RETRACTED ARTICLE: Trust aware localized routing and class based dynamic block chain encryption scheme for improved security in WSN

The modern wireless sensor network has great impact in the development of various domains of applications. The presence of malicious nodes introduces various threats and challenges to the network services. Different algorithms have been proposed towards the data security but not achieved the expecte...

Full description

Saved in:
Bibliographic Details
Published inJournal of ambient intelligence and humanized computing Vol. 12; no. 5; pp. 5287 - 5295
Main Authors Hema Kumar, M., Mohanraj, V., Suresh, Y., Senthilkumar, J., Nagalalli, G.
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 01.05.2021
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The modern wireless sensor network has great impact in the development of various domains of applications. The presence of malicious nodes introduces various threats and challenges to the network services. Different algorithms have been proposed towards the data security but not achieved the expected performance. Towards performance hike, a novel trust aware localized routing and class based dynamic encryption scheme has been presented. The method first discovers the route to reach the destination and transmit the data packet. But the localized nature of each hop in the route estimates the trust measure for each neighbor according to their prior involvement in data transmission and number of retransmission of the same packets with other neighbor, number of successful transmission. By identifying the values of those parameters, the value of trusted data forwarding support (TDFS) is measured. According to the TDFS value of several routes, a route with the specific neighbor only selected for route selection. On the other side, the method maintains and classifies the data being transmitting into number of classes. Further, the method uses different signature and encryption schemes for various classes. The data has been encrypted with class specific scheme and key before transmission. The method generates a block chain where each block contains the part of encrypted data and represented by a hash and pointer to the next block. The same has been reversed to produce original data from the encrypted key. The method introduces higher performance data security and improves the overall network performance.
Bibliography:retraction
ISSN:1868-5137
1868-5145
DOI:10.1007/s12652-020-02007-w