A Review Paper on Energy Capable Routing in Wireless Sensor Network (original) (raw)
Related papers
Secure Energy Optimized Routing Algorithm in WSN-A Survey
2015
Abstract: A wireless sensor network which plays a crucial role in wireless communication. The intensification of wireless sensor network increases day by day, which is used in every field like military, government, etc. the battery is one of the main sources of the energy for the sensor nodes. The difficulty arises in Wireless Sensor Network (WSN) when the distance among the nodes increases and obviously as distance increases numerous hops will necessitate for data forwarding from source to destination or at a particular location. The compactness will help for maximizing to forward information among nodes, which having long distance. In this paper, we present up to date secure energy optimized routing techniques for Wireless Sensor Networks is surveyed collectively with the details of the functioning or performance consequences of each approach. We summarize the challenges of secure energy routing protocols for WSNs of present methods intended for data transmission. These approaches...
Energy Efficient and Secure Routing Scheme in Wireless Sensor Network
Nodes in many wireless sensor networks (WSNs) are powered by batteries with limited energy. Enhancing network lifetime and saving energy are two basic issues for WSNs. Some energy-saving routing algorithms can reduce total energy consumption of a WSN, however, they place too heavy burden of forwarding data packets on several key nodes so that these nodes quickly drain out available battery energy, making network lifetime shortened. These papers propose technique known as Secure Energy Efficient Routing Protocol for WSNs. Here in proposed system user first generate the network and form the clusters. After that cluster head and DCH is selected in each cluster. The work of DCH is the send location to the base station. The cluster members encrypt the data using encryption algorithm and send to the CH with hash of encrypt data. CH verifies data of each member. If any CH is faulty or not able to forward all members data then BS allocate the DCH as a CH and then CM send data to that CH and this CH forward the data to BS. The proposed protocol route the data securely by consuming less energy and enhance the network lifetime.
IJERT-A Review on Secured and Energy-Efficient Routing Protocols in Wireless Sensor Networks (WSNs
International Journal of Engineering Research and Technology (IJERT), 2021
https://www.ijert.org/a-review-on-secured-and-energy-efficient-routing-protocols-in-wireless-sensor-networks-wsns https://www.ijert.org/research/a-review-on-secured-and-energy-efficient-routing-protocols-in-wireless-sensor-networks-wsns-IJERTV10IS030070.pdf In wireless sensor networks (WSNs), the energy supply of sensor devices is limited. One of the basic architecture problems in WSNs is sensor dies due to dissipating battery capacity. As a result, it is argued that energy conservation is the most significant criterion for any protocol built for WSNs. Thousands of lightweight, inexpensive sensors can be randomly distributed in open and harsh environments to gather data in Wireless Sensor Networks (WSNs). The low battery life of battery-operated sensors, as well as hostile conditions, require the development of energy-efficient, secure and reliable sensor network protocols. Routing, out of the broad range of network protocols, is the most critical in terms of energy consumption, as data transmission absorbs 70% of total energy in WSNs. As a result, energy-efficient routing systems must be built in order to save energy and increase the network's lifespan. However, resource-limited sensors, the lack of a global solution scheme and the application-specific nature of WSNs pose a challenge to routing. Furthermore, security is yet another critical problem in WSNs, as sensors are typically installed in insecure areas and susceptible to security attacks. Many of the current routing protocols have various security measures in place to meet security objectives. We present a brief review on various secure and energy-efficient routing protocols in wireless sensor networks, outlining their underlying principle and operations.
Study of Secure and Energy Efficient Hierarchical Routing Protocols in WSN
In the advent of wireless networking, wireless sensor network (WSN) has been a constant target of research due to its potential data aggregation techniques in hostile and unsecured environment. Currently, wireless sensor network is still more under research and development and less on commercial deployment when it comes to security and energy efficiency. The past research work has witness massive volumes of algorithms using various sophisticated technologies in order to mitigate the issues of energy problems in sensor motes, however, till date none of the prior studies has yet been standardized and hence the issues of unwanted power depletion still persist because of numerous unsolved factors. This manuscript will review some of the most standard secure and energy efficient routing protocols and extracts research gap from the study.
Secure and power saving routing protocol for wireless sensor networks
2010
Wireless Sensor Network (WSN) consists of distributed sensors that are used to sense different parameters in the environment. It is currently used in many military and civilian applications and it becomes an active research area nowadays. These sensors are very limited in resources such as energy, memory and available bandwidth. One of the major challenges in such networks is how to provide connection between sensors and the sink node (base station) and how to exchange the data while maintaining the security requirements and taking into consideration their limited resources. In this paper a secure, power saving routing protocol is proposed to help managing the resources in WSN networks, the proposed protocol is a hybrid of two major categories of protocols in WSNs, namely tree-based and cluster-based protocols. The proposed protocol is combined with a Fuzzy Logic inference system to aid in the selection of the best route based on a combination of two factors: the path length and the available power. Illustrative examples are given about the usage of the new protocol.
