Sufficient Authentication for Energy Consumption in Wireless Sensor Networks

SK. Riaz, V. Srirammanoj

Abstract


Given the understanding of the prospective WSN programs and because of source restrictions, key management emerges as a complicated problem for WSNs. One of the main issues when developing a key management scheme is the system scalability. Indeed, the method should assistance a huge number of nodes to allow a large range implementation of the system. In this paper we implemented a performance trade-off research of power intake vs. We urbanized a novel probability style to evaluate the best redundancy stage in terms of direction redundancy (mp) and resource redundancy (ms), as well as the best attack identification configurations with regards to the number of voters (m) and the attack incantation interval under which the life-time of a heterogeneous wireless sensor network is optimized while fulfilling the stability, timeliness and protection specifications of question processing applications in the existence of untrustworthy wireless communication and harmful nodes. Lastly, we used our analysis outcomes to the style of powerful redundancy management criteria to recognize and implement the best design parameter configurations at playback in reaction to environment changes to extend the program life-time.

Full Text:

PDF


DOI: http://doi.org/10.11591/tijee.v16i2.1619

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License