Implementing Elliptic Curve Cryptography with ACO Based Algorithm in Clustered WSN for Border Surveillance

Monitoring security at the border and prevention of intruders attack are the challenging problems in every developed country. Wireless sensor network are the effective solution for constructing the monitoring system which possess a sensor nodes deployed randomly to detect any objects or events cross...

Full description

Saved in:
Bibliographic Details
Published in2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) pp. 1 - 5
Main Authors Malathy, S., Geetha, J., Suresh, A., Priya, S.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.02.2018
Subjects
Online AccessGet full text
DOI10.1109/AEEICB.2018.8480856

Cover

Abstract Monitoring security at the border and prevention of intruders attack are the challenging problems in every developed country. Wireless sensor network are the effective solution for constructing the monitoring system which possess a sensor nodes deployed randomly to detect any objects or events crossing in a particular region. Power conservation is the major criteria in wireless sensor network as the sensor nodes that are battery powered once deployed cannot be recharged in the field. This paper is focused on two major concepts for efficient detection of intruders with secured and efficient transmission by enhancing the network lifetime. In this work, an enhanced energy aware clustering algorithm by Ant approach (ACO) is used to detect any events or objects by balancing the power at each sensor nodes and also to maximize the lifetime of the network. Authentication is done by implementing Elliptical Curve Cryptography which provides keys for limited and authorized users for efficient and secured data transmission in WSN.
AbstractList Monitoring security at the border and prevention of intruders attack are the challenging problems in every developed country. Wireless sensor network are the effective solution for constructing the monitoring system which possess a sensor nodes deployed randomly to detect any objects or events crossing in a particular region. Power conservation is the major criteria in wireless sensor network as the sensor nodes that are battery powered once deployed cannot be recharged in the field. This paper is focused on two major concepts for efficient detection of intruders with secured and efficient transmission by enhancing the network lifetime. In this work, an enhanced energy aware clustering algorithm by Ant approach (ACO) is used to detect any events or objects by balancing the power at each sensor nodes and also to maximize the lifetime of the network. Authentication is done by implementing Elliptical Curve Cryptography which provides keys for limited and authorized users for efficient and secured data transmission in WSN.
Author Priya, S.
Geetha, J.
Malathy, S.
Suresh, A.
Author_xml – sequence: 1
  givenname: S.
  surname: Malathy
  fullname: Malathy, S.
  organization: Department of Electrical & Electronics Engineering, S.A. Engineering College, Chennai
– sequence: 2
  givenname: J.
  surname: Geetha
  fullname: Geetha, J.
  organization: Department of Electrical & Electronics Engineering, S.A. Engineering College, Chennai
– sequence: 3
  givenname: A.
  surname: Suresh
  fullname: Suresh, A.
  organization: Department of Electrical & Electronics Engineering, S.A. Engineering College, Chennai
– sequence: 4
  givenname: S.
