An Efficient Technique for Enhancing Robustness of Scale-free Wireless Sensor Networks
A. Mary Shiny1, A. Chandra Shaker2
1A. Mary Shiny, M. Tech Degree in Wireless Mobile Communications from G. Narayanamma Institute of Technology and Science, Hyderabad, India.
2A. Chandra Shaker, Assistant Professor at Department of Electronics and Telematics Engineering, G. Narayanamma Institute of Technology and Science, Hyderabad, India.
Manuscript received on 05 March 2019 | Revised Manuscript received on 11 March 2019 | Manuscript published on 30 July 2019 | PP: 2074-2078 | Volume-8 Issue-2, July 2019 | Retrieval Number: B2294078219/19©BEIESP | DOI: 10.35940/ijrte.B2294.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In an age where breaches occurrence is precisely numerous, it is essential to safeguard confidential figures including patron records, intellectual property, assessment and enlargement, prospect business plans, and all sorts of confidential facts more proficiently. It is substantial to administer a network to safeguard information. Cyber mugs tear into information systems, accertion in these attacks leads to node deterioration, hence a structure is obligatory which can combat cyber mugs to shield our information nodes in WSNs. To cope with these attacks we adopt an efficient technique for enhancing robustness of scale-free wireless sensor networks. Scale-free networks are not affected much by random thefts but they become defenseless against malicious theft. To overcome this shortcoming this paper presents an enhanced technique , here we have a MAX node which is enclosed with small rate nodes, each MAX node will be highly secured by adopting ROSE algorithm by altering edges keen on to a closed structure to upgrade robustness of a network . This phenomena is achieved by forming a scale-free topology using basic BA model. In this paper, work is done on two operations that is rate diversity and edge value operations, to mold system further vigorous to malicious attacks. System is further encrypted by providing every single node with a private key in a sub network.
Index Terms: Authentication, Robustness, Scale-Free Network Topology, Wireless Sensor Networks.
Scope of the Article: Wireless Communications