Open Access
Subscription Access
Open Access
Subscription Access
Reliable Fast and Ideal Traffic Aware Secure Routing Protocol Based on Multi-Hop Cross Site Leaping for Efficient Packet Transmission in WSN
Subscribe/Renew Journal
Fast Transmission in Wireless medium possess on node selection routing and unicasting the wireless sensor networks of the traditional secure aggregation system, the node broadcast it to all its neighbors as compared to what it contained. However, due to the rigorous network environment surrounding the nodes, many researchers usually take a different approach from traditional networks. Wireless sensor networks (WSN) are currently used in a variety of applications and will be used in more applications in the future. However, wireless sensor networks tend to be more unreliable than wired networks. In this paper, proposes A Reliable fast and ideal traffic aware secure routing protocol (RTASR) based on multi-hop cross site leaping for efficient packet transmission in WSN. Group-based fast proximity detection algorithm (GBFA) solves these problems. By bearing neighboring information in the beacon pocket, the node knows some potential neighbors in advance. This allows fast discovery to pick up the most energy-efficient neighbors to speed up energy efficiency and reduce network communication load, and actively nodes to verify that this dynamic neighbor is a true neighbor. The simulated results show that the proposed scheme reduces the loss of bandwidth in comparison to routing mechanisms that extend the life of the network.
Keywords
Traffic Aware Routing, Node Bouncing, Cross Site Verification, Multi Hop Verification, Data Collection, Secure Routing, Packet Flow
Subscription
Login to verify subscription
User
Font Size
Information
- Aykut Karakaya and Sedat Akleylek, “A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks”, Proceedings of 6th International Symposium on Digital Forensic and Security, pp. 1-4, 2018.
- S.R. Rajeswari and V. Seenivasagarn, “Comparative Study on Various Authentication Protocols in Wireless Sensor Networks”, The Scientific World Journal, Vol. 2016, pp. 1-16, 2016.
- Yun Lin and Jie Chang, “Improving Wireless Network Security Based on Radio Fingerprinting”, Proceedings of IEEE International Conference on Software Quality, Reliability and Security Companion, pp. 1-5, 2019.
- X. Ye, X. Yin, X. Cai, A. Perez Yuste and H. Xu, “Neural-Network Assisted UE Localization Using Radio-Channel Fingerprints in LTE Networks”, IEEE Access, Vol. 5, pp. 12071-12087, 2017.
- Liang Huang, Xin Fan, Yan Huo, Chunqiang Hu, Yuqian Tian and Jin Qian, “A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI”, IEEE Access, vol. 5, pp. 26476-26486, 2017.
- Nazli Siasi, Adel Aldalbahi and Mohammed A. Jasim, “Reliable Transmission Scheme against Security Attacks in Wireless Sensor Networks”, IEEE Access, Vol. 7, pp. 1-5, 2019.
- J. Ren, Y. Zhang, K. Zhang and X. Shen, “Adaptive and Channel Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, Vol. 15, No. 5, pp. 1-15, 2016.
- E. Stavrou and A. Pitsillides, “WSN Operability during Persistent Attack Execution”, Proceedings of International Conference on Telecommunications, pp. 1-12, 2016.
- N.G. Palan, B.V. Barbadekar and S. Patil, “Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol: A Retrospective Analysis”, Proceedings of International Conference on Inventive Systems and Control, pp. 1-8, 2017.
- Shailesh Pramod Bendale and Jayashree Rajesh Prasad, “Security Threats and Challenges in Future Mobile Wireless Networks”, Proceedings of International Conference on IEEE Global Conference on Wireless Computing and Networking, pp. 146-150, 2018.
- Dongfeng Fang, Yi Qian and Rose Qingyang Hu, “Security for 5G Mobile Wireless Networks”, IEEE Access, Vol. 6, pp. 4850-4874, 2018.
- Y. Ju, H. M. Wang, T.X. Zheng and Q. Yin, “Secure Transmission with Artificial Noise in Millimeter Wave Systems”, Proceedings of International Conference on IEEE Wireless Communications and Networking, pp. 1-6 2016.
- N. Panwar, S. Sharma and A. K. Singh, “A Survey on 5G: The Next Generation of Mobile Communication”, Physical Communication, Vol.18, No. 2, pp. 64-84, 2016.
- E. Dubrova, M. Naslund and G. Selander, “CRC-Based Message Authentication for 5G Mobile Technology”, Proceedings of International Conference on Trust, Security, and Privacy in Computing and Communications, pp. 1186-1191, 2015.
- L. Wei, R. Q. Hu, Y. Qian and G. Wu, “Energy Efficiency and Spectrum Efficiency of Multihop Device-to-Device Communications Underlaying Cellular Networks”, IEEE Transactions on Vehicular Technology, Vol. 65, No. 1, pp. 367-380, 2016.
- Haomeng Xie, Zheng Yan, “Data Collection for Security Measurement in Wireless Sensor Networks: A Survey”, IEEE Internet of Things Journal, Vol. 6, No. 2, pp. 1-22, 2018.
- G. Liu, Z. Yan and W. Pedryczc, “Data Collection for Attack Detection and Security Measurement in Mobile Ad Hoc Networks: A Survey”, Journal of Network and Computer Applications, Vol. 105, pp. 105-122, 2018.
- H.Q. Lin, Z. Yan, Y. Chen and L.F. Zhang, “A Survey on Network Security-Related Data Collection Technologies”, IEEE Access, Vol. 6, pp. 18345-18365, 2018.
- Y.F. Zheng, H.Y. Duan and C. Wang, “Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing”, IEEE Transactions on Information Forensics and Security, Vol. 13, No. 10, pp. 2475-2489, 2018.
- J. Ren, S. Member, Y. Zhang, K. Zhang and S. Member, “Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks”, IEEE Transaction on Wireless Communications, Vol. 15, No. 5, pp. 3718-3731, 2016.
Abstract Views: 293
PDF Views: 1