Loading…

RETRACTED ARTICLE: Trust aware localized routing and class based dynamic block chain encryption scheme for improved security in WSN

The modern wireless sensor network has great impact in the development of various domains of applications. The presence of malicious nodes introduces various threats and challenges to the network services. Different algorithms have been proposed towards the data security but not achieved the expecte...

Full description

Saved in:
Bibliographic Details
Published in:Journal of ambient intelligence and humanized computing 2021-05, Vol.12 (5), p.5287-5295
Main Authors: Hema Kumar, M., Mohanraj, V., Suresh, Y., Senthilkumar, J., Nagalalli, G.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The modern wireless sensor network has great impact in the development of various domains of applications. The presence of malicious nodes introduces various threats and challenges to the network services. Different algorithms have been proposed towards the data security but not achieved the expected performance. Towards performance hike, a novel trust aware localized routing and class based dynamic encryption scheme has been presented. The method first discovers the route to reach the destination and transmit the data packet. But the localized nature of each hop in the route estimates the trust measure for each neighbor according to their prior involvement in data transmission and number of retransmission of the same packets with other neighbor, number of successful transmission. By identifying the values of those parameters, the value of trusted data forwarding support (TDFS) is measured. According to the TDFS value of several routes, a route with the specific neighbor only selected for route selection. On the other side, the method maintains and classifies the data being transmitting into number of classes. Further, the method uses different signature and encryption schemes for various classes. The data has been encrypted with class specific scheme and key before transmission. The method generates a block chain where each block contains the part of encrypted data and represented by a hash and pointer to the next block. The same has been reversed to produce original data from the encrypted key. The method introduces higher performance data security and improves the overall network performance.
ISSN:1868-5137
1868-5145
DOI:10.1007/s12652-020-02007-w