Energy-efficient and reliable data collection in wireless sensor networks
| dc.contributor.author | Puneeth, D. | |
| dc.contributor.author | Joshi, N. | |
| dc.contributor.author | Atrey, P.K. | |
| dc.contributor.author | Kulkarni, M. | |
| dc.date.accessioned | 2026-02-05T09:31:48Z | |
| dc.date.issued | 2018 | |
| dc.description.abstract | Ensuring energy efficiency, data reliability, and security is important in wireless sensor networks (WSNs). A combination of variants from the cryptographic secret sharing technique and the disjoint multipath routing scheme is an effective strategy to address these requirements. Although Shamir's secret sharing (SSS) provides the desired reliability and information-theoretic security, it is not energy efficient. Alternatively, Shamir's ramp secret sharing (SRSS) provides energy efficiency and data reliability, but is only computationally secure. We argue that both these approaches may suffer from a compromised node (CN) attack when a minimum number of nodes is compromised. Hence, we propose a new scheme that is energy efficient, provides data reliability, and is secure against CN attacks. The core idea of our scheme is to combine SRSS and a round-reduced AES cipher, which we call "split hop AES (SHAES)". Both the simulation results and the theoretical analysis are employed to validate the near-sink CN attack, and a secure reliable scheme using SHAES is proposed. © 2018 TÜBITAK. | |
| dc.identifier.citation | Turkish Journal of Electrical Engineering and Computer Sciences, 2018, 26, 1, pp. 138-149 | |
| dc.identifier.issn | 13000632 | |
| dc.identifier.uri | https://doi.org/10.3906/elk-1702-78 | |
| dc.identifier.uri | https://idr.nitk.ac.in/handle/123456789/25381 | |
| dc.publisher | Turkiye Klinikleri Journal of Medical Sciences Talapapa Bulvary no. 102 Hamammonu 1 06230 | |
| dc.subject | Cryptography | |
| dc.subject | Information theory | |
| dc.subject | Network security | |
| dc.subject | Reliability | |
| dc.subject | Semantics | |
| dc.subject | Sensor nodes | |
| dc.subject | Wireless sensor networks | |
| dc.subject | Compromised nodes | |
| dc.subject | Disjoint multipath routing | |
| dc.subject | Energy efficient | |
| dc.subject | Information- theoretic securities | |
| dc.subject | Reliable data collections | |
| dc.subject | Secret sharing | |
| dc.subject | Semantic security | |
| dc.subject | Wireless sensor network (WSNs) | |
| dc.subject | Energy efficiency | |
| dc.title | Energy-efficient and reliable data collection in wireless sensor networks |
