Implementing Elliptic Curve Cryptography with ACO Based Algorithm in Clustered WSN for Border Surveillance
Monitoring security at the border and prevention of intruders attack are the challenging problems in every developed country. Wireless sensor network are the effective solution for constructing the monitoring system which possess a sensor nodes deployed randomly to detect any objects or events cross...
Saved in:
| Published in | 2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) pp. 1 - 5 |
|---|---|
| Main Authors | , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.02.2018
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/AEEICB.2018.8480856 |
Cover
| Abstract | Monitoring security at the border and prevention of intruders attack are the challenging problems in every developed country. Wireless sensor network are the effective solution for constructing the monitoring system which possess a sensor nodes deployed randomly to detect any objects or events crossing in a particular region. Power conservation is the major criteria in wireless sensor network as the sensor nodes that are battery powered once deployed cannot be recharged in the field. This paper is focused on two major concepts for efficient detection of intruders with secured and efficient transmission by enhancing the network lifetime. In this work, an enhanced energy aware clustering algorithm by Ant approach (ACO) is used to detect any events or objects by balancing the power at each sensor nodes and also to maximize the lifetime of the network. Authentication is done by implementing Elliptical Curve Cryptography which provides keys for limited and authorized users for efficient and secured data transmission in WSN. |
|---|---|
| AbstractList | Monitoring security at the border and prevention of intruders attack are the challenging problems in every developed country. Wireless sensor network are the effective solution for constructing the monitoring system which possess a sensor nodes deployed randomly to detect any objects or events crossing in a particular region. Power conservation is the major criteria in wireless sensor network as the sensor nodes that are battery powered once deployed cannot be recharged in the field. This paper is focused on two major concepts for efficient detection of intruders with secured and efficient transmission by enhancing the network lifetime. In this work, an enhanced energy aware clustering algorithm by Ant approach (ACO) is used to detect any events or objects by balancing the power at each sensor nodes and also to maximize the lifetime of the network. Authentication is done by implementing Elliptical Curve Cryptography which provides keys for limited and authorized users for efficient and secured data transmission in WSN. |
| Author | Priya, S. Geetha, J. Malathy, S. Suresh, A. |
| Author_xml | – sequence: 1 givenname: S. surname: Malathy fullname: Malathy, S. organization: Department of Electrical & Electronics Engineering, S.A. Engineering College, Chennai – sequence: 2 givenname: J. surname: Geetha fullname: Geetha, J. organization: Department of Electrical & Electronics Engineering, S.A. Engineering College, Chennai – sequence: 3 givenname: A. surname: Suresh fullname: Suresh, A. organization: Department of Electrical & Electronics Engineering, S.A. Engineering College, Chennai – sequence: 4 givenname: S. surname: Priya fullname: Priya, S. organization: Department of Electrical & Electronics Engineering, S.A. Engineering College, Chennai |
