Certain Investigation on Secured Data Transmission in Wireless Sensor Networks

Certain Investigation on Secured Data Transmission in Wireless Sensor Networks

P. Padmaja, G.V. Marutheswar
ISBN13: 9781799824541|ISBN10: 1799824543|EISBN13: 9781799824558
DOI: 10.4018/978-1-7998-2454-1.ch066
Cite Chapter Cite Chapter

MLA

Padmaja, P., and G.V. Marutheswar. "Certain Investigation on Secured Data Transmission in Wireless Sensor Networks." Sensor Technology: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2020, pp. 1372-1385. https://doi.org/10.4018/978-1-7998-2454-1.ch066

APA

Padmaja, P. & Marutheswar, G. (2020). Certain Investigation on Secured Data Transmission in Wireless Sensor Networks. In I. Management Association (Ed.), Sensor Technology: Concepts, Methodologies, Tools, and Applications (pp. 1372-1385). IGI Global. https://doi.org/10.4018/978-1-7998-2454-1.ch066

Chicago

Padmaja, P., and G.V. Marutheswar. "Certain Investigation on Secured Data Transmission in Wireless Sensor Networks." In Sensor Technology: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1372-1385. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2454-1.ch066

Export Reference

Mendeley
Favorite

Abstract

Wireless Sensor Network (WSN) need to be more secure while transmitting data as well as should be deployed properly to reduce redundancy and energy consumption. WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this paper, a survey of security issues in WSNs is presented and a new algorithm TESDA is proposed, which is an optimized energy efficient secured data aggregation technic. The cluster head is rotated based on residual energy after each round of aggregation so that network lifetime increases. Based on deviation factor calculated, the trust weight is assigned, if more deviation, then the trust value is less. Simulation results observed by using NS-2. From network animator and x-graphs the result are analyzed. Among all protocols tesda is an energy efficient secured data aggregation method.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.