Energy Efficient Multi-Tier Sustainable Secure Routing Protocol for Mobile Wireless Sensor Networks (original) (raw)

SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks

Wireless Personal Communications, 2018

Energy consumption and the secure transmission are the increasing fields of research challenge in wireless sensor network (WSN) applications. Heterogeneous WSN is an efficient network strategy that has sensor nodes with different processing, memory power, and transmission capacity. In order to provide effective transmission for this type of network, clustering associated with secure routing is enabled to transfer the data packets safely to the endpoint. Data gathering and clustering help to group the network and control transmission overhead during data transmission. Hybridization of K-means clustering algorithm with Ant Lion Optimizer for grouping of nodes and optimal CH selection is utilized for better energy efficiency. Thus, a Miscegenation of Ant Lion optimizer within K-means for clustering and Spherical grid based multi-curve Elliptic curve cryptographic routing (MALOKSER) is determined for effective clustering and secure routing of data packets within time to the base station. The main aim of our work is to enhance network security and energy savage in the wireless network communication system. Elliptic curve cryptography with spherical grid multi-tier routing ensure secure transmission by encrypting the messages with two different keys and forward the packets in a spherical format. The performance is evaluated under metrics such as packet deliver ratio, minimum energy consumptions, communication overheads, throughput and end to end delay with the existing standards shows better results. This proves the proposed technique can actively reduce the energy utilization with an efficient and safe routing of data over the network.

Energy Optimized Secure Routing Protocol for Wireless Sensor Networks

2013

The evolution of wireless sensor network technology has enabled us to develop advanced systems for real time monitoring. In the present scenario wireless sensor networks are increasingly being used for precision agriculture. The advantages of using wireless sensor networks in agriculture are distributed data collection and monitoring, monitor and control of climate, irrigation and nutrient supply. Hence decreasing the cost of production and increasing the efficiency of production. This paper describes the security issues related to wireless sensor networks and suggests some techniques for achieving system security. This paper also discusses a protocol that can be adopted for increasing the security of the transmitted data.

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

2013

Wireless Sensor Networks (WSNs) are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to balance between the security level and the associated energy consumption overhead to mitigate the security risks. Hierarchical routing protocol is more energy-efficient than other routing protocols in WSNs. Many secure cluster-based routing protocols have been proposed in the literature to overcome these constraints. In this paper, we discuss Secure Energy-Efficient Hierarchical Routing Protocols in WSNs and compare them in terms of security, performance and efficiency. Security issues for WSNs and their solutions are also discussed.

Energy Efficient Secure Routing Protocol (EESRP) in Wireless Sensor Network

Wireless sensor networks (WSNs) consisting of various sensor nodes which are distributed autonomously over the network. These sensor nodes can sense, measure and collect information from the environment. Every sensor node is having its own energy source and it is non-rechargeable battery. Therefore the network must be designed in such a way that they can be able to make use of energy source in an efficient manner. These information are sometime very confidential and need to be secured e.g. in military applications. So, the security model of the network must be efficient enough to provide security in the same. In this paper, we have presented an Energy Efficient Secure Routing Protocol. This scheme introduces a new concept of ‘status’ for each cluster formed. The lower status means the cluster is at a farther distance from the base station. To prevent attacks on data during transmission, every transmission of data is preceded by sending of a check packet to the destination. Proposed scheme reduces the intra-cluster communication distance. Simulation shows that proposed scheme has better energy efficiency than EECHS scheme.

Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation

2010

This paper presents a routing protocol architecture based on recursive group algorithm. This algorithm apply Group Verification Tree approach which makes the sensor network secure and make it safer from malicious intrusions and illegitimate users. The proposed approach will give a new dimension to the fast and secure routing in the sensor networks with less energy to be consumed. Based on the analysis and simulation the proposed strategies yield better results than the existing results.

Secure and power saving routing protocol for wireless sensor networks

2010

Wireless Sensor Network (WSN) consists of distributed sensors that are used to sense different parameters in the environment. It is currently used in many military and civilian applications and it becomes an active research area nowadays. These sensors are very limited in resources such as energy, memory and available bandwidth. One of the major challenges in such networks is how to provide connection between sensors and the sink node (base station) and how to exchange the data while maintaining the security requirements and taking into consideration their limited resources. In this paper a secure, power saving routing protocol is proposed to help managing the resources in WSN networks, the proposed protocol is a hybrid of two major categories of protocols in WSNs, namely tree-based and cluster-based protocols. The proposed protocol is combined with a Fuzzy Logic inference system to aid in the selection of the best route based on a combination of two factors: the path length and the available power. Illustrative examples are given about the usage of the new protocol.