  surname: Priya
  fullname: Priya, S.
  organization: Department of Electrical & Electronics Engineering, S.A. Engineering College, Chennai
BookMark eNotj7tOwzAYRo0EAy08QRe_QIKdi-2MiRUgUkWHVmKsHOd3auRc5KSgvD1B9FuOdIYjfRt03w89ILSjJKSUZC95WVayCCNCRSgSQUTK7tCGprFgCSMseURfVTc66KCfbd_i0jk7zlZjefXfgKVfxnlovRovC_6x8wXn8oALNUGDc9cOflUdtj2W7jrN4Ff9efzAZvC4GHwDHh__OtY51Wt4Qg9GuQmeb9yi02t5ku_B_vBWyXwf2IzMgVAJ4-tSojNu6ppok9URNSlnWnDSRIxnItLcxEwTBobEdSPqVDWUMlA6ibdo95-1AHAeve2UX8639_EvLZJVaQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/AEEICB.2018.8480856
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1538646064
9781538646069
EndPage 5
ExternalDocumentID 8480856
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-8a46777750c97fbb0cf9b21f576c870d267982c7f36c06ef03bd8b5ad116eac43
IEDL.DBID RIE
IngestDate Wed Aug 27 02:55:23 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-8a46777750c97fbb0cf9b21f576c870d267982c7f36c06ef03bd8b5ad116eac43
PageCount 5
ParticipantIDs ieee_primary_8480856
PublicationCentury 2000
PublicationDate 2018-Feb.
PublicationDateYYYYMMDD 2018-02-01
PublicationDate_xml – month: 02
  year: 2018
  text: 2018-Feb.
PublicationDecade 2010
PublicationTitle 2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)
PublicationTitleAbbrev AEEICB
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6896515
Snippet Monitoring security at the border and prevention of intruders attack are the challenging problems in every developed country. Wireless sensor network are the...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Active node
Ant colony optimization
clustered WSN
energy aware scheduling
TDMA
Title Implementing Elliptic Curve Cryptography with ACO Based Algorithm in Clustered WSN for Border Surveillance
URI https://ieeexplore.ieee.org/document/8480856
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwEA_bnnxS2cRv8uCj7dIuTdPHrWyosCls4t5G89Exnd0oraB_vZe0ThQf7FM4QlNy5O6a-93vELqKDGcZRNJOIolwKBcBjLjhxoPjxSKfBDYVM56wm0d6Nw_mDXS9q4XRWlvwmXbN0Oby1UaW5qqsyymHCIE1UTPkrKrVqomEPBJ1-8PhbTwwaC3u1jN_tEyxHmO0j8Zfa1VAkRe3LIQrP37RMP73Yw5Q57s2Dz_svM4hauisjZ4tya9F_mRLbHAYYAkkjsv8TeM4f98WNTM1NveuuB_f4wG4L4X76-UmB9ErXmU4XpeGNgHET9MJhmgWDywzJ56a95j2RLB4B81Gw1l849RdFJxVRAqHJ2AK4QmIjMJUCCLTSPheCv8ZEs6q8k0axpdh2mOSMJ2SnlCgsUR5HgOjTHtHqJVtMn2MMDe8oYGiLA0kDdNEgPdTCaUq0aHiveQEtc02LbYVT8ai3qHTv8VnaM-oqkJAn6NWkZf6Ahx8IS6tZj8BTkuoIg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEN4gHvSkBoxv9-DRlj52-zhCAwEFNAGjN9J9lKBYSNOa6K93dlsxGg_2tJlsus1Odma68803CF2FirMMImkj5hYzSMAojALFjQfHywsdi-pUzGjs9R_IzRN9qqHrTS2MlFKDz6SphjqXL1a8UFdlrYAEECF4W2ibEkJoWa1VUQnZVthqd7uDqKPwWoFZzf3RNEX7jN4eGn2tVkJFXswiZyb_-EXE-N_P2UfN7-o8fL_xOweoJtMGetY0vxr7k86xQmKALeA4KrI3iaPsfZ1X3NRY3bzidnSHO-DABG4v56sMRK94keJoWSjiBBA_TsYY4lnc0dyceKLeoxoUweJNNO11p1HfqPooGIvQyo0gBmMID7V46CeMWTwJmWMn8KfB4bQKRyViHO4nrsctTyaWywToLBa27YFZJu4hqqerVB4hHCjmUCqIl1BO_CRm4P9ETIiIpS8CNz5GDbVNs3XJlDGrdujkb_El2ulPR8PZcDC-PUW7Sm0lHvoM1fOskOfg7nN2obX8CUcXq28
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+Fourth+International+Conference+on+Advances+in+Electrical%2C+Electronics%2C+Information%2C+Communication+and+Bio-Informatics+%28AEEICB%29&rft.atitle=Implementing+Elliptic+Curve+Cryptography+with+ACO+Based+Algorithm+in+Clustered+WSN+for+Border+Surveillance&rft.au=Malathy%2C+S.&rft.au=Geetha%2C+J.&rft.au=Suresh%2C+A.&rft.au=Priya%2C+S.&rft.date=2018-02-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FAEEICB.2018.8480856&rft.externalDocID=8480856