scholarly journals An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN

Energies ◽  
2019 ◽  
Vol 12 (21) ◽  
pp. 4174 ◽  
Author(s):  
Khalid Haseeb ◽  
Ahmad Almogren ◽  
Naveed Islam ◽  
Ikram Ud Din ◽  
Zahoor Jan

Due to the advancement of information and communication technologies, the use of Internet of Things (IoT) devices has increased exponentially. In the development of IoT, wireless sensor networks (WSNs) perform a vital part and comprises of low-cost smart devices for information gathering. However, such smart devices have constraints in terms of computation, processing, memory and energy resources. Along with such constraints, one of the fundamental challenges for WSN is to achieve reliability with the security of transmitted data in a vulnerable environment against malicious nodes. This paper aims to develop an energy-efficient and secure routing protocol (ESR) for intrusion avoidance in IoT based on WSN to increase the network period and data trustworthiness. Firstly, the proposed protocol creates different energy-efficient clusters based on the intrinsic qualities of nodes. Secondly, based on the (k,n) threshold-based Shamir secret sharing scheme, the reliability and security of the sensory information among the base station (BS) and cluster head are achieved. The proposed security scheme presents a light-weight solution to cope with intrusions generated by malicious nodes. The experimental results using the network simulator (NS-2) demonstrate that the proposed routing protocol achieved improvement in terms of network lifetime as 37%, average end-to-end delay as 24%, packet delivery ratio as 30%, average communication cost as 29%, network overhead as 28% and the frequency of route re-discoveries as 38% when compared with the existing work under dynamic network topologies.

Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


2013 ◽  
Vol 373-375 ◽  
pp. 1931-1934 ◽  
Author(s):  
Yi Min Zhou ◽  
La Yuan Li

The Wireless Sensor Network applications has widely been used over the last few years. WSN is a novel self-organization wireless network which is made up of randomly distributed sensor Nodes. Due to some resource constraints, the design of security in WSN encounters a great many of new challenges. It is vulnerable to attack, which is harmful for availability of WSN. In this paper we propose a trust-aware and location-based secure routing protocol which protects WSN against routing attacks, and also supports large-scale WSN deployments. The proposed protocol is extended from GPSR protocol, which imports security mechanism that depends on a distributed trust management system. The solution has been shown to efficiently detect and avoid malicious nodes.


2021 ◽  
Author(s):  
Srinivas Maganti ◽  
M.Ramesh Patnaik

Abstract Mobile adhoc network (MANETs) comprises a collection of independent, compact sized, and inexpensive sensor nodes, which are commonly used to sense the physical parameters in the geographical location and transmit it to the base station (BS). Since clustering and routing are considered as the commonly used energy efficient techniques, several metaheuristic algorithms have been employed to determine optimal cluster heads (CHs) and routes to destination. But most of the metaheuristic techniques have failed to achieve effective clustering and routing solutions in large search space and the chance of generating optimal solutions is also considerably reduced. To resolve these issues, this paper presents a new Metaheuristic Quantum Glowworm Swarm Optimization based Clustering with Secure Routing Protocol for MANET, named QGSOC-SRP. The presented QGSOC-SRP technique follows two stage processes, namely optimal CH selection and route selection. Firstly, the QGSO algorithm derives a fitness function using four variables such as energy, distance, node degree, and trust factor for optimal election of secure CHs. Secondly, the SRP using oppositional gravitational search algorithm (OGSA) is applied for the optimal selection of routes to BS. The traditional GSA is inspired by the law of gravity and interaction among masses. To improve the effectiveness of the GSA, OGSA is derived based on the oppositional based learning concept for population initialization and generation jumping. For validating the effective results of the presented OGSOC-SRP technique, a set of experiments were performed and the results are determined interms of distinct measures.


2019 ◽  
Vol 01 (02) ◽  
pp. 87-102 ◽  
Author(s):  
Jennifer S. Raj ◽  
Smys S ◽  
Abul Bashar

The advanced progress in wireless communication pays attention on information of more sensitivity to be delivered to its destined end with numerous of restrains, such as reliableness, constancy, response time and safety. The advancements in digital gadgetry, the usage of unwired transceivers and microcontrollers has made viable the integration of sensing and computing device with transceivers and power units to form a single unit called sensor nodes, the enveloping of sensor nodes form wireless sensor nodes. Innumerable existing proposals have aimed at the energy efficient and secure transmission of data but have achieved any one at the cost of the other. Noting down the issues of the existing method this paper proposes an energy efficient multi-tier sustainable secure routing protocol (EEMSR) for mobile wireless sensor nodes which is a cohabit of multi-tier secure routing with an AL (Ant Lion) optimizer (CoMSR-ALO) along with the prime curve cryptography supported by the routing formed in spherical structure. This better encryption and decryption method takes the edge of power consumption and offers control over the utilization of energy which is difficult to be achieved when dispatching the pack and also avoids the intervention of the encroacher and improves the security and minimizes the deprivation caused due the information lost.


Author(s):  
D. Sivamurugan ◽  
L. Raja

Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure. These networks have some unique features such as dynamic mobility, open nature, lack of infrastructure, limited physical security and they are vulnerable to several security threats. Malicious node can drop all or partial received packets instead of forwarding them to the next hop through the path. In order to find the malicious nodes, an initial transmission is made between the source and destination nodes. Using fuzzy rules, the trust value of each node is computed and it varies from 0 to 1. A common threshold value is set for each node and by using this threshold value, every node in the network can be identified as either a malicious node or a regular node. After identifying the malicious nodes, these nodes are eliminated by muting the power to off state. As the malicious nodes are eliminated between source and destination nodes, source node can select another trusted path to its destination node. For security and authentication of routing information, hybrid cryptography is employed, using advanced encryption standard (AES) and elliptic curve cryptography (ECC) algorithms. AES algorithm is used as symmetric algorithm to encrypt the routing information and ECC algorithm is used as asymmetric algorithm to encrypt the public key. During encryption, the original plain text is converted into cipher text with encrypted public key and similarly during decryption cipher text is converted into original plain text with decrypted private keys. So the proposed method involves both AES and ECC algorithms which provides security mechanism as efficient and sufficient one. The experimental simulations are carried for the proposed model using network simulator 2 (NS-2) for Throughput, Delay, Packet delivery ratio, Packet overhead and Packet drop.


Sign in / Sign up

Export Citation Format

Share Document