A Secure data packet transmission in wireless sensor network using HECC algorithm and Finding malicious packet

  • Authors

    • M Venkateswara Rao
    • K Raghava Rao
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10247
  • HECC, WSN security, security threads, Path discovery
  • The most important purpose of implementing to share secure knowledge in encrypted kind in network is to extend the safety of personal networks and its databases and to additionally give remotely infrastructure less secure services globally.  In the current system approach ECC elliptic curve cryptography is being used to deal with the security issue in wireless sensor network. Thus the system still get a long packet transfer time, which can be further become a disadvantage while dealing with large data packet. Thus the system further and study require reducing the computation transfer time in between the packet. A proposed hyper elliptic curve mechanism for the cryptography can be used to opt out the best performance over the data packet transfer. In this scenario HECC algorithm is utilized and hence the result outcome shows the efficiency of the algorithm.

  • References

    1. [1] XUXUN LIU,†Routing Protocols Based on Ant Colony Optimization in Wireless Sensor Networks: A Surveyâ€,IEEE Access, Digital Object Identifier 10.1109/ACCESS.2017.2769663.

      [2] Peng Huang,1,2Feng Lin,3 and Jiliu Zhou3, ACO-Based Routing Algorithm for Cognitive Radio Networks

      [3] Alexey S. Matveev and Andrey V. SavkinMultirate Stabilization of Linear Multiple Sensor Systems

      [4] Charles E. LaljerThe MITRE Corporation San Antonio, TX 78227,CHEMICAL AGENT DETECTOR

      [5] Peng Huang,1,2 Feng Lin,3 and Jiliu Zhou3, ACO-Based Routing Algorithm for Cognitive Radio Networks.

      [6] Rouleau, Robert and Hodgson, Ian (1981). Packet Radio. Tab Books, Blue Ridge Summit, PA. ISBN 0-8306-9628-8.

      [7] Admilson R. L. Ribeiro and Edward David Moreno, Asymmetric Encryption in WirelessSensor Networks.

      [8] Orly Stan, Yuval Elovici, AsafShabtai, proposed military protocol architecture.

      [9] DebapriyaBasu Roy, Poulami Das, and DebdeepMukhopadhyay, ECC on Your Fingertips

      [10] It is explained by the wikipedia: https://en.wikipedia.org/wiki/Unit_interval_(data_transmission).

      [11] Mohammad JalilPiran1 , G. Rama Murthy2 , G. Praveen Babu3

      [12] LuisCobo,AlejandroQuintero,SamuelPierreAnt-based routing.

      [13] Gustavo S. Quirino, Admilson R. L. Ribeiro and Edward David Moreno, Asymmetric Encryption in Wireless Sensor Networks INTECH 2014.

  • Downloads

  • How to Cite

    Venkateswara Rao, M., & Raghava Rao, K. (2018). A Secure data packet transmission in wireless sensor network using HECC algorithm and Finding malicious packet. International Journal of Engineering & Technology, 7(2.7), 16-19. https://doi.org/10.14419/ijet.v7i2.7.10247