Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Improving the Security Based Routing Protocol for Wireless Sensor Networks


Affiliations
1 Department of Computer Science Engineering, Sri Indu College of Engineering and Technology, India., India
2 Department of Electronics and Telecommunication Engineering, Vasantdada Patil Pratishthan’s College of Engineering and Visual Arts, India., India
3 Department of Electronics and Telecommunication Engineering, JSPM’s Bhivarabai Sawant Institute of Technology and Research, India., India
4 Department of Information Technology, RMK Engineering College, India., India
     

   Subscribe/Renew Journal


Wireless sensor networks (WSNs) have become one of the most popular wireless communication systems in the world. Various attacks have been launched against the WSN individual nodes over the past few years, and the overall security of the network has gradually deteriorated. In this research, we propose a secure uneven clustering method for WSN. The proposed method is based on a trust score evaluation model with the objective of identifying malevolent users in WSNs. The trust score is used to determine whether or not a node is malicious. The results show that the proposed Trust Algorithm outperforms the currently used LEACH algorithm, the TASRP algorithm and the FLSO algorithm in terms of the percentage of packets that are successfully delivered across all use cases and density of nodes.

Keywords

Security, Routing Protocol, Wireless Sensor Network.
Subscription Login to verify subscription
User
Notifications
Font Size

  • S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks”, Proceedings of International Conference on Communication, Computing and Security, pp. 146-151, 2011.
  • P. Vivekanandan and A. Sunitha Nadhini, “A Survey on Efficient Routing Protocol using Mobile Networks”, International Journal of Advances in Engineering and Technology, Vol. 6, No. 1, pp. 370-382, 2013.
  • V. Balasubramanian and A. Karmouch, “Managing the Mobile Ad-Hoc Cloud Ecosystem using software Defined Networking Principles”, Proceedings of International Symposium on Networks, Computers and Communications, pp. 1-6, 2017.
  • M. Maalej, S. Cherif and H. Besbes, “QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks”, The Scientific World Journal, Vol. 2013, pp. 1-11, 2013.
  • M. Chen, T. Kwon, S. Mao, Y. Yuan and V.C. Leung, “Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks”, International Journal of Sensor Networks, Vol. 4, No. 1-2, pp. 104-112, 2008.
  • S. Murthy and G. Varaprasad, “Digital Signature-based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks”, IEEE Sensors Journal, Vol. 12, No. 10, pp. 2941-2949, 2012.
  • A. Ahmed and A.W. Khan, “TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network”, IEEE Sensors Journal, Vol .15, No. 12, pp. 6962-6972, 2015.
  • T. Khan and K. Singh, “TASRP: A Trust Aware Secure Routing Protocol for Wireless Sensor Networks”, International Journal of Innovative Computing and Applications, Vol. 12, No. 2-3, pp. 108-122, 2021.
  • L. Gong and Z. Zhao, “Fine-Grained Trust-Based Routing Algorithm for Wireless Sensor Networks”, Mobile Networks and Applications, Vol. 2021, pp. 1-10, 2021.
  • W. Lou, “An Efficient N-to-1 Multipath Routing Protocol in Wireless Sensor Networks”, Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1-8, 2005.
  • K. Zhang and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks using Group Key Management”, Proceedings of IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-5, 2008.
  • R. Sumathi and M.G. Srinivas, “A Survey of QoS Based Routing Protocols for Wireless Sensor Networks”, Journal of Information Processing Systems, Vol. 8, No. 4, pp. 589- 602, 2012.
  • L. Daanoune and A. Ballouk, “A Comprehensive Survey on LEACH-based Clustering Routing Protocols in Wireless Sensor Networks”, Ad Hoc Networks, Vol. 114, pp. 102409- 102415, 2021.
  • S. Kaur and R. Mahajan, “Hybrid Meta-Heuristic Optimization based Energy Efficient Protocol for Wireless Sensor Networks”, Egyptian Informatics Journal, Vol. 19, No. 3, pp. 145-150, 2018.
  • U. Meena and A. Sharma, “Secure Key Agreement with Rekeying using FLSO Routing Protocol in Wireless Sensor Network”, Wireless Personal Communications, Vol. 101, pp. 1177-1199, 2018.

Abstract Views: 136

PDF Views: 0




  • Improving the Security Based Routing Protocol for Wireless Sensor Networks

Abstract Views: 136  |  PDF Views: 0

Authors

S. Vijayarangam
Department of Computer Science Engineering, Sri Indu College of Engineering and Technology, India., India
Kavita V Wagh
Department of Electronics and Telecommunication Engineering, Vasantdada Patil Pratishthan’s College of Engineering and Visual Arts, India., India
Vishal Gangadhar Puranik
Department of Electronics and Telecommunication Engineering, JSPM’s Bhivarabai Sawant Institute of Technology and Research, India., India
S. Selvakanmani
Department of Information Technology, RMK Engineering College, India., India

Abstract


Wireless sensor networks (WSNs) have become one of the most popular wireless communication systems in the world. Various attacks have been launched against the WSN individual nodes over the past few years, and the overall security of the network has gradually deteriorated. In this research, we propose a secure uneven clustering method for WSN. The proposed method is based on a trust score evaluation model with the objective of identifying malevolent users in WSNs. The trust score is used to determine whether or not a node is malicious. The results show that the proposed Trust Algorithm outperforms the currently used LEACH algorithm, the TASRP algorithm and the FLSO algorithm in terms of the percentage of packets that are successfully delivered across all use cases and density of nodes.

Keywords


Security, Routing Protocol, Wireless Sensor Network.

References