SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs

Faculty Science Year: 2022
Type of Publication: ZU Hosted Pages:
Authors:
Journal: Journal of Network and Computer Applications ScienceDirect® Volume:
Keywords : SEEDGT: Secure , energy efficient data gathering    
Abstract:
Internet of Things based Wireless Sensor Networks (IoT-WSNs) are widely employed in a variety of applications, including military, health-care, and industrial monitoring. Security parameters are essential to protect the network from various security threats and attacks because these applications handle sensitive information in potentially hostile and unattended environments. This paper aims to achieve the security parameters for IoT applications based WSNs by proposing a secure and energy aware data gathering technique, called SEEDGT, which integrates between trust, public key algorithm, and Compressive Sensing (CS) methods towards achieving security with fair energy load balance in IoT-WSN. The proposed SEEDGT technique has three phases, namely Cluster formation, network operation and reconfiguration phase. During the cluster formation phase, energy-aware and trust-based methods are applied for the creation of clusters and cluster head selection. The network operation phase aims to achieve security by using the public key algorithm to encrypt network data during the data gathering process. Moreover, in this phase, CS strategy is employed to reduce the original data size, which leads to a reduction in energy usage. Finally, the changes that could occur during network operations is considered through the reconfiguration phase. The simulation studies illustrate that SEEDGT is effective in achieving better performance than other baseline approaches.
   
     
 
       

Author Related Publications

  • Ahmed AbdElFattah Ahmed Salim, "Efficient Compressive Sensing based Technique for Routing in Wireless Sensor Networks", INFOCOMP, 2013 More
  • Ahmed AbdElFattah Ahmed Salim, "Sparse Signals Reconstruction Via Adaptive Iterative Greedy Algorithm", International Journal of Science and Research (IJSR), 2014 More
  • Ahmed AbdElFattah Ahmed Salim, "IBLEACH: intrabalanced LEACH protocol for wireless sensor networks", Springer, 2014 More
  • Ahmed AbdElFattah Ahmed Salim, "Distributed multi chain compressive sensing based routing algorithm for wireless sensor networks", Springer, 2014 More
  • Ahmed AbdElFattah Ahmed Salim, "Clustering Algorithm Based on the Direction of Overlapping Field of Views for Wireless Multimedia Sensor Networks", American Scientific Publishers, 2016 More

Department Related Publications

  • Iman Hassan Mohammed Sheikh, "Scanning Electron Microscopic Studies of Gill Arches and Rakers in Relation to Feeding Habits of Some Fresh Water Fishes", Elsevier, 2013 More
  • Iman Hassan Mohammed Sheikh, "Light and scanning electron microscopical studies of the tongue in the hooded crow (Aves: Corvus corone cornix)", Elsevier, 2014 More
  • Iman Hassan Mohammed Sheikh, "Ultramorphological and histological studies on the tongue of the common kingfisher in relation to its feeding", Elsevier, 2014 More
Tweet