IOT BASED ENCRYPTION & ROUTINE MODEL FOR DESIGNING AND IMPLEMENTING WSN NETWORK
AbstractIn recent years, the concept of IoT has become particularly popular through some representative applications (e. g., smart electric meter reading, greenhouse monitoring, telemedicine monitoring, and intelligent transportation). Usually, IoT has four major components including sensing, heterogeneous access, information processing, applications and services, and additional components such as security and privacy. We consider a practical WSN application, where all hardware transceivers suffer from impairments. The RF technique is employed by the source and relay nodes to prevent the eavesdroppers from combining the source data received over multiple hops. Moreover, these authorized transmitters can adjust their transmit power to reduce the channel capacity obtained on the eavesdropping links.We proposed three novel path selection methods, namely, SPS protocol, RPS protocol, and BPS protocol to investigate the impact of EH and hardware impairments on the outage performance of multi-hop multi-path cooperative WSNs. Moreover, we derive exactly and asymptotically the outage probabilities of three proposed protocols under the presence of one beacon, multiple eavesdropping attacks. The simulation results verified that the employment of BPS together with multi-hop multi-path schemes can enhance significantly the secure performance of the considered EH and hardware impairment system. In particular, BPS is more robust to hardware impairment than RPS and SPS; thus, it can operate better with device that has a poor hardware quality. Keywords: Matrix Laboratory (MATLAB), Random path selection (RPS), Shortest path selection (SPS), and Best path selection (BPS). Wireless sensor networks (WSNs).
How to Cite
Rishi Khare, Vishal Chauhan. (1). IOT BASED ENCRYPTION & ROUTINE MODEL FOR DESIGNING AND IMPLEMENTING WSN NETWORK. International Journal Of Innovation In Engineering Research & Management UGC APPROVED NO. 48708, EFI 5.89, WORLD SCINTIFIC IF 6.33, 7(7), 37-42. Retrieved from http://journal.ijierm.co.in/index.php/ijierm/article/view/50