Aggregated PSO for Secure Data Transmission in WSN Using Fog Server
نویسندگان
چکیده
Privacy of data in Internet Things (IoT) over fog networks is the biggest challenge security Wireless communication networks. In Sensor Network (WSN), current research on computing with IoT gaining popularity among devices network. Moreover, aggregation will reduce energy consumption WSN. Due to open and hostile nature WSN, secure major issue. The existing methods its associated approaches are lack limited functions, heavyweight, issues related performance overhead. Besides, overload node result high latency, scalability, storage, degraded reliability order overcome these issues, this proposed work has used two schemes for transmission network transmission. secret transferred between Fog server transmitted through aggregator node. If placed far away from node, it may send neighbor aggregator. And append message receiving method. addition that, can extract extractor cost energy, Clustered Particle Swarm Optimization (CPSO) method form clusters. This avoid unnecessary during ensures secured so that base station know origin sender validity received message. Therefore, computation authorization requires1MC+1H requires (n+2) MC+1H which lesser than methods.
منابع مشابه
Secure Aggregated Routing Protocol in WSN - A Review
Wireless sensor Networks (WSN) require secure aggregated routing of sensor data transmitted from source node to the sink node for most of its applications. Several existing routing protocols are explained in this paper with aggregation for WSN's are explored. The main objective of this paper provides the importance of secure aggregated routing algorithms for WSN to collect process and aggr...
متن کاملTwo New Secure and Efficient Data Transmission Protocols SET-IBS and SET- IBOOS for WSN
Recent advances have given rise to popularity and successes of wireless sensor networks. Secure transmission of data is found to be very critical in WSNs (Wireless Sensor Networks). The technique of clustering is found to be very efficient and practical in WSNs. This technique is useful to increase the performance of the system in WSNs. This technique is very useful for Cluster Based Wireless S...
متن کاملCollusion attack scenario against for Secure Data Aggregation in WSN
Data aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is known to be highly vulnerable to node compromising attacks in WSN are usually unattended and without tamper resistant hardware, they are highly susceptible to such attacks. Thus, ascertaining trustworthiness of data and reputat...
متن کاملTraffic data transmission using Wireless Sensor Networks (WSN) principles
Wireless Sensor Networks (WSN) has recently experienced a significant development. New techniques and communication protocols emerged as well as physical implementations of network node mainly based on mixed signal microcontrollers and processors (MSP – Mixed Signal Processors).Control applications over wireless sensor networks require timely, reliable, and energy efficient communications. This...
متن کاملCoverage Optimization Techniques in WSN using PSO: A Survey
Focus of this study is the sensor coverage problem which is a crucial issue, where a high coverage rate will ensure a high quality of service (QoS) of the Wireless Sensor Network (WSN). The coverage strategies are categorized into three groups based on the approaches used, namely; force based, grid based or computational geometry based. PSO is a popular multidimensional optimization technique. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Intelligent Automation and Soft Computing
سال: 2022
ISSN: ['2326-005X', '1079-8587']
DOI: https://doi.org/10.32604/iasc.2022.025665