WSNLAB Research Papers - Academia.edu (original) (raw)

In this paper, we propose the encryption plan named (ECC Cryptography (ECC) and Homomorphic Encryption (HE) algorithm to make sure the transmitte Homogeneous Wireless sensor networks (HWSNs) are protected and confident. The proposed plan... more

In this paper, we propose the encryption plan named (ECC Cryptography (ECC) and Homomorphic Encryption (HE) algorithm to make sure the transmitte Homogeneous Wireless sensor networks (HWSNs) are protected and confident. The proposed plan encryption is constructed under Artificial Bee Colony Routing Method (ABCRM). The ABCRM used to balancing node energy consumption due to get the higher pe additionally to low-end sensors as large number. To investigate the ability for providing the high data security with small size for key by using the ECC, because the ECC method for excha the sensor node identification number, and distance between this sensor nodes with to them cluster head (CH) using to produce the encryption plan key which represented to proposed the data security. To reduce the C energy consumption, using second part from this encryption method (HE encryption) to let the CH to aggregate the encrypted data. The Simulation proposed method results prove the greatly improve lifespan network performance established of energy consumpt Keywords-Wireless sensor networks Wireless Sensor Networks have emerged as an important new area in wireless technology. In the near future, the wireless sensor networks are expected to consist of thousands of inexpensive nodes, each having sensing capability with limited computational and communication power deployed in a vast variety of environments for commercial, civil, and military applications such as surveillance, vehicle tracking, climate and habitat monitoring, intelligence, medical, and acoustic data gatherin limitations of wireless sensor networks are the storage, power and processing. These limitations and the specific architecture of sensor nodes call for energy efficient and secure communication protocols. The systematic gathering and transmissi operation in such a network. Sensors have the ability to carry out in reroute to the base station when data gathering. In such sensor syst information can be gathered from all the sensors to the base station. In data gathering, from agreed energy constraints of the sensors expanding the system lifetime is a major threat. The data aggregator node or th head combine the data to the base station and the malicious attacker may attack this cluster node. This is an open access article distributed under the terms of the Creative Commons Attribution License, Which Permits unrestricted use, distribution, and reproduction in any m and source are credited In this paper, we propose the encryption plan named (ECC Cryptography (ECC) and Homomorphic Encryption (HE) algorithm to make sure the transmitte Homogeneous Wireless sensor networks (HWSNs) are protected and confident. The proposed plan encryption is constructed under Artificial Bee Colony Routing Method (ABCRM). The ABCRM used to balancing node energy consumption due to get the higher performance by deploying the powerful high end sensors as large number. To investigate the ability for providing the high data security with small size for key by using the ECC, because the ECC method for excha the sensor node identification number, and distance between this sensor nodes with to them cluster head (CH) using to produce the encryption plan key which represented to proposed the data security. To reduce the C energy consumption, using second part from this encryption method (HE encryption) to let the CH to aggregate the encrypted data. The Simulation proposed method results prove the greatly improve lifespan network performance established of energy consumption terms and highest paths Wireless sensor networks; Data Encryption; I. INTRODUCTION Wireless Sensor Networks have emerged as an important new area in wireless technology. In the near future, the ss sensor networks are expected to consist of thousands of inexpensive nodes, each having sensing capability with limited computational and communication power deployed in a vast variety of environments for commercial, civil, and military applications such as surveillance, vehicle tracking, climate and habitat monitoring, intelligence, medical, and acoustic data gatherin limitations of wireless sensor networks are the storage, power and processing. These limitations and the specific architecture of sensor nodes call for energy efficient and secure communication protocols.