Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 11
Page No. 1746 - 1757

Fuzzy Logic Based CH Selection for Secured Data Communication with PVR Encryption Using VK-Constructs

Authors : A. Vijayalakshmi and P. Vanaja Ranjan

References

Abbasi, A.A. and M. Younis, 2007. A survey on clustering algorithms for wireless sensor networks. Comput. Commun., 30: 2826-2841.
CrossRef  |  Direct Link  |  

Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002. A Survey on Sensor Networks. Commun. Mag. IEEE., 40: 102-114.
CrossRef  |  Direct Link  |  

Alwan, H. and A. Agarwal, 2013. A multipath routing approach for secure and reliable data delivery in wireless sensor networks. Int. J. Distrib. Sens. Networks, 13: 1-1.
Direct Link  |  

Bhoopathy, V. and R.M.S. Parvathi, 2012. Secure authentication technique for data aggregation in wireless sensor networks. J. Comput. Sci., 8: 232-238.
Direct Link  |  

Chinara, S. and S.K. Rath, 2009. A survey on one-hop clustering algorithms in mobile ad hoc networks. J. Network Syst. Manage., 17: 183-207.
CrossRef  |  Direct Link  |  

Estrin, D., R. Govindan, J. Heidemann and S. Kumar, 1999. Next century challenges: Scalable coordination in sensor networks. Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, August 15-19, 1999, Seattle, Washington, USA., pp: 263-270.

Heinzelman, W.B., A.P. Chandrakasan and H. Balakrishnan, 2002. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Commun., 1: 660-670.
CrossRef  |  Direct Link  |  

Jankowski, K. and P. Laurent, 2011. Packed AES-GCM algorithm suitable for AES/PCLMULQDQ instructions. Comput. IEEE. Trans., 60: 135-138.
CrossRef  |  Direct Link  |  

Lee, C. and T. Jeong, 2011. FRCA: A fuzzy relevance-based cluster head selection algorithm for wireless mobile Ad-Hoc sensor networks. Sensors, 11: 5383-5401.
CrossRef  |  PubMed  |  Direct Link  |  

Lee, J.S. and W.L. Cheng, 2012. Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication. IEEE Sens. J., 12: 2891-2897.

Liu, A., Z. Zheng, C. Zhang, Z. Chen and X. Shen, 2012. Secure and energy-efficient disjoint multipath routing for WSNs. Veh. Technol. IEEE. Trans., 61: 3255-3265.
CrossRef  |  Direct Link  |  

Lou, W. and Y. Kwon, 2006. H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transact. Vehicular Technol., 55: 1320-1330.
CrossRef  |  

Malik, A.S., J. Kuang, J. Liu and C. Wang, 2009. Performance analysis of cluster-based wireless sensor networks with application constraints. Int. J. Comput. Network Inf. Secur., 1: 16-23.
Direct Link  |  

Momani, I.M.A. and M.K. Saadeh, 2011. FEAR: Fuzzy-based energy aware routing protocol for wireless sensor networks. Int. J. Commun. Network Syst. Sci., 4: 403-415.
CrossRef  |  Direct Link  |  

Oggier, F. and M.J. Mihaljevic, 2014. An information-theoretic security evaluation of a class of randomized encryption schemes. Inf. Forensics Secur. IEEE. Trans., 9: 158-168.
CrossRef  |  Direct Link  |  

Ohta, T., S. Inoue and Y. Kakuda, 2003. An adaptive multihop clustering scheme for highly mobile Ad hoc networks. Proceedings of the 6th International Symposium on Autonomous Decentralized Systems, April 9-11, 2003, IEEE Computer Society, Washington, DC, USA., pp: 293-300.

Pan, J.S., Li, S. and Z. Xu, 2012. Security mechanism for a wireless-sensor-networkbased healthcare monitoring system. Commun. IET., 6: 3274-3280.
CrossRef  |  Direct Link  |  

Pietro, R.D., L.V. Mancini, Y.W. Law, S. Etall and P. Havinga, 2003. LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. Proceedings of the International Conference on Parallel Processing Workshops 2003, October 6-9, 2003, IEEE, New York, USA., ISBN: 0-7695-2018-9, pp: 397-406.

Roy, S., M. Conti, S. Setia and S. Jajodia, 2012. Secure data aggregation in wireless sensor networks. Inf. Forensics Secur. IEEE. Trans., 7: 1040-1052.
CrossRef  |  Direct Link  |  

Souza, R.J.D. and G. Varaprasad, 2012. Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. Sens. J. IEEE., 12: 2941-2949.
CrossRef  |  Direct Link  |  

Tawalbeh, L., M. Mowafi and W. Aljoby, 2013. Use of elliptic curve cryptography for multimedia encryption. Inf. Secur. IET., 7: 67-74.
CrossRef  |  Direct Link  |  

Vijayalakshmi, A. and P.V. Ranjan, 2013. Code strategy algorithm for online power quality monitoring of electrical equipment using wsn under tiny-os environment. J. Theor. Appl. Inf. Technol., 57: 465-473.
Direct Link  |  

Wang, H., L. Xing and H.E. Michel, 2010. Reed solomon code based green & survivable communications using selective encryption. Int. J. Performability Eng., 6: 297-299.
Direct Link  |  

Zytoune, O., Y. Fakhri and D. Aboutajdine, 2009. A balanced cost cluster-heads selection algorithm for wireless sensor networks. Int. J. Comput. Sci., 4: 21-24.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved