The wireless instrument complex is an ad – hoc network. It consists of small light weighted wireless nodes called device nodes. The systematic model that allows us to derive some correct results vis-à-vis energy consumption and difficulty. Also, some main contemplations about the application of the proposed technique in a real instrument network, i.e., by taking into account erasure channels, MAC- layer overhead, and actual computational properties of nodes. The effect of important parameters such as nodes’ concentration and program range through both extensive mockups and an methodical study of the trade-off between energy saving, convolution, and untrustworthiness of the proposed technique. A novel approach that splits the inventive messages into quite a lot of containers such that each node in the network will forward only small sub containers. The intense procedure is achieved applying the Packet Unbearable algorithm and the Chinese deposit proposition algorithm (CDP) which is characterized by a simple modular detachment between integers. The sink node, once all sub sachets is received correctly, will recombine them, thus reconstructing the original message. The excruciating process is especially helpful for those forwarding nodes that are more solicited than others due to their situation inside the network.
References
Akyildiz. I.F Su. W, Sankarasubramaniam .Y, and Cayirci. E (2012) “A survey on sensor networks” , IEEE vol. 40, no. 8, pp. 102– 114.
Campobello .G, Leonardi. A, and S. Palazzo, (2018), “On the use of Chinese Remainder Theorem for energy saving in wireless sensor networks,” IEEE May pp. 2723– 2727.
Campobello .G, A. Leonardi. A, and S. Palazzo, (2019), “A novel reliable and energy-saving forwarding technique for wireless sensor networks,” IEEE(May 18–21, pp. 269– 278.
Cohen. K, (2011) “ Energy-Efficient Detection in Wireless Sensor Networks UsingLikelihood Ratio and Channel State Information” IEEE vol. 43Pages:1671- 1683.
Ganesan. D, Govindan. R , Shenker. S, and Estrin. D, ,” (2018) “Highly resilient, energy efficient multipath routing in wireless sensor networks” IEEE vol. 5, no. 4, pp. 10–24.
[6] Hong. H. Wu. C. H, ( 2017) “RSA
Cryptosystem based on the Chinese Remainder Theorem.” IEEE vol. 5 pp. 391– 395.
Jeong. Y.S, (2017) “Visualization of efficiency coverage and energy consumption of Sensorsin wireless sensor networks using heat map” IEEE vol 40 Pages:1129-1137.Jin-Shan Lee. (2018) “Fuzzy-Logic-Based Clustering Approach for Wireless Sensor Networks Using Energy Predication” IEEE Vol. 8 Pages: 2891-2897.
Otal. B, (2019),“Highly reliable energy- saving mac for wireless body sensor networks in healthcare systems” IEEE vol.34 Pages:553-565
Shunfu Jin, Wuyi Yue . (2018) “Performance evaluation of multi-traffic on wireless sensor networks using a novel Diffserv mechanism” IEEE Vol. 4 Pages: 377- 381.
Swades De and Chunming Qiao (2018) “on throughput and load balancing of multipath routing in wireless networks” IEEE Vol. 3 page1551- 1556.
Zhiqiang Xiong, Zongkai Yang (2020) page (s): 1- 4, “A lightweight FEC algorithm for fault tolerant routing in wireless sensor networks” IEEE Vol 8 page (s): 1- 4,
Lein Harn, Manish Mehta and Wen-Jung Hsin, “Integrating Diffie– Hellman Key Exchange into the Digital Signature Algorithm (DSA)”, IEEE communications letters, vol. 8, no. 3, March 2004.
Raphael C.-W. Phan, Member, ”Fixing the Integrated Diffie-Hellman- DSA Key Exchange Protocol “, IEEE communications letters, vol. 9, no. 6, June 2005.
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee, “Strong Diffie- Hellman-DSA Key Exchange”, IEEE communications letters, vol. 11, no. 5, may 2007.
Nan Li, ”Research on Diffie-Hellman Key Exchange Protocol”, 2nd International Conference on Computer Engineering and Technology, Vol 5, 2010.
Barun Biswas, Krishnendu Basuli, ” A novel process for key exchange avoiding man-in-middle attack”, International Journal of Advancements in Research & Technology, Volume 1, Issue 4, September- 2012.
Barun Biswas, Krishnendu Basuli, Samar Sen Sarma, ”On a key exchange technique, avoiding Man in the-middle Attack”, Journal of Global Research in Computer Science Volume 3, September 2012.