Analysis of Visible Light Communication using Integrated Avalanche Photodiode
Volume-4 | Issue-2
A Review on Identifying Suitable Machine Learning Approach for Internet of Things Applications
Volume-3 | Issue-3
TOWARDS GHZ METALLIC ACCESS NETWORKS
Volume-1 | Issue-1
REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3
Process Control Ladder Logic Trouble Shooting Techniques Fundamentals
Volume-1 | Issue-4
TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1
COMPUTATIONAL OFFLOADING FOR PERFORMANCE IMPROVEMENT AND ENERGY SAVING IN MOBILE DEVICES
Volume-1 | Issue-4
ANALYSIS OF ROUTING PROTOCOLS IN FLYING WIRELESS NETWORKS
Volume-1 | Issue-3
Dual Edge-Fed Left Hand and Right Hand Circularly Polarized Rectangular Micro-Strip Patch Antenna for Wireless Communication Applications
Volume-2 | Issue-3
Modified Gray Wolf Feature Selection and Machine Learning Classification for Wireless Sensor Network Intrusion Detection
Volume-3 | Issue-2
TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1
Hybrid Micro-Energy Harvesting Model using WSN for Self-Sustainable Wireless Mobile Charging Application
Volume-3 | Issue-3
Three Phase Coil based Optimized Wireless Charging System for Electric Vehicles
Volume-3 | Issue-3
Cyber-attack and Measuring its Risk
Volume-3 | Issue-4
REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3
Analysis of Solar Power Generation Performance Improvement Techniques
Volume-4 | Issue-3
Pollination Inspired Clustering Model for Wireless Sensor Network Optimization
Volume-3 | Issue-3
Design of Low Power Cam Memory Cell for the Next Generation Network Processors
Volume-3 | Issue-4
A STUDY OF RESEARCH NOTIONS IN WIRELESS BODY SENSOR NETWORK (WBSN)
Volume-1 | Issue-2
Computation of Constant Gain and NF Circles for 60 GHz Ultra-low noise Amplifiers
Volume-3 | Issue-3
Volume - 1 | Issue - 2 | june 2019
Published
June, 2019
The advanced progress in wireless communication pays attention on information of more sensitivity to be delivered to its destined end with numerous of restrains, such as reliableness, constancy, response time and safety. The advancements in digital gadgetry, the usage of unwired transceivers and microcontrollers has made viable the integration of sensing and computing device with transceivers and power units to form a single unit called sensor nodes, the enveloping of sensor nodes form wireless sensor nodes. Innumerable existing proposals have aimed at the energy efficient and secure transmission of data but have achieved any one at the cost of the other. Noting down the issues of the existing method this paper proposes an energy efficient multi-tier sustainable secure routing protocol (EEMSR) for mobile wireless sensor nodes which is a cohabit of multi-tier secure routing with an AL (Ant Lion) optimizer (CoMSRALO) along with the prime curve cryptography supported by the routing formed in spherical structure. This better encryption and decryption method takes the edge of power consumption and offers control over the utilization of energy which is difficult to be achieved when dispatching the pack and also avoids the intervention of the encroacher and improves the security and minimizes the deprivation caused due the information lost.
KeywordsWireless sensor network AL optimizer multi-secure spherical structure routing sustainable security power consumption encryption
Full Article PDF Download Article PDF