UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 7
July-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1807786


Registration ID:
185473

Page Number

448-451

Share This Article


Jetir RMS

Title

An Efficient Secure End to End Protocol in WSN

Abstract

Now a day’s wireless sensor network is most important technology for transferring data through network with secure manner. Before transferring message from source node to destination node we can find out path consisting of connected links. To identify the routing from source node to destination node so many end to end routing protocols are existing in the world. In this paper we are implementing a novel design secure end to end routing protocol for transfer data with securely. Before performing data transformation process we can implement two more fundamental concepts are user key establishment and authentication. The user authentication process enables for identify users by group key manager. The generation key we are using differ hellman key exchange algorithm. The authentication of both users we are implementing a random nonce based authentication schema. Before transferring data to destination node the source will send ids to group key manager. The server will find routing from source node to destination node, using that path data will be transferred to destination node. Before transferring message the source node will encrypt the message and send to destination node. By performing data encryption and decryption process we are using cryptography technique. So that by implementing those concepts we can improve efficiency of network and also provide more security of transferred message.

Key Words

Cryptography, routing, security, network security, wireless sensor network

Cite This Article

"An Efficient Secure End to End Protocol in WSN", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 7, page no.448-451, July-2018, Available :http://www.jetir.org/papers/JETIR1807786.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"An Efficient Secure End to End Protocol in WSN", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 7, page no. pp448-451, July-2018, Available at : http://www.jetir.org/papers/JETIR1807786.pdf

Publication Details

Published Paper ID: JETIR1807786
Registration ID: 185473
Published In: Volume 5 | Issue 7 | Year July-2018
DOI (Digital Object Identifier):
Page No: 448-451
Country: Visakhapatnam, AP, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002875

Print This Page

Current Call For Paper

Jetir RMS