Open Access Open Access  Restricted Access Subscription Access

Performance Analysis of Cluster-Based Dynamic Multipath Trust Secure Routing (DMTSR)-Protocol in Wireless Sensor Networks (WSNs)


Affiliations
1 Department of Electronics and Communication Engineering, SJB Institute of Technology, Bangalore, Karnataka., India
2 Department of Electronics and Telecommunication Engineering, Dr. Ambedkar Institute of Technology, Bangalore, Karnataka., India
 

A wireless sensor network [WSN] analyses the structured information supplied from the base station for the hostile environment. The primary drawback of WSN is Security since the sensors are placed in a closed network. WSNs are primarily disrupted by a variety of harmful ‘internal and external’ attacks. Due to these attacks, the leading resources in the networks, like power and memory, will be drained early. To overcome these problems, propose a novel protocol: Dynamic Multipath Trust Secure Routing Protocol (DMTSR) with Advanced AAODV protocol. For encryption and decryption purposes, Advanced Encryption Algorithms [AES] are used to help the above protocol. The fastest path is found to a destination from the source node by considering the neighbour node's energy level and energy consumption of the node. It can reduce packet loss and improve the packet_ delivery ratio. DMTSRP and AAODV protocols are merged to develop an innovative approach to routing the information. The DMTSR will give a layer-by-layer explanation. The source node's primary job is to identify the path by considering the neighbour node and approaches for the primary keys. Source nodes begin updating intermediate nodes in secured regions using an AES encryption algorithm. The DMTSR protocol replaces packets of data. The DMTSR protocol uses a secondary_key to substitute an intermediate node, where the secured data is received at the final nodes. The simulation outcomes of the DMTSR protocol achieve a 92% Packet_Delivery_Rate, Throughput of 97%, and a delay is 0.278ms in the network.

Keywords

WSN, AAODV, DMTSR, AES, Security, Cluster Head (CH), Routing Protocols, QoS.
User
Notifications
Font Size

  • K. Maheshwar, S. Veenadhari, and S. Almelu, “Performance analysis of energy efficient optimization algorithms for cluster-based routing protocol for heterogeneous WSN,” Lecture Notes in Electrical Engineering, pp. 631–643, 2022.
  • Mittal, N. (2019). Moth flame optimization-based energy efficient stable clustered routing approach for wireless sensor networks. Wireless Personal Communications, 104(2), 677–694.
  • Ahmad, T., Haque, M., & Khan, A. M. (2019). An energy-efficient cluster head selection using artificial bee’s colony optimization for wireless sensor networks. Advances in Nature-Inspired Computing and Applications (pp. 189–203). Cham: Springer.
  • Jiang, T. B., Chu, S. C., & Pan, J. S. (2020, October). Parallel charged system search algorithm for energy management in wireless sensor network. In 2020 2nd International Conference on Industrial Artificial Intelligence (IAI) (pp. 1–6). IEEE.
  • Lee, J. and Kao, T. An Improved Three-Layer Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks. IEEE Internet of Things Journal, 3(6), pp.951-958, (2016).
  • M. Shafiq, H. Ashraf, A. Ullah, M. Masud, M. Azeem, N. Z. Jhanjhi, and M. Humayun, “Robust cluster-based routing protocol for IOT-assisted smart devices in WSN,” Computers, Materials & Continua, vol. 67, no. 3, pp. 3505–3521, 2021.
  • S. Vidhya and T. Sasilatha, “Secure data transfer using Multi-Layer Security Protocol with energy power consumption AODV in wireless sensor networks,” Wireless Personal Communications, vol. 103, no. 4, pp. 3055–3077, 2018.
  • Neamatollahi, P., Abrishami, S., Naghibzadeh, M., Yaghmaee Moghaddam, M. and Younis, O. Hierarchical Clustering-Task Scheduling Policy in Cluster-Based Wireless Sensor Networks. IEEE Transactions on Industrial Informatics, 14(5), pp.1876-1886, (2018)
  • E. Niewiadomska-Szynkiewicz and F. Nabrdalik, “Secure low energy AODV protocol for Wireless Sensor Networks,” 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), 2017.
  • M. Chaudhari, P. Koleva, V. Poulkov, and O. Asenov, “Multilayered distributed routing for power efficient Manet Performance,” Wireless Personal Communications, vol. 97, no. 2, pp. 1729–1752, 2017.
  • S. Alkhliwi, “Energy efficient cluster-based routing protocol with secure ids for IOT assisted heterogeneous WSN,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 11, 2020.
  • S. Padaganur, P. S. Patil, and M. Deshmukh, “Performance analysis of Cluster-based energy-efficient routing scheme for WSN,” Soft Computing for Intelligent Systems, pp. 417–424, 2021.
  • Z. Wang, H. Ding, B. Li, L. Bao, Z. Yang, and Q. Liu, “Energy efficient cluster-based routing protocol for WSN using Firefly algorithm and ant colony optimization,” Wireless Personal Communications, vol. 125, no. 3, pp. 2167–2200, 2022.
  • P. Nandhini and A. Suresh, “Energy efficient cluster-based routing protocol using charged system harmony search algorithm in WSN,” Wireless Personal Communications, vol. 121, no. 3, pp. 1457–1470, 2021.
  • S. Akila and R. Venkatesan, “An energy balanced geo-cluster headset based multi-hop routing for wireless sensor networks,” Cluster Computing, vol. 22, no. S4, pp. 9865–9874, 2018.
  • M. Bilal, E. U. Munir, and F. K. Alarfaj, “Hybrid clustering and routing algorithm with threshold-based data collection for heterogeneous wireless sensor networks,” Sensors, vol. 22, no. 15, p. 5471, 2022.
  • R. Rajeswari, K. Kulothungan, S. Ganapathy, and A. Kannan, “Trusted energy aware cluster-based routing using fuzzy logic for WSN in IOT,” Journal of Intelligent & Fuzzy Systems, vol. 40, no. 5, pp. 9197–9211, 2021.
  • H. Yetgin, K. T. Cheung, M. El-Hajjar, and L. Hanzo, “A survey of network lifetime maximization techniques in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 828– 854, 2017.
  • M. Shafiq, H. Ashraf, A. Ullah, M. Masud, M. Azeem, N. Z. Jhanjhi, and M. Humayun, “Robust cluster-based routing protocol for IOT-assisted smart devices in WSN,” Computers, Materials & Continua, vol. 67, no. 3, pp. 3505–3521, 2021.
  • B. Han, F. Ran, J. Li, L. Yan, H. Shen, and A. Li, “A Novel Adaptive Cluster Based Routing Protocol for energy-harvesting wireless sensor networks,” Sensors, vol. 22, no. 4, p. 1564, 2022.
  • S. Chelbi and R. Moussi, “A cluster-based routing protocol and Fault Detection for Wireless Sensor Network,” International journal of Computer Networks & Communications, vol. 13, no. 04, pp. 71–83, 2021.
  • L. M and P. C R, “Designing an energy efficient clustering in heterogeneous wireless sensor network,” International journal of Computer Networks & Communications, vol. 13, no. 1, pp. 75–92, 2021.
  • Y. El Assari, S. Al Fallah, J. El Aasri, M. Arioua, and A. El Oualkadi, “Energy-efficient multi-hop routing with unequal clustering approach for wireless sensor networks,” International journal of Computer Networks & Communications, vol. 12, no. 3, pp. 55–73, 2020. How to cite this article:
  • M. Rajasekaran, “Performance and evaluation of Location Energy Aware Trusted Distance Source Routing Protocol for secure routing in wsns,” Indian Journal of Science and Technology, vol. 13, no. 39, pp. 4092–4108, 2020.
  • S. Smiri, A. Boushaba, R. Ben Abbou, and A. Zahi, “Performance analysis of routing protocols with roadside unit infrastructure in a vehicular ad hoc network,” International journal of Computer Networks & Communications, vol. 12, no. 4, pp. 19–39, 2020.
  • J. Seetaram and P. S. Kumar, “An energy-aware genetic algorithm multipath distance vector protocol for efficient routing,” 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016.
  • L. Malathi and R. K. Gnanamurthy, “Cluster-based hierarchical routing protocol for WSN with energy efficiency,” International Journal of Machine Learning and Computing, vol. 4, no. 5, pp. 474–477, 2014.
  • H. Fareen Farzana and S. Neduncheliyan, “Ant-based routing and QoS-effective data collection for Mobile Wireless Sensor Network,” Wireless Networks, vol. 23, no. 6, pp. 1697–1707, 2016.
  • M. Chaudhari, P. Koleva, V. Poulkov, and O. Asenov, “Multilayered distributed routing for power efficient Manet Performance,” Wireless Personal Communications, vol. 97, no. 2, pp. 1729–1752, 2017.
  • L. J., “Power Aware Energy Efficient Cluster based network coding algorithm for Dynamic Source Routing (PA-EECSNC DSR),” International Journal of Psychosocial Rehabilitation, vol. 24, no. 5, pp. 1742–1750, 2020.

Abstract Views: 175

PDF Views: 0




  • Performance Analysis of Cluster-Based Dynamic Multipath Trust Secure Routing (DMTSR)-Protocol in Wireless Sensor Networks (WSNs)

Abstract Views: 175  |  PDF Views: 0

Authors

Darshan B. D.
Department of Electronics and Communication Engineering, SJB Institute of Technology, Bangalore, Karnataka., India
Prashanth C. R.
Department of Electronics and Telecommunication Engineering, Dr. Ambedkar Institute of Technology, Bangalore, Karnataka., India

Abstract


A wireless sensor network [WSN] analyses the structured information supplied from the base station for the hostile environment. The primary drawback of WSN is Security since the sensors are placed in a closed network. WSNs are primarily disrupted by a variety of harmful ‘internal and external’ attacks. Due to these attacks, the leading resources in the networks, like power and memory, will be drained early. To overcome these problems, propose a novel protocol: Dynamic Multipath Trust Secure Routing Protocol (DMTSR) with Advanced AAODV protocol. For encryption and decryption purposes, Advanced Encryption Algorithms [AES] are used to help the above protocol. The fastest path is found to a destination from the source node by considering the neighbour node's energy level and energy consumption of the node. It can reduce packet loss and improve the packet_ delivery ratio. DMTSRP and AAODV protocols are merged to develop an innovative approach to routing the information. The DMTSR will give a layer-by-layer explanation. The source node's primary job is to identify the path by considering the neighbour node and approaches for the primary keys. Source nodes begin updating intermediate nodes in secured regions using an AES encryption algorithm. The DMTSR protocol replaces packets of data. The DMTSR protocol uses a secondary_key to substitute an intermediate node, where the secured data is received at the final nodes. The simulation outcomes of the DMTSR protocol achieve a 92% Packet_Delivery_Rate, Throughput of 97%, and a delay is 0.278ms in the network.

Keywords


WSN, AAODV, DMTSR, AES, Security, Cluster Head (CH), Routing Protocols, QoS.

References





DOI: https://doi.org/10.22247/ijcna%2F2023%2F221891