Digital Signal Processing


High Reliable Secure Data Collection Using Complexity Exchanging Code Key Method Addressing Protocol in Wireless Sensor Network

Authors: V.jayaraj, M.Indhumathi

A Wireless Sensor Network (WSN) is emerging field in Information and communication technology. In WSN data transmission and data collection are unsecure because of sensor node Incompatibility. So providing security to Sensor network is very important. The key based Mechanism is secure data collection and it’s mainly used to guarantee data confidentiality. Range pair wise key is largely used due to the necessary of data encryption and decryption between each pair range of communication node. Fixed key mechanism difficult for the attacker to detect the regularity of the randomly generated key chain function in privacy homomorphism (PH).PH means no intermediate node to encrypt and decrypt only direct collect and aggregate data for encryption and decryption. It is special key based scheme. It’s totally based on beta distribution and some statistical tool using key code method by using Complexity exchanging code key method addressing protocol. We show how to reduce significant attacks and secure data collection on wireless sensor network.

Comments: 12 Pages.

Download: PDF

Submission history

[v1] 2012-08-19 00:24:39

Unique-IP document downloads: 94 times is a pre-print repository rather than a journal. Articles hosted may not yet have been verified by peer-review and should be treated as preliminary. In particular, anything that appears to include financial or legal advice or proposed medical treatments should be treated with due caution. will not be responsible for any consequences of actions that result from any form of use of any documents on this website.

Add your own feedback and questions here:
You are equally welcome to be positive or negative about any paper but please be polite. If you are being critical you must mention at least one specific error, otherwise your comment will be deleted as unhelpful.

comments powered by Disqus