##plugins.themes.academic_pro.article.main##

Abstract

Wireless sensor network (WSN) is a collection of sensors organized into a cooperative network. The sensors are monitor the physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. Security and energy consumption are considered to be long-lasting technical challenges in WSNs. In order to avoid this security and energy consumption problem, channel aware encryption and decision fusion is to provide a secure transmission from sensors to the Ally Fusion Center (AFC) without using any traditional cryptographic techniques. Consider a passive eavesdropping where an Enemy Fusion Center (EFC) located in a vicinity of an AFC tries to eavesdrop on wireless communication between sensors and AFC. Two groups of sensors are activated and send their data in different ways by a random exploiting channel gain over parallel access channel to the AFC.AFC properly detect the target while the EFC is totally ignorant it. The performance evaluation show that detection performance at the AFC exponentially decays with growing the number of sensors. Clustering technique provides an effective way to overcome these problems. Clustering technique can partition the nodes into clusters and select the cluster head (CH) among the nodes and Non Cluster Head (NCH) nodes. The CH receive the data from other nodes then sent to a sink to accomplish a specific goal.CH remain closer to their follower sensor nodes compared to the sink. It take less energy to transmit data to the cluster head instead of the sink, which allows the sensor nodes to conserve more energy and live longer in WSN, also provide a secure communication from nodes to the main station. 

Keywords— Wireless sensor networks (WSN), decision fusion, perfect secrecy, sensor nodes, clustering.

##plugins.themes.academic_pro.article.details##

Author Biographies

Lazeena V P, NCERC,Pampady

M. Tech, Applied Electronics and Communication System

Prasanth M, NCERC,Pampady

Assistant Professor, ECE Department,
How to Cite
V P, L., & M, P. (2015). A Robust Low Power Security System for Multi-Node Communication. International Journal of Emerging Trends in Science and Technology, 2(06). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/767

References

1. M. Bloch and J. Barros, “Physical-Layer Security: From Information Theory to Security Engineering” Cambridge, U.K.: Cambridge Univ.Press, 2011.
2. J. Zhu, J. Mo, and M. Tao, “Cooperative secret communication with artificial noise in symmetric interference channel,” IEEE Commun. Lett.,vol. 14, no. 10, pp. 885–887, Oct. 2010.
3. S Ali A. Fakoorian and A.Lee Swindlehurst,Fellow,IEEE”MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design “IEEE transactions on information forensics and security, vol. 6, no. 3, september 2011.
4. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,”IEEE Trans Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.
5. Y. Liang, H. V. Poor, and S. Shamai, “Secure communication over fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470–2492, Jun. 2008.
6. H. Koorapaty, A. Hassan, and S. Chennakeshu, “Secure information transmission for mobile radio,” IEEE Commun. Lett., vol. 4, no. 2, pp.52–55, Feb. 2000.
7. K.Kant and N.Gupta, Application based Study on Wireless Sensor Network”, International Journal of Computer Applications, Vol. 21, March 2011
8. Y. Sangho, H. Junyoung, C. Yookun and H.Jiman, "PEACH: Power-Efficient and adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks," Computer Communications,Vol.30, No.14-15, pp. 2842-2852, April 2007.
9. M. Diwakar and S .Kumar , An Energy Efficient Levelbased Clustering routing protocol for WSN International Journal of Advanced Smart Sensor Network Systems, Vol.2, issue 2, pp 55- 65, April 2012 .
10. S .Ganesh and R.Amutha Efficient and Secure Routing Protocol for Wireless Sensor Networks through Two level intrusion detection mechanism Wulfenia Journal, Vol.19, pp.388– 406, December 2012.
11. R.V.Kulkarni and A.Forester Computational intelligence in wireless sensor networks: A survey, IEEE Communications Surveys & Tutorials, Vol.13, issue1, pp. 68–96, April 2011.
12. S.Mohammadi,R.A.Ebrahimi,H.Jadidoleslamy, "A Comparison of Routing Attacks on Wireless Sensor Networks," International Journal of Information Assurance and Security, Vol. 6, No.3, pp. 195-215, July 2011.
13. C.Li, Shiwenhe, L.Yang and W.P Zhu, Joint power allocation for multicast systems with physical-layer network coding,‖ EURASIP Journal on Wireless Communications and Networking, pp.1-9, July 2010.