Open Access Open Access  Restricted Access Subscription or Fee Access

Cluster-Based Secure Communication Using Short Path Selection in MATLAB

Jyoti Gahlawat

Abstract


The wireless sensor networks (WSNs) consists of several autonomous sensor nodes with sensing, processing and wireless communication capabilities. In this work, the sensor network security issues are resolved in clustered network when a new node enters into the network. In this present work, two-stage authenticated communication is defined. The first-level authentication is applied between the base station and the cluster head. In this process, the public key cryptography is applied for the aggregative communication. The base station generates the public key and private key pair for each cluster head. The public key is shared to the cluster head and the private key is kept by the base station. In this work, the DES approach of cryptography is used as the secure communication mechanism between the base station and cluster head. In the second level, the authentication will be maintained between the cluster head and cluster nodes. This authentication is performed using symmetric key. Here the cluster head will generate a key sequence and distribute it with each cluster node. Here, the symmetric communication will be achieved using secure hash algorithm. The work also includes the balanced cluster management over the network. As a new node enters to the system, the cluster heads in range will be identified and the cluster head will send the request to the base station for the acceptance of the new node. After the node identification, a key is generated for communication. In the same way, key exchange mechanism is also performed. Here sensor nodes are battery-operated. So energy saving is an important factor in WSN. In this paper, I have simulated communication graph theory based cluster which is the updated version of LEACH protocol and DEED protocol, which is one of the clustering-based energy-efficient routing protocols using MATLAB.

Keywords: cluster, MATLAB, secure communication

Full Text:

PDF


DOI: https://doi.org/10.37628/ijmdic.v4i1.751

Refbacks

  • There are currently no refbacks.