Sufficient Authentication for Energy Consumption in Wireless Sensor Networks
Given the understanding of the prospective WSN programs and because of source restrictions, key management emerges as a complicated problem for WSNs. One of the main issues when developing a key management scheme is the system scalability. Indeed, the method should assistance a huge number of nodes...
Gespeichert in:
Veröffentlicht in: | International journal of electrical and computer engineering (Malacca, Malacca) Malacca), 2016-04, Vol.6 (2), p.735 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Given the understanding of the prospective WSN programs and because of source restrictions, key management emerges as a complicated problem for WSNs. One of the main issues when developing a key management scheme is the system scalability. Indeed, the method should assistance a huge number of nodes to allow a large range implementation of the system. In this paper we implemented a performance trade-off research of power intake vs. Quality of Solutions obtain in stability, suitability, and security for redundancy control of clustered heterogeneous wireless indicator systems using multipath routing to response customer concerns. We urbanized a novel probability style to evaluate the best redundancy stage in terms of direction redundancy (mp ) and resource redundancy (ms), as well as the best attack identification configurations with regards to the number of voters (m) and the attack incantation interval under which the life-time of a heterogeneous wireless sensor network is optimized while fulfilling the stability, timeliness and protection specifications of question processing applications in the existence of untrustworthy wireless communication and harmful nodes. Lastly, we used our analysis outcomes to the style of powerful redundancy management criteria to recognize and implement the best design parameter configurations at playback in reaction to environment changes to extend the program life-time |
---|---|
ISSN: | 2088-8708 2088-8708 |
DOI: | 10.11591/ijece.v6i2.pp735-742 |