CFP last date
20 June 2024
Reseach Article

Adaptive Data Size Compressed Algorithm to Reduce Energy and Provide Route Security using AOMDV Protocol in WSN

by Ajay Kumar, Rohit Vaid, Sandhya Katiyar, Shumaila Rizwan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 2
Year of Publication: 2016
Authors: Ajay Kumar, Rohit Vaid, Sandhya Katiyar, Shumaila Rizwan
10.5120/ijca2016911003

Ajay Kumar, Rohit Vaid, Sandhya Katiyar, Shumaila Rizwan . Adaptive Data Size Compressed Algorithm to Reduce Energy and Provide Route Security using AOMDV Protocol in WSN. International Journal of Computer Applications. 147, 2 ( Aug 2016), 32-38. DOI=10.5120/ijca2016911003

@article{ 10.5120/ijca2016911003,
author = { Ajay Kumar, Rohit Vaid, Sandhya Katiyar, Shumaila Rizwan },
title = { Adaptive Data Size Compressed Algorithm to Reduce Energy and Provide Route Security using AOMDV Protocol in WSN },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 2 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 32-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number2/25627-2016911003/ },
doi = { 10.5120/ijca2016911003 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:50.668691+05:30
%A Ajay Kumar
%A Rohit Vaid
%A Sandhya Katiyar
%A Shumaila Rizwan
%T Adaptive Data Size Compressed Algorithm to Reduce Energy and Provide Route Security using AOMDV Protocol in WSN
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 2
%P 32-38
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this research paper an algorithm is generated named Adaptive Data Size Compressed Algorithm (ADSCA) in wireless sensor network. This algorithm depends on the binary numbers and the hash function. Binary numbers are using for compress data length or data size with the help of ASCII code and hash function is also used to compress the data size without losing information. After that the electromagnetic waves are used for data transmission from one node to another node. Then it is analyzed that how much minimum energy should be used in data transmission from source to destination through the electromagnetic waves. For the security purpose two techniques are applying, one is RSA algorithm and other is Diffie-Hellman algorithm. The latest routing protocol for sending the information is AOMDV, which is an extension version of AODV protocol. With the help of this routing protocol and security techniques, a secure route and minimum numbers of hop counts are find out from source to destination for sending the information data. At last MATLAB represents the data transmission from source to destination is dynamically showing in GUI (Graphical User Interface). This GUI is created a wireless sensor network, where some sensor nodes are deployed.

References
  1. et al. L.Sujihelen, C.JayaKumar, "Authentication in wireless sensor network based on Virtual Certificate Authority", International Conference on circuits, power and computing technologies, 2013 IEEE.
  2. et al. Chugh and Singh, A Real-Time MATLAB based GUI for node placement and a shortest- path alternate route path algorithm in Wireless Sensor Networks , “International Journal for Science and Emerging Technologies with Latest Trends”(2013)ISSN No. (Print): 2277-8136.
  3. “Power Efficient Adaptive Compression Technique for Wireless Sensor Networks”, et al. S. Selvarani,S. Selvaraju, P. Yasodha Devi, S. Kalaivani, M. Vasanth, M.Kannan, IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 3, Issue 4 (Nov. – Dec. 2013).
  4. et al. Mahesh K. Marina and Samir R. Das, “Ad hoc on-demand multipath distance vector routing”, wireless communications and mobile computing2006; 6:969–988.
  5. et al. P.Samundiswary and P.Dananjayan, “Performance Analysis of Trust Based AODV for Wireless Sensor Networks”, International Journal of Computer Applications (0975 – 8887) Volume 4– No.12, August 2010.
  6. et al. Vishnupriya E, Prof. T. Jayasankar, “Performance Analysis Of Optimum Routing Protocols In Wireless Sensor Networks”, IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 2 Issue 2, February 2015, ISSN 2348 – 7968.
  7. “Data Aggregation Using RSA Key Management Technique in Wireless Sensor Networks “, C. Krishnan, Mrs. G.Malathy, IJIRSET, Volume 3, and Special Issue 1, February 2014, ISSN (Print) : 2347 – 6710.
  8. et al. Abdullah Said Alkalbani, Teddy Mantoro, Abu Osman Md Tap, “Comparison between RSA Hardware and Software Implementation for WSNs Security Schemes”, Proceeding 3rd International Conference on ICT4M 2010.
  9. Park VD, Corson MS. A highly adaptive distributed routing algorithm for mobile wireless networks. In Proceedings of IEEE Info.com, 1997.
  10. Raju J, Garcia-Luna-Aceves JJ. A new approach to on-demand loop-free multipath routing. In Proceedings of Int’l Conference on Computers Communication and Networks (IC3N), 1999.
Index Terms

Computer Science
Information Sciences

Keywords

ADSCA RSA WSN AOMDV protocol Diffie-Hellman algorithm Hashing Binary code ASCII code Security MATLAB.