| BookMark | eNotj7tOwzAYRo0EAy08QRe_QIKdi-2MiRUgUkWHVmKsHOd3auRc5KSgvD1B9FuOdIYjfRt03w89ILSjJKSUZC95WVayCCNCRSgSQUTK7tCGprFgCSMseURfVTc66KCfbd_i0jk7zlZjefXfgKVfxnlovRovC_6x8wXn8oALNUGDc9cOflUdtj2W7jrN4Ff9efzAZvC4GHwDHh__OtY51Wt4Qg9GuQmeb9yi02t5ku_B_vBWyXwf2IzMgVAJ4-tSojNu6ppok9URNSlnWnDSRIxnItLcxEwTBobEdSPqVDWUMlA6ibdo95-1AHAeve2UX8639_EvLZJVaQ |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/AEEICB.2018.8480856 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 1538646064 9781538646069 |
| EndPage | 5 |
| ExternalDocumentID | 8480856 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i90t-8a46777750c97fbb0cf9b21f576c870d267982c7f36c06ef03bd8b5ad116eac43 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 02:55:23 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-8a46777750c97fbb0cf9b21f576c870d267982c7f36c06ef03bd8b5ad116eac43 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_8480856 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-Feb. |
| PublicationDateYYYYMMDD | 2018-02-01 |
| PublicationDate_xml | – month: 02 year: 2018 text: 2018-Feb. |
| PublicationDecade | 2010 |
| PublicationTitle | 2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) |
| PublicationTitleAbbrev | AEEICB |
| PublicationYear | 2018 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.6896515 |
| Snippet | Monitoring security at the border and prevention of intruders attack are the challenging problems in every developed country. Wireless sensor network are the... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Active node Ant colony optimization clustered WSN energy aware scheduling TDMA |
| Title | Implementing Elliptic Curve Cryptography with ACO Based Algorithm in Clustered WSN for Border Surveillance |
| URI | https://ieeexplore.ieee.org/document/8480856 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwEA_bnnxS2cRv8uCj7dIuTdPHrWyosCls4t5G89Exnd0oraB_vZe0ThQf7FM4QlNy5O6a-93vELqKDGcZRNJOIolwKBcBjLjhxoPjxSKfBDYVM56wm0d6Nw_mDXS9q4XRWlvwmXbN0Oby1UaW5qqsyymHCIE1UTPkrKrVqomEPBJ1-8PhbTwwaC3u1jN_tEyxHmO0j8Zfa1VAkRe3LIQrP37RMP73Yw5Q57s2Dz_svM4hauisjZ4tya9F_mRLbHAYYAkkjsv8TeM4f98WNTM1NveuuB_f4wG4L4X76-UmB9ErXmU4XpeGNgHET9MJhmgWDywzJ56a95j2RLB4B81Gw1l849RdFJxVRAqHJ2AK4QmIjMJUCCLTSPheCv8ZEs6q8k0axpdh2mOSMJ2SnlCgsUR5HgOjTHtHqJVtMn2MMDe8oYGiLA0kDdNEgPdTCaUq0aHiveQEtc02LbYVT8ai3qHTv8VnaM-oqkJAn6NWkZf6Ahx8IS6tZj8BTkuoIg |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEN4gHvSkBoxv9-DRlj52-zhCAwEFNAGjN9J9lKBYSNOa6K93dlsxGg_2tJlsus1Odma68803CF2FirMMImkj5hYzSMAojALFjQfHywsdi-pUzGjs9R_IzRN9qqHrTS2MlFKDz6SphjqXL1a8UFdlrYAEECF4W2ibEkJoWa1VUQnZVthqd7uDqKPwWoFZzf3RNEX7jN4eGn2tVkJFXswiZyb_-EXE-N_P2UfN7-o8fL_xOweoJtMGetY0vxr7k86xQmKALeA4KrI3iaPsfZ1X3NRY3bzidnSHO-DABG4v56sMRK94keJoWSjiBBA_TsYY4lnc0dyceKLeoxoUweJNNO11p1HfqPooGIvQyo0gBmMID7V46CeMWTwJmWMn8KfB4bQKRyViHO4nrsctTyaWywToLBa27YFZJu4hqqerVB4hHCjmUCqIl1BO_CRm4P9ETIiIpS8CNz5GDbVNs3XJlDGrdujkb_El2ulPR8PZcDC-PUW7Sm0lHvoM1fOskOfg7nN2obX8CUcXq28 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+Fourth+International+Conference+on+Advances+in+Electrical%2C+Electronics%2C+Information%2C+Communication+and+Bio-Informatics+%28AEEICB%29&rft.atitle=Implementing+Elliptic+Curve+Cryptography+with+ACO+Based+Algorithm+in+Clustered+WSN+for+Border+Surveillance&rft.au=Malathy%2C+S.&rft.au=Geetha%2C+J.&rft.au=Suresh%2C+A.&rft.au=Priya%2C+S.&rft.date=2018-02-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FAEEICB.2018.8480856&rft.externalDocID=8480856 |