Secure Hash Authentication and Cryptography Based Geographical Routing (SHAC-GR) For Wireless Sensor Networks
Manjunath D R1, Thimmaraju S N2 

1Manjunath D R, Research Scholar, Visvesvaraya Technological University, Belagavi.
2Dr. Thimmaraju S N, Professor, Dept. of Master of Computer Applications, Visvesvaraya Technological University, Centre for Post Graduate Studies, Mysore.
Manuscript received on 19 March 2019 | Revised Manuscript received on 25 March 2019 | Manuscript published on 30 July 2019 | PP: 2238-2247 | Volume-8 Issue-2, July 2019 | Retrieval Number: B2442078219/19©BEIESP | DOI: 10.35940/ijrte.B2442.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The expeditious growth in manufacturing anvils industries has lead towards the development of tiny devices. This growth has motivated to develop small and battery-operated sensor nodes that are widely adopted for establishing the reliable wireless communication. The wireless sensor based communication is generally divided into hierarchal and geographical deployment. Hierarchical system based approaches are widely studied in this field, limited work is present in the field of geographical WSN. In this work, we focus on the geographical WSN. Generally, these networks suffer from energy efficiency and security related issues. Hence, in this work we preset a combined approach to address these challenges. In order to mitigate the energy sparsity issue, we develop geographical routing scheme which selects the neighboring node based on residual energy of the node and distance from the sink node i.e. the maximum residual energy node from the neighboring node which is having less distance from the sink node is selected as next-hop. Due to this approach, the path computation and other network parameters computation is not required hence it reduces the power consumption. Further, we address the security issues where we present Hash modeling to secure the location, Key Exchange model for authentication by using ECDH approach , later we present ECIS based encapsulation method for data security and finally, a trust model based security system is developed. The trust computation of node helps to the routing whether to select the node for next hop or not. This multistage security approach is called as Secure Hash, Authentication and Cryptography based geographical routing (SHAC-GR) protocol. The proposed approach is simulated using MATLAB simulation tool and the performance of proposed approach is compared with existing technique that shows that the proposed approach improves the network performance in terms of network lifetime, energy and packet delivery rate.
Index Terms: Geographical Routing, Networks Security, WSN, Key Exchange, Energy Optimization.

Scope of the Article: Discrete Optimization