Wireless multimedia sensor networks (WMSNs), with its exceptional properties, have found a sturdy and steady spot in automation and surveillance applications. The WMSN had made a massive drift of concentration from the wireless sensor networks with its capability of retrieving multimedia files through multimedia devices. The huge capacity data transfer through the multimedia sensors drain the power capacity of the sensors and is considered to be the vital challenge of the WMSNs. The challenges associated with the WMSNs are the restrictions in resources, connectivity, and security and maintaining a good level of quality of service (QoS). This paper proposes a novel protocol, optimized compressed sensing routing protocol (OCSRP), that performs the routing of multimedia data in a highly efficient manner through which the aforementioned research challenges like resource restrictions and QoS can be addressed. In addition, the security methods were incorporated in routing mechanism, and the results were compared with the existing LEACH algorithm. The quantitative analysis proves that the proposed model possesses high level of QoS with high level of security than the existing security algorithms.
A wireless sensor network technology is immensely utilizing in multiple fields, for example; physical environment monitoring, surveillance systems, object tracking systems, robotic systems and many more. Usually, wireless sensor nodes are deployed in remote or hostile environments, and such sensors are vulnerable to compromise different attacks; therefore, a suitable and efficient key management scheme is essential at this point. Recently, different key management approaches are proposed by different researchers to address security challenges, especially for WSNs. Since key management is a core scheme to ensure security for network resources along with solving the problem of key generation, distribution, and secret key management. Hence, in this investigational study have to provide a detailed study on reliable key management techniques which are playing a vital role in large-scale WSNs. This study classifying the key management scheme into Asymmetric based and Symmetric based key management schemes and highlighting their functionalities by evaluating performance parameters. In the beginning, the study defines a workflow of the key management system followed by life cycle. Additionally, have briefly discussing popular key-management algorithmic approaches their applications and limitations. 2The remaining part of the study is structured as; section-II discusses workflow of key management scheme with architecture followed by key management lifecycle. Section-III illustrates about recent research towards different key management schemes. Additionally, different security key management algorithmic approaches are discussing in section-IV. The section-V highlights the open research challenges found from the prior studies as well as conclusion of the study. ABOUT KEY MANAGEMENT SCHEMEA proper key management scheme deals with the key generation, sharing, storage, usage and replacement of cryptographic key in a security system. In every cryptographic system, a proper key management scheme contains effective cryptography for security. Therefore, in this section have to discuss the detail flow process of key management scheme with architecture is shown in the figure-1. Also knows about how data encryption will perform over the network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.