Secure and Economical Cost Aware Routing Protocol in Wireless Sensor Networks
Global journal of computer science and technology, 2017
The main objective of the paper is to supply security and to expand the network lifetime. The energy management domain is selected to reinforce the security system in wireless sensor networks. A typical wireless sensor network consists of many trivial and low-power sensors that sense radio frequencies to perform disseminate sensing tasks. These nodes typically have really restri \cted and non-replenish prepared energy resources, that produces energy and an important vogue issue for these networks. Routing is another really troublesome vogue issue for WSNs. Properly designed routing protocol not absolutely guarantees high message delivery relation and low energy consumption for message delivery, but in addition it should balance the full sensor network energy consumption, and thereby extend the sensor network fundamental measure. Throughout this paper, the tendency to confer Secure and Economical value Aware Secure Routing protocol for WSNs to balance the energy consumption and enhan...
Survey on Energy-Efficient Secure Routing In Wireless Sensor Networks
2013
The key challenge in sensor networks is to maximize the lifetime of sensor nodes due to the fact that it is not feasible to replace the batteries of thousands of sensor nodes. Therefore, computational operations of nodes and communication protocols must be made as energy efficient as possible. Among these protocols data transmission protocols have much more importance in terms of energy, since the energy required for data transmission takes 70 % of the total energy consumption of a wireless sensor network Area coverage and data aggregation techniques can greatly help conserve the scarce energy resources by eliminating data redundancy and minimizing the number of data transmissions. Therefore, data aggregation methods in sensor networks are extensively investigated in the literature [4], [5], [6] and [7]. Security in data communication is another important issue to be considered while designing wireless sensor networks, as wireless sensor networks may be deployed in hostile areas suc...
Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation
2010
This paper presents a routing protocol architecture based on recursive group algorithm. This algorithm apply Group Verification Tree approach which makes the sensor network secure and make it safer from malicious intrusions and illegitimate users. The proposed approach will give a new dimension to the fast and secure routing in the sensor networks with less energy to be consumed. Based on the analysis and simulation the proposed strategies yield better results than the existing results.
A power-efficient secure routing protocol for wireless sensor networks
WSEAS Transactions on Computers, 2010
Wireless Sensor Network (WSN) is a hot research area due to its use in many military and civilian applications. WSN consists of distributed small, low power and limited capabilities sensors that are scattered in the network field to sense different parameters in the environment. The sensed data will be sent to a more powerful node called sink node (Base Station). The sink node is usually connected to a power supply and is used to process the data and to connect the sensor network to other networks like the Internet. One of the major challenges in such networks is how to provide connection between the sensors and the sink node and how to exchange the data while maintaining the security requirements and taking into consideration their limited resources in terms of energy, memory and available bandwidth. In this paper a power-efficient, secure routing protocol is proposed to help managing the resources in WSN networks. The proposed protocol is a hybrid of two major categories of protocols in WSNs, namely tree-based and cluster-based protocols. The proposed protocol is combined with a Fuzzy Logic inference system to aid in the selection of the best route based on a combination of three factors: the path length, the available power and the node reputation resulted from the Intrusion Detection System (IDS). The proposed protocol uses three Fuzzy Inference Systems (FIS) that are implemented in two tiers. Tier one will choose the best route in terms of shortest length and high power. Tier two provides a security assessment for the selected route.
INTER RELATIONSHIP BETWEEN ENERGY EFFICIENT ROUTING AND SECURE COMMUNICATION IN WSN pdf
In Wireless Sensor Networks (WSNs), the nodes are deployed and left unattended to monitor an application. These nodes need to operate with minimal human intervention. Furthermore, it is infeasible to replace their batteries especially when they are deployed in a hostile environment. Therefore, special considerations need to be in place in order to efficiently utilize the limited battery power of the nodes. In these networks, most of the energy is consumed in data transmission as compared to data processing. Therefore, energy-efficient routing protocols need to be carefully designed to maximize the lifetime of these networks. Furthermore, the hostile deployed environment poses further threats to these networks. As a result, the designed routing protocols need not only be energy-efficient but secure as well. In this survey, we make a brief analysis of various energy-efficient and secured routing techniques against Sybil attack to determine their efficiency and suitability for various applications in a real-time deployed environment. Furthermore, we correlate energy-efficiency and security in WSNs.