Survey on Energy-Efficient Secure Routing In Wireless Sensor Networks

2013

The key challenge in sensor networks is to maximize the lifetime of sensor nodes due to the fact that it is not feasible to replace the batteries of thousands of sensor nodes. Therefore, computational operations of nodes and communication protocols must be made as energy efficient as possible. Among these protocols data transmission protocols have much more importance in terms of energy, since the energy required for data transmission takes 70 % of the total energy consumption of a wireless sensor network Area coverage and data aggregation techniques can greatly help conserve the scarce energy resources by eliminating data redundancy and minimizing the number of data transmissions. Therefore, data aggregation methods in sensor networks are extensively investigated in the literature [4], [5], [6] and [7]. Security in data communication is another important issue to be considered while designing wireless sensor networks, as wireless sensor networks may be deployed in hostile areas suc...

Energy Efficient and Secure Routing Scheme in Wireless Sensor Network

Nodes in many wireless sensor networks (WSNs) are powered by batteries with limited energy. Enhancing network lifetime and saving energy are two basic issues for WSNs. Some energy-saving routing algorithms can reduce total energy consumption of a WSN, however, they place too heavy burden of forwarding data packets on several key nodes so that these nodes quickly drain out available battery energy, making network lifetime shortened. These papers propose technique known as Secure Energy Efficient Routing Protocol for WSNs. Here in proposed system user first generate the network and form the clusters. After that cluster head and DCH is selected in each cluster. The work of DCH is the send location to the base station. The cluster members encrypt the data using encryption algorithm and send to the CH with hash of encrypt data. CH verifies data of each member. If any CH is faulty or not able to forward all members data then BS allocate the DCH as a CH and then CM send data to that CH and this CH forward the data to BS. The proposed protocol route the data securely by consuming less energy and enhance the network lifetime.

IJERT-A Review on Secured and Energy-Efficient Routing Protocols in Wireless Sensor Networks (WSNs

International Journal of Engineering Research and Technology (IJERT), 2021

https://www.ijert.org/a-review-on-secured-and-energy-efficient-routing-protocols-in-wireless-sensor-networks-wsns https://www.ijert.org/research/a-review-on-secured-and-energy-efficient-routing-protocols-in-wireless-sensor-networks-wsns-IJERTV10IS030070.pdf In wireless sensor networks (WSNs), the energy supply of sensor devices is limited. One of the basic architecture problems in WSNs is sensor dies due to dissipating battery capacity. As a result, it is argued that energy conservation is the most significant criterion for any protocol built for WSNs. Thousands of lightweight, inexpensive sensors can be randomly distributed in open and harsh environments to gather data in Wireless Sensor Networks (WSNs). The low battery life of battery-operated sensors, as well as hostile conditions, require the development of energy-efficient, secure and reliable sensor network protocols. Routing, out of the broad range of network protocols, is the most critical in terms of energy consumption, as data transmission absorbs 70% of total energy in WSNs. As a result, energy-efficient routing systems must be built in order to save energy and increase the network's lifespan. However, resource-limited sensors, the lack of a global solution scheme and the application-specific nature of WSNs pose a challenge to routing. Furthermore, security is yet another critical problem in WSNs, as sensors are typically installed in insecure areas and susceptible to security attacks. Many of the current routing protocols have various security measures in place to meet security objectives. We present a brief review on various secure and energy-efficient routing protocols in wireless sensor networks, outlining their underlying principle and operations.

A power-efficient secure routing protocol for wireless sensor networks

WSEAS Transactions on Computers, 2010

Wireless Sensor Network (WSN) is a hot research area due to its use in many military and civilian applications. WSN consists of distributed small, low power and limited capabilities sensors that are scattered in the network field to sense different parameters in the environment. The sensed data will be sent to a more powerful node called sink node (Base Station). The sink node is usually connected to a power supply and is used to process the data and to connect the sensor network to other networks like the Internet. One of the major challenges in such networks is how to provide connection between the sensors and the sink node and how to exchange the data while maintaining the security requirements and taking into consideration their limited resources in terms of energy, memory and available bandwidth. In this paper a power-efficient, secure routing protocol is proposed to help managing the resources in WSN networks. The proposed protocol is a hybrid of two major categories of protocols in WSNs, namely tree-based and cluster-based protocols. The proposed protocol is combined with a Fuzzy Logic inference system to aid in the selection of the best route based on a combination of three factors: the path length, the available power and the node reputation resulted from the Intrusion Detection System (IDS). The proposed protocol uses three Fuzzy Inference Systems (FIS) that are implemented in two tiers. Tier one will choose the best route in terms of shortest length and high power. Tier two provides a security assessment for the selected route.