Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 39, Pages: 1-7
B. R. Tapas Bapu1* and L. C. Siddanna Gowd2
1 Department of Electronics and Communication Engineering, St.Peters University, Chennai - 600054, Tamil Nadu, India; [email protected]
2 AMS College, Namakkal - 637013, Tamil Nadu, India; [email protected]
*Author for correspondence
Department of Electronics and Communication Engineering
Objectives: The networks using wireless sensor are becoming the preferred considerations for the critical mission applications. These applications normally remain unattended for years and have to perform reliably for lifetime. However the performance of these systems is subject to significant degradation over time because of realities in sensing and failure, communication in real world, node faults and clock drift. Hence it becomes essential to continuously monitor the natural deteriorations and have provisions for self-healing as necessary. Methods/Statistical Analysis: The self-healing, error correction and node authentication are proposed by this paper. The network having wireless sensors has nodes that are dynamically forming into clusters. Every cluster group will be having a cluster head for verifying the whole node. Findings: The cluster head would authenticate any incoming node of this network through generating and verifying signatures on any message using the Elliptic Curve Cryptography based Digital Signature Algorithm (ECCDSA). The registration of new node and authentication of the node constitutes the successful process of the authentication and cluster head would store the information about authentication in server. Application/ Improvement: The presence of malicious nodes if any will be identified using the distribution process of the self-healing key and the malicious nodes will be thrown out of the cluster by cluster head so as to guarantee the network as secured. After identifying and removing this malicious node in the cluster, the properties of that malicious node would be stored in the server for future reference. During error correction process, any node having the property same as this malicious one will be identified and informed to the cluster head by any neighbor node. Then using the technique of Forward Error Correction (FEC), the Cluster Head (CH) will block that node having the same malicious property after comparing with the one stored in the server.
Keywords: Cluster Head, Greedy Algorithm, MAODV, PEACH, Self- Healing Routing
Subscribe now for latest articles and news.