Paper
28 January 2013 AES based secure low energy adaptive clustering hierarchy for WSNs
K. Ravi Kishore, N. V. S. Narasimha Sarma
Author Affiliations +
Proceedings Volume 8760, International Conference on Communication and Electronics System Design; 87601V (2013) https://doi.org/10.1117/12.2012337
Event: International Conference on Communication and Electronics System Design, 2013, Jaipur, India
Abstract
Wireless sensor networks (WSNs) provide a low cost solution in diversified application areas. The wireless sensor nodes are inexpensive tiny devices with limited storage, computational capability and power. They are being deployed in large scale in both military and civilian applications. Security of the data is one of the key concerns where large numbers of nodes are deployed. Here, an energy-efficient secure routing protocol, secure-LEACH (Low Energy Adaptive Clustering Hierarchy) for WSNs based on the Advanced Encryption Standard (AES) is being proposed. This crypto system is a session based one and a new session key is assigned for each new session. The network (WSN) is divided into number of groups or clusters and a cluster head (CH) is selected among the member nodes of each cluster. The measured data from the nodes is aggregated by the respective CH’s and then each CH relays this data to another CH towards the gateway node in the WSN which in turn sends the same to the Base station (BS). In order to maintain confidentiality of data while being transmitted, it is necessary to encrypt the data before sending at every hop, from a node to the CH and from the CH to another CH or to the gateway node.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
K. Ravi Kishore and N. V. S. Narasimha Sarma "AES based secure low energy adaptive clustering hierarchy for WSNs", Proc. SPIE 8760, International Conference on Communication and Electronics System Design, 87601V (28 January 2013); https://doi.org/10.1117/12.2012337
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Sensor networks

Sensors

Head

Network security

Computer security

Symmetric-key encryption

Received signal strength

Back to Top