paper

M. P. Vani. (2022) Secured and Efficient Transfer of Clustered Data Using Wireless Sensor Networks. International Journal of Communications, 7, 39-46

 

cc.png
Copyright © 2022 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0