Trust and Cryptography Centered Privileged Routing Providing Reliability for WSN Considering Dos Attack Designed for AMI of Smart Grid
Priyanka D. Halle1, Shiyamala S.2

1Priyanka D. Halle*, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Avadi, Chennai, Tamil Nadu, India.
2Dr.Shiyamala S., Vel Tech Rangarajan, Dr. Sagunthala R&D Institute of Science and Technology, Avadi, Chennai, Tamil Nadu, India
Manuscript received on December 13, 2019. | Revised Manuscript received on December 22, 2019. | Manuscript published on January 10, 2020. | PP: 1794-1800 | Volume-9 Issue-3, January 2020. | Retrieval Number: B7449129219/2020©BEIESP | DOI: 10.35940/ijitee.B7449.019320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Sheltered communication is a precise significant concern in any kind of network. This research focuses on secure and reliable wireless message arrangement. Through relating trust based and cryptography based approach we can progress wireless communication security and reliability effectually of Advanced Metering Infrastructure. Wireless Sensor Network used as a communiqué arrangement for AMI.Nodes(Sensors) are employed intended for a Home Area Network around 10-60.The performance of security and reliability calculated through energy depletion, delay, packet transfer ratio or packet delivery ratio (PDR),throughput and overhead of the sensor nodes. Diverse categories of attacks arises on wireless communication infrastructure. This research deliberated Denial of Service (DoS) type attack. Through linking Elliptic Curve Cryptography (ECC) for secure routing and authenticated anonymous secure routing (AASR) for reliable route routing tries to improve reliability and security of wireless communication infrastructure of AMI using NS2(Network Simulator2) simulation platform. Operative routing delivers radical change in enactment of wireless communication infrastructure. Proposed AASR protocol and ECC protocol admirably delivers virtuous results compared to surviving protocols. 
Keywords: AASR, ECC, WSN, DoS Attack, Routing.
Scope of the Article: Cryptography and Applied Mathematics