Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Energy Efficient and Secure Data Transmission using Cooperative Routing in Networks


Affiliations
1 Department of Computer Science and Engineering, KPR Institute of Engineering and Technology, India
2 Department of Computer Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India
3 Department of Computer Science Engineering, Balaji Institute of Technology and Science, India
     

   Subscribe/Renew Journal


Wireless Sensor Networks (WSNs) are emerging as a promising technology because of their wide range of applications in industrial, environmental monitoring, military and civilian domains. Due to economic considerations, the nodes are usually simple and low cost. They are often unattended, however, and are hence likely to suffer from different types of novel attack. WSNs are increasingly being deployed in security-critical applications. Due to their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. In this paper, using the recent advances in uncertain reasoning that has originated from the artificial intelligence community, we propose a trust management scheme named Hybrid and Efficient Intrusion Detection Systems that enhances the security in networks. Here, we have used two frameworks for Trust Calculation and Decision Making process. The trust value is derived using Bayesian Inference, and Decision Making is based on Dempster-Shafer theory, which is a mathematical theory of evidence.

Keywords

WSN, Dempster-Shafer Theory, Intrusion Detection System, Artificial Intelligence.
Subscription Login to verify subscription
User
Notifications
Font Size

  • S. Shakkottai, X. Liu and R. Srikant, “The Multicast Capacity of Large Multihop Wireless Networks”, IEEE/ACM Transactions on Networking, Vol. 18, No. 5, pp. 1691-1700, 2010.
  • Z. Qian, X. Tian, X. Chen, W. Huang and X. Wang, “Multicast Capacity in MANET with Infrastructure Support”, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 7, pp. 1808-1818, 2014.
  • Z. Li, C. Wang, C. Jiang and X. Li, “Multicast Capacity Scaling for Inhomogeneous Mobile Ad Hoc Networks”, Ad Hoc Networks, Vol. 11, No. 1, pp. 29-38, 2013.
  • S. Zhou and L. Ying, “On Delay Constrained Multicast Capacity of Largescale Mobile Ad-Hoc Networks”, Proceedings of International Conference on Communications and Networks, pp. 1-7, 2010.
  • J.P. Jeong, T. He and D.H.C. Du, “TMA: Trajectory-based Multicast Forwarding for Efficient Multicast Data Delivery in Vehicular Networks”, Computer Networks, Vol. 57, No. 13, pp. 662-672, 2013.
  • X. Ge, J. Yang, H. Gharavi and Y. Sun, “Energy Efficiency Challenges of 5G Small Cell Networks”, IEEE Communications Magazine, Vol. 55, No. 5, pp. 184-191, 2017.
  • T. Han, X. Ge, L. Wang, K.S. Kwak, Y. Han and X. Liu, “5G Converged Cell-Less Communications in Smart Cities”, IEEE Communications Magazine, Vol. 55, No. 3, pp. 44-50, 2017.
  • X. Ge, S. Tu, G. Mao, C. Wang and T. Han, “5G Ultra-Dense Cellular Networks”, IEEE Wireless Communications, Vol. 23, No. 1, pp. 72-79, 2016.
  • Z. Su, Q. Xu, Y. Hui, M. Wen and S. Guo, “A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, Vol. 66, No. 7, pp. 6461-6474, 2016.
  • B. Yang, Y. Cai, Y. Chen and X. Jiang, “On the Exact Multicast Delay in Mobile Ad Hoc Networks with F-Cast Relay”, Ad Hoc Networks, Vol. 33, pp. 71-86, 2015.
  • X. Wang, W. Huang, S. Wang, J. Zhang and C. Hu, “Delay and Capacity Tradeoff Analysis for Motioncast”, IEEE/ACM Transactions on Networking, Vol. 19, No. 5, pp. 1354-1367, 2011.
  • C. Hu, X. Wang and F. Wu, “Motioncast: On the Capacity and Delay Tradeoffs”, Proceedings of 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 18-21, 2009.

Abstract Views: 265

PDF Views: 0




  • Energy Efficient and Secure Data Transmission using Cooperative Routing in Networks

Abstract Views: 265  |  PDF Views: 0

Authors

M. Saravanan
Department of Computer Science and Engineering, KPR Institute of Engineering and Technology, India
Lakshminarayanan
Department of Computer Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India
Allanki Sanyasi Rao
Department of Computer Science Engineering, Balaji Institute of Technology and Science, India

Abstract


Wireless Sensor Networks (WSNs) are emerging as a promising technology because of their wide range of applications in industrial, environmental monitoring, military and civilian domains. Due to economic considerations, the nodes are usually simple and low cost. They are often unattended, however, and are hence likely to suffer from different types of novel attack. WSNs are increasingly being deployed in security-critical applications. Due to their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. In this paper, using the recent advances in uncertain reasoning that has originated from the artificial intelligence community, we propose a trust management scheme named Hybrid and Efficient Intrusion Detection Systems that enhances the security in networks. Here, we have used two frameworks for Trust Calculation and Decision Making process. The trust value is derived using Bayesian Inference, and Decision Making is based on Dempster-Shafer theory, which is a mathematical theory of evidence.

Keywords


WSN, Dempster-Shafer Theory, Intrusion Detection System, Artificial Intelligence.

References