Abstract:Wireless sensor networks are a current highly developed technology of networks and are employed in many application areas like in military for surveillance purpose. WSN gather data from sensor node and send it to another sensor node. Due to the distributed nature, restricted computing power, memory space and use in some sensitive application, security is a major problem, so security is very important to transfer the data from one node to another node. To provide security in this LiSP protocol is used. This paper include how much energy is consumed for secure communication between sensor nodes and base station. In this paper, encryption and decryption operation use the block cipher rather than stream cipher and key is used to create security protocol. Encryption algorithm contains two inputs, one is the user input another is the key. To produce lightweight security protocol dynamic key is used. In this paper dynamic key is generated by using different types of random number generator like RC4, Blum Blum shub and wichman random number generator. After that find out how much time and energy is consumed by this protocol. This paper contains protocol which provide secure and efficient data transmission withminimum energy and time consumption so it makes it harder and difficult to break the security of data.
Wireless sensor networks continuous to grow and a rosining technology in networks. WSN used in many critical situations and applications. One of major application of the sensor network is use in military. Due to these reason securities is a major challenge for WSN. Wireless sensor networks have many topics to do the research but security plays an important role in data and network security. In the present work, author use the block cipher rather than stream cipher, and key to perform encryption and decryption operation to create lightweight security protocol. Encryption algorithm takes two inputs, one is the text enter by the user another one is the dynamic key. Dynamic key has one most important advantage is that for each pair of the encryption and decryption new key is generated and previous one is discarded. In this paper dynamic key is generated by using park-miller random number generator. In the present work the key of 196 bits is used. This key is mainly used to convert the text entered by the user into the unreadable form.
Business and classified activity of UAV is changing various bionetwork. To perceive risky issue and investigate research zones, our precise content assessment suggests the critical issue like protection, reception and sanctuary are progressively supplanted by operational contemplations incorporating connection by and blow on other airspace clients. Ongoing episodes show that unlimited robot use can incur issues on other airspace clients like air terminals and crisis administrations. Our audit of current administrative methodologies shows a requirement for additional approach and oversight answer to both run quick and efficient ova utilization development, and work with advancement (for example intraurban bundle conveyance), with execution of the planned engineering is approved utilizing three boundaries, to be specific throughput, parcel conveyance proportion (PDR in various UAVs. The outcomes are contrasted and existing conventions show the adequacy of the work regarding throughput rate